80)={0x5c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x5c}}, 0x0) 22:36:49 executing program 2: openat$mice(0xffffffffffffff9c, &(0x7f0000000140), 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={0x0, 0x0, 0x80000}) fork() syz_open_dev$binderN(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000700), 0xffffffffffffffff) 22:36:49 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0xa867, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:36:49 executing program 4: add_key(&(0x7f0000000040)='.dead\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) 22:36:49 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$DRM_IOCTL_SET_SAREA_CTX(r0, 0x4010641c, &(0x7f00000003c0)={0x0, 0x0}) 22:36:49 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x5c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x5c}}, 0x0) 22:36:50 executing program 3: request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000240)='/dev/snd+timer\x00', 0x0) 22:36:50 executing program 2: mq_open(&(0x7f00000014c0)=':$[}|^^{{[^{&\x00', 0x40, 0x0, &(0x7f0000001500)={0xd1, 0x0, 0x20, 0x9660}) 22:36:50 executing program 4: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)="0bd5056d01c63b46c75f7b156953daf80859feaaf72aa850f9848df1b83461c09bfbfe324a81b6f7481c4b262faa2f8048006f6f1c47e2a40660ff71bbbf4f94622c029b5f1284f08a0f81b3a919011f89d93ca3b4a02d53286d05502dfd3995fa038b5fbc9518bc0f6146715068b08d6724f019b69c681dc62e6afa12b78e52", 0x80}}, 0x0) 22:36:50 executing program 5: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r0, 0xc00464b4, 0x0) 22:36:50 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x5c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x5c}}, 0x0) 22:36:50 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0xa867, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:36:50 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000001380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 22:36:50 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, r1, 0x1}, 0x14}}, 0x0) 22:36:50 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x5c, 0x0, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x5c}}, 0x0) 22:36:50 executing program 4: fork() openat$mice(0xffffffffffffff9c, 0x0, 0x0) 22:36:50 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000002840)={0x0, 0x0, &(0x7f0000002800)={&(0x7f0000000200)={0x28, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @dev}]}, 0x28}}, 0x0) 22:36:50 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f00000005c0)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f0000000080)={0x12, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, r1}}, 0x18) 22:36:50 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x5c, 0x0, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x5c}}, 0x0) 22:36:50 executing program 2: openat$fb0(0xffffffffffffff9c, &(0x7f0000000040), 0x421, 0x0) 22:36:50 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x20001a7b, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4800000010001fff000005000000000000000081", @ANYRES32=0x0, @ANYBLOB="0000000000000000280012800a00010076786c616e000000180002"], 0x3}}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 22:36:50 executing program 3: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$TIPC_IMPORTANCE(r0, 0x10f, 0x7f, 0x0, 0x0) 22:36:50 executing program 4: clock_gettime(0xb, &(0x7f0000001700)) [ 444.299625][T17401] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 22:36:50 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0xa867, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:36:50 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x5c, 0x0, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x5c}}, 0x0) 22:36:51 executing program 3: r0 = add_key(&(0x7f0000000180)='cifs.idmap\x00', &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000000), 0x0, 0x0, 0x0, r0) 22:36:51 executing program 2: clock_gettime(0x6, &(0x7f0000001700)) 22:36:51 executing program 4: openat$dsp1(0xffffffffffffff9c, &(0x7f0000000000), 0xe9e80e784796553e, 0x0) 22:36:51 executing program 1: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x5c, r0, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x5c}}, 0x0) 22:36:51 executing program 2: syz_mount_image$gfs2(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x64dd34d535782ff3) 22:36:51 executing program 3: r0 = mq_open(&(0x7f0000000000)='&b\x00', 0x0, 0x0, 0x0) mq_timedreceive(r0, &(0x7f0000000080)=""/102, 0x66, 0x0, &(0x7f0000000140)) 22:36:51 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0xa867, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:36:51 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x20001a7b, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4800000010001fff000005000000000000000081", @ANYRES32=0x0, @ANYBLOB="0000000000000000280012800a00010076786c616e000000180002"], 0x3}}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 22:36:51 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_SEC_KEY={0x4, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:36:51 executing program 1: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x5c, r0, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x5c}}, 0x0) 22:36:51 executing program 2: syz_mount_image$gfs2(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) open$dir(&(0x7f00000001c0)='./file0\x00', 0x10000, 0x0) 22:36:51 executing program 4: clock_gettime(0x5, &(0x7f0000000340)) [ 445.195918][T17435] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 22:36:51 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0xa867, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:36:51 executing program 4: r0 = fork() wait4(r0, 0x0, 0x20000009, 0x0) [ 445.278053][T17440] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 22:36:51 executing program 1: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x5c, r0, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x5c}}, 0x0) 22:36:51 executing program 2: syz_mount_image$gfs2(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000440)=ANY=[@ANYBLOB="05020400000005017f1d1a421fbc1a80e6a76220596a67e839b2d4c03e77"], 0x88, 0x1) mknodat$null(0xffffffffffffffff, 0x0, 0x0, 0x103) openat(0xffffffffffffffff, 0x0, 0x101200, 0x0) 22:36:52 executing program 3: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE(r0, 0xc01064c2, &(0x7f00000003c0)) [ 445.385417][T17441] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 22:36:52 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x5c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x5c}}, 0x0) 22:36:52 executing program 4: openat$mice(0xffffffffffffff9c, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$batadv(0x0, 0xffffffffffffffff) fork() syz_genetlink_get_family_id$batadv(0x0, 0xffffffffffffffff) 22:36:52 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @dev}, @ib={0x1b, 0x0, 0x0, {"c3bc0c5f5dd782d21f12d446591d9011"}}}}, 0x118) 22:36:52 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0xa867, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:36:52 executing program 2: syz_open_dev$sg(&(0x7f0000000380), 0x7a7, 0x1) 22:36:52 executing program 3: openat$drirender128(0xffffffffffffff9c, &(0x7f00000000c0), 0x2c8301, 0x0) 22:36:52 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x5c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x5c}}, 0x0) 22:36:52 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000018c0), r0) sendmsg$IEEE802154_LLSEC_ADD_KEY(r0, &(0x7f0000001980)={0x0, 0x0, &(0x7f0000001940)={&(0x7f0000001900)=ANY=[@ANYBLOB="14000000", @ANYRES16=r1, @ANYBLOB="0100000000000000000001"], 0x14}}, 0x0) 22:36:53 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x5c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x5c}}, 0x0) 22:36:53 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, 0x0, 0x0) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000018c0), r0) sendmsg$IEEE802154_LLSEC_ADD_KEY(r0, &(0x7f0000001980)={0x0, 0x0, &(0x7f0000001940)={&(0x7f00000001c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01000000000000000000270000000c0005000000000000000000140020"], 0x34}}, 0x0) 22:36:53 executing program 2: r0 = socket$l2tp(0x2, 0x2, 0x73) bind$l2tp(r0, &(0x7f0000000140)={0x2, 0x0, @broadcast}, 0x10) 22:36:53 executing program 4: r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000140), 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) 22:36:53 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0xa867, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:36:53 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_BACKOFF_EXPONENT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x24, r1, 0x801, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_MAX_BE={0x5}]}, 0x24}}, 0x0) [ 446.663114][T17486] netlink: 'syz-executor.3': attribute type 32 has an invalid length. 22:36:53 executing program 1: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x5c, r0, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x5c}}, 0x0) 22:36:53 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000e80)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000140)="81e1e1bfe9a7f5239abe9a5593e280ed6f", 0x11}], 0x1}, 0x0) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000140)={'wg1\x00', @dev}) 22:36:53 executing program 2: r0 = fork() ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$peekuser(0x3, r0, 0x0) [ 446.748803][T17496] netlink: 'syz-executor.3': attribute type 32 has an invalid length. 22:36:53 executing program 5: mq_open(&(0x7f0000000100)='\x91x\xee\xf4\xa5\x19\x13\xa5\xeec\xe34\xe2\xa0\x8a\xfe\xfa\x8f\x12Xg\x06S(\xe0y\x9dd\xde\xcdof\xc9\xcc\xc9\x82o\x18`d\xd3\b@\x82\xb9\x97\x98\x03\x00\x0f\x95P\xd2\xf3\x92c\xdb\xc6\x02\xe8\x1b\xb9\xf0w\xad\xe4\xfd\xe7!\x06\xa7i\xbc\xc5,h9\xf9;\xb2', 0x0, 0x0, 0x0) 22:36:53 executing program 3: r0 = syz_open_dev$rtc(&(0x7f0000000000), 0x3, 0x0) fstat(r0, &(0x7f0000000040)) 22:36:53 executing program 1: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x5c, r0, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x5c}}, 0x0) 22:36:53 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0xa867, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:36:53 executing program 4: r0 = fork() ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 22:36:53 executing program 1: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x5c, r0, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x5c}}, 0x0) 22:36:53 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_DEV(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000540)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010026bd3000fcdbdf251a0000000c0006"], 0x20}}, 0x0) 22:36:53 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$FBIOPUTCMAP(r0, 0x4605, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000100)=[0x0, 0x0, 0x0], &(0x7f0000000180), &(0x7f00000001c0), 0x0}) 22:36:53 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_VLAN_ID={0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_CONN_ID={0x8}]}, 0x2c}}, 0x0) 22:36:53 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, 0x0, 0x0) 22:36:53 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000240)) pselect6(0x40, &(0x7f0000000080), 0x0, &(0x7f0000000140)={0x9}, 0x0, 0x0) 22:36:54 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000180)={0x3, 0x0, 0x7}) 22:36:54 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0xa867, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:36:54 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$FBIOPUTCMAP(r0, 0x4605, &(0x7f0000000240)={0x0, 0x1, &(0x7f0000000100)=[0x0], &(0x7f0000000180), 0x0, 0x0}) 22:36:54 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) setsockopt$rose(r0, 0x104, 0x2, &(0x7f00000001c0)=0x7, 0x4) 22:36:54 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, 0x0, 0x0) 22:36:54 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000001c0), 0xffffffffffffffff) 22:36:54 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_ADD_KEY(r0, &(0x7f0000001980)={&(0x7f0000001880)={0x10, 0x0, 0xc759eb53}, 0xc, &(0x7f0000001940)={0x0}}, 0x0) 22:36:54 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, 0x0, 0x0) 22:36:54 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_NETNS_FD={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x28}}, 0x0) 22:36:54 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0xa867, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:36:54 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) 22:36:55 executing program 3: openat$mice(0xffffffffffffff9c, &(0x7f0000000140), 0x30a40) 22:36:55 executing program 5: r0 = syz_open_dev$binderN(&(0x7f0000000240), 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000300)={0x10, 0x0, &(0x7f0000000340)=[@enter_looper, @dead_binder_done], 0x0, 0x0, 0x0}) 22:36:55 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f00000000c0)={'wg2\x00'}) 22:36:55 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_ADD_KEY(r0, &(0x7f0000001980)={&(0x7f0000001880)={0x10, 0x0, 0xc759eb53}, 0xc, &(0x7f0000001940)={0x0, 0x33fe0}}, 0x0) 22:36:55 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0xa867, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:36:55 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) 22:36:55 executing program 4: syz_mount_image$gfs2(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000340)={[{@locktable={'locktable', 0x3d, '][,^'}}]}) 22:36:55 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x24, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_VLAN_ID={0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}]}, 0x24}}, 0x0) 22:36:55 executing program 2: readlinkat(0xffffffffffffffff, &(0x7f0000000380)='\x00', &(0x7f0000000a40)=""/204, 0xcc) 22:36:55 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_RELOAD(r0, 0xfffffffffffffffd, 0x0) 22:36:55 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) 22:36:55 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0xa867, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 448.943098][T17593] gfs2: Unknown parameter '^' [ 448.986126][T17593] gfs2: Unknown parameter '^' 22:36:55 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_FWMARK={0x8}]}, 0x1c}}, 0x0) 22:36:55 executing program 3: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) accept(r1, 0x0, 0x0) 22:36:55 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_buf(r0, 0x107, 0x2, &(0x7f0000000000)="2ed49befcb732a5511d8d308263475d7", 0x10) 22:36:55 executing program 4: r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000280), 0x0) write$usbip_server(r0, 0x0, 0x11d7) 22:36:55 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={0x0}}, 0x0) 22:36:55 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, 0x0, 0x0) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0xa867, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:36:56 executing program 5: r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000140), 0x0) connect$vsock_stream(r0, &(0x7f0000000380)={0x28, 0x0, 0x0, @my=0x1}, 0x10) 22:36:56 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000000), r0) 22:36:56 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x1c}}, 0x0) 22:36:56 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={0x0}}, 0x0) 22:36:56 executing program 4: add_key$fscrypt_v1(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffa) 22:36:56 executing program 5: syz_mount_image$gfs2(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, 0x88, 0x0) 22:36:56 executing program 2: r0 = openat$mice(0xffffffffffffff9c, 0x0, 0x0) fork() getpgrp(0xffffffffffffffff) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000200)=0xc) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000003bc0)={0x0, 0x0, &(0x7f0000000180)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, &(0x7f0000003b80)}, 0x4000000) syz_open_dev$binderN(&(0x7f0000000240), 0x0, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) 22:36:56 executing program 3: mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000340)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@version_u}], [{@fowner_eq}]}}) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, 0x0) 22:36:56 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f00000000c0)={'wg2\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r2}, 0x14) 22:36:56 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, 0x0, 0x0) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0xa867, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:36:56 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={0x0}}, 0x0) 22:36:56 executing program 5: openat$incfs(0xffffffffffffff9c, &(0x7f0000000100)='.log\x00', 0x410003, 0x0) 22:36:56 executing program 3: r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000240), r0) r1 = fork() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000200)=0xc) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000003bc0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)={0x3c, 0x16, 0x100, 0x0, 0x25dfdbfc, "", [@nested={0x10, 0x5, 0x0, 0x1, [@typed={0xc, 0x56, 0x0, 0x0, @u64=0x400}]}, @typed={0x14, 0x41, 0x0, 0x0, @ipv6=@remote}, @typed={0x8, 0x7f, 0x0, 0x0, @pid=r1}]}, 0x3c}, {&(0x7f00000000c0)={0x18, 0x2d, 0x1, 0x70bd2c, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @uid=0xee01}]}, 0x18}, {0x0}, {0x0}, {0x0}], 0x5, &(0x7f0000003b80)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, r2}}}], 0x20, 0x20008080}, 0x4000000) r3 = syz_open_dev$binderN(&(0x7f0000000240), 0x0, 0x800) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000300)={0x20, 0x0, &(0x7f0000000280)=[@increfs, @dead_binder_done, @release, @enter_looper], 0x1, 0x0, &(0x7f00000002c0)="9e"}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000003f80)={0x54, 0x0, &(0x7f0000003ec0)=[@transaction={0x40406300, {0x2, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x48, 0x18, &(0x7f0000003e00)={@fd, @flat=@binder={0x73622a85, 0x0, 0x1}, @fd={0x66642a85, 0x0, r3}}, &(0x7f0000003e80)={0x0, 0x18, 0x30}}}, @increfs={0x40046304, 0x3}, @decrefs={0x40046307, 0x1}], 0x28, 0x0, &(0x7f0000003f40)="d9f78d48d63946323f828c1e832febcecbedbfff7748d2f31621ce2fbfbdf34d57385151cbb37e7c"}) syz_genetlink_get_family_id$devlink(&(0x7f0000003c40), 0xffffffffffffffff) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000005c0)={0x0}) 22:36:56 executing program 2: recvmsg$can_bcm(0xffffffffffffffff, 0x0, 0x80000043) 22:36:56 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x5c, 0x0, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x5c}}, 0x0) 22:36:56 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x14, r1, 0x1, 0x0, 0x0, {0x64}}, 0x14}}, 0x0) 22:36:56 executing program 4: sched_getattr(0x0, &(0x7f0000000080)={0x38}, 0x38, 0x0) 22:36:56 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, 0x0, 0x0) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0xa867, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:36:56 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000000)={'wlan1\x00'}) 22:36:56 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x5c, 0x0, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x5c}}, 0x0) 22:36:57 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) recvfrom$l2tp(r0, 0x0, 0x0, 0x42, 0x0, 0x0) 22:36:57 executing program 3: modify_ldt$write2(0x11, &(0x7f00000000c0), 0x10) 22:36:57 executing program 4: getresgid(&(0x7f0000003300), &(0x7f0000003340), &(0x7f0000003380)) 22:36:57 executing program 2: socketpair(0x11, 0x0, 0x0, &(0x7f0000000040)) 22:36:57 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0xa867, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:36:57 executing program 3: socket(0xa, 0x3, 0x4) 22:36:57 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x5c, 0x0, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x5c}}, 0x0) 22:36:57 executing program 5: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$FBIOPUTCMAP(r0, 0x4605, &(0x7f0000000240)={0x0, 0x1, &(0x7f0000000100)=[0x0], 0x0, 0x0, 0x0}) 22:36:57 executing program 4: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$FBIOPUTCMAP(r0, 0x4605, &(0x7f0000000240)={0x0, 0x5, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180), &(0x7f00000001c0), 0x0}) 22:36:57 executing program 2: add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0) 22:36:57 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f000000aff8)='./file0\x00', 0x0, 0x0, 0x0) chdir(&(0x7f00000002c0)='./file0\x00') symlink(&(0x7f0000000140)='..', &(0x7f00000000c0)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 22:36:57 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x5c, r1, 0x0, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x5c}}, 0x0) 22:36:57 executing program 5: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$TIPC_IMPORTANCE(r0, 0x10f, 0x7f, 0x0, &(0x7f0000000100)) 22:36:57 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0xa867, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:36:57 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_ADD_KEY(r0, &(0x7f0000001980)={&(0x7f0000001880)={0x10, 0x0, 0xc759eb53}, 0xc, &(0x7f0000001940)={0x0, 0x51e8}}, 0x0) 22:36:57 executing program 4: add_key(&(0x7f0000000000)='dns_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) 22:36:57 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x5c, r1, 0x0, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x5c}}, 0x0) 22:36:58 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_ADD_KEY(r0, &(0x7f0000001980)={&(0x7f0000001880)={0x10, 0x0, 0x7}, 0xc, &(0x7f0000001940)={0x0, 0x484e}}, 0x0) 22:36:58 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_SEC_PARAMS(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000340)={0x20, r1, 0x21, 0x0, 0x0, {}, [@NL802154_ATTR_SEC_OUT_KEY_ID={0xc, 0x20, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}]}]}, 0x20}}, 0x0) 22:36:58 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0xa867, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:36:58 executing program 2: clock_gettime(0x8, &(0x7f0000001700)) 22:36:58 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x18, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_SEC_KEY={0x4, 0x6}]}, 0x18}}, 0x0) 22:36:58 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x1}, 0x14}}, 0x0) 22:36:58 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x5c, r1, 0x0, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x5c}}, 0x0) [ 451.776751][T17728] netlink: 'syz-executor.4': attribute type 6 has an invalid length. 22:36:58 executing program 3: socket(0x2, 0x0, 0x2b98) [ 451.863242][T17731] netlink: 'syz-executor.4': attribute type 6 has an invalid length. 22:36:58 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0xa867, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:36:58 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_ADD_KEY(r0, &(0x7f0000001980)={&(0x7f0000001880)={0x10, 0x0, 0xc759eb53}, 0x7fff9e18, &(0x7f0000001940)={0x0, 0x51e8}, 0x8}, 0x0) 22:36:58 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_ADD_KEY(r0, &(0x7f0000001980)={&(0x7f0000001880)={0x10, 0x0, 0x4}, 0xc, &(0x7f0000001940)={0x0, 0x4fd5}}, 0x0) 22:36:58 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x48, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_SEC_KEY={0x20, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0x14, 0x4, "3dcd7eed9fec42e8a0feca51ac5fe005"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}]}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x48}}, 0x0) 22:36:58 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x28}}, 0x0) 22:36:58 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x4) syz_genetlink_get_family_id$batadv(&(0x7f0000000000), r0) 22:36:58 executing program 2: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$SOUND_MIXER_READ_VOLUME(r0, 0x80044d08, &(0x7f0000000040)) 22:36:58 executing program 4: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000001380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) 22:36:58 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x28}}, 0x0) 22:36:58 executing program 5: openat$drirender128(0xffffffffffffff9c, &(0x7f0000000080), 0x4802, 0x0) 22:36:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0xa867, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:36:59 executing program 3: r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000140), 0x0) getpeername$tipc(r0, 0x0, 0x0) 22:36:59 executing program 2: r0 = socket(0xa, 0x3, 0x60) getsockopt$rose(r0, 0x104, 0x0, 0x0, 0x0) 22:36:59 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x28}}, 0x0) 22:36:59 executing program 5: r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x200000) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, 0x0, 0x0) 22:36:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0xa867, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:36:59 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x20, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x20}, 0x1, 0x4}, 0x0) 22:36:59 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_ADD_KEY(r0, &(0x7f0000001980)={&(0x7f0000001880)={0x10, 0x0, 0x7}, 0xc, &(0x7f0000001940)={0x0, 0x484e}}, 0x0) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$v7(0x0, 0x0, 0x0, 0x0, 0x0, 0x8080c1, 0x0) 22:36:59 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x48, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_KEY={0x20, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}]}]}, 0x48}}, 0x0) 22:36:59 executing program 2: socket$packet(0x11, 0x96a88f26ef70369b, 0x300) 22:36:59 executing program 5: perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xdd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000140), 0x82, 0x0) io_setup(0x9, &(0x7f0000000180)=0x0) io_submit(r1, 0x2, &(0x7f0000000340)=[&(0x7f0000000000)={0x4, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f00000001c0)="100000000300"/16, 0x10}]) 22:36:59 executing program 4: syz_mount_image$v7(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000001300), 0x8080c1, &(0x7f00000013c0)) 22:36:59 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x58, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_KEY={0x30, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x10, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_IMPLICIT={0x4}, @NL802154_KEY_ID_ATTR_MODE={0x8}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x58}}, 0x0) 22:36:59 executing program 3: request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0) 22:36:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(0xffffffffffffffff, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0xa867, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:36:59 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x48, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_KEY={0x20, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}]}]}, 0x48}}, 0x0) 22:36:59 executing program 5: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f0000000180)='asymmetric\x00', 0x0, 0x0, 0x0, r0) [ 453.282170][T17793] VFS: could not find a valid V7 on loop4. 22:36:59 executing program 3: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) 22:37:00 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x48, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_KEY={0x20, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}]}]}, 0x48}}, 0x0) 22:37:00 executing program 2: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) [ 453.506436][T17793] VFS: could not find a valid V7 on loop4. 22:37:00 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) sendto$l2tp(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 22:37:00 executing program 5: mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000340)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@version_u}], [{@subj_role={'subj_role', 0x3d, 'batadv\x00'}}]}}) 22:37:00 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af22, 0x0) [ 453.747353][T17815] ieee802154 phy0 wpan0: encryption failed: -22 22:37:00 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_KEY={0x2c, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:37:00 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(0xffffffffffffffff, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0xa867, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:37:00 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001600)) 22:37:00 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x13, 0xc031, 0xffffffffffffffff, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) 22:37:00 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_KEY={0x2c, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:37:00 executing program 5: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$FBIOPUTCMAP(r0, 0x4605, &(0x7f0000000240)={0x0, 0x1, &(0x7f0000000100)=[0x0], &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)}) 22:37:00 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) [ 454.208062][T17829] gfs2: not a GFS2 filesystem [ 454.416208][T17829] gfs2: not a GFS2 filesystem 22:37:01 executing program 5: openat$mice(0xffffffffffffff9c, &(0x7f0000000140), 0x92000) 22:37:01 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_KEY={0x2c, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:37:01 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() sched_setscheduler(0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) 22:37:01 executing program 4: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000080)={{0x3}}) 22:37:01 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(0xffffffffffffffff, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0xa867, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:37:01 executing program 5: r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000140), 0x0) getsockname$netlink(r0, 0x0, 0x0) 22:37:01 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x48, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_KEY={0x20, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x48}}, 0x0) 22:37:01 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_PHY={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x28}}, 0x0) 22:37:05 executing program 2: r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000280), 0x82002) write$usbip_server(r0, 0x0, 0x11d7) 22:37:05 executing program 3: request_key(&(0x7f0000000100)='cifs.spnego\x00', &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0) 22:37:05 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x48, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_KEY={0x20, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x48}}, 0x0) 22:37:05 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="b5"], 0x14}}, 0x0) 22:37:05 executing program 5: getitimer(0x2, &(0x7f0000000280)) 22:37:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, 0x0, 0x0) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0xa867, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:37:05 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000000c0)=0x8000016, 0x4) 22:37:05 executing program 4: syz_open_procfs$namespace(0x0, &(0x7f0000000440)='ns/uts\x00') 22:37:05 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x48, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_KEY={0x20, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x48}}, 0x0) 22:37:05 executing program 3: select(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x5}, 0x0, &(0x7f00000000c0)={0x77359400}) 22:37:05 executing program 2: r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r0, 0x800448d2, 0x0) 22:37:05 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x4}, 0x4) 22:37:05 executing program 5: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) getsockopt$netlink(r0, 0x10e, 0x0, 0x0, 0x0) 22:37:05 executing program 3: r0 = fork() ptrace$setopts(0x4206, r0, 0x9, 0x0) 22:37:05 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_KEY={0x2c, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:37:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, 0x0, 0x0) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0xa867, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:37:05 executing program 2: socketpair(0x23, 0x5, 0x0, &(0x7f00000000c0)) 22:37:06 executing program 4: sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(0xffffffffffffffff, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000340)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[], [{@uid_gt={'uid>', 0xee01}}]}}) 22:37:06 executing program 5: socketpair(0x23, 0x0, 0x1000000, &(0x7f0000000040)) 22:37:06 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_KEY={0x2c, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:37:06 executing program 2: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$SOUND_MIXER_WRITE_VOLUME(r0, 0xc0044d0c, &(0x7f0000000000)) 22:37:06 executing program 4: perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f00000004c0)=0x0) io_submit(r0, 0x1, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a000000, 0x2759, 0xd, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) 22:37:06 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000180), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) sendmsg$NL802154_CMD_NEW_INTERFACE(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x1c, r2, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 22:37:06 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_KEY={0x2c, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:37:06 executing program 5: r0 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r0, &(0x7f0000000880)={0x0, 0x0, &(0x7f0000000700)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x2102) 22:37:06 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, 0x0, 0x0) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0xa867, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:37:06 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000700)={'batadv_slave_1\x00'}) 22:37:06 executing program 2: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000100)={'syz', 0x0}, 0x0, r0) 22:37:06 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x5c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x5c}}, 0x0) 22:37:07 executing program 5: r0 = mq_open(&(0x7f0000000000)='&b\x00', 0x0, 0x62, &(0x7f0000000040)) clock_gettime(0x1, &(0x7f0000000180)={0x0, 0x0}) mq_timedreceive(r0, &(0x7f0000000080)=""/102, 0x66, 0x100000001, &(0x7f0000000140)={r1, r2+60000000}) 22:37:07 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_ACKREQ_DEFAULT(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xfffffff5, &(0x7f0000000080)={&(0x7f0000000140)={0x1c}, 0x1c}}, 0x0) 22:37:07 executing program 2: syz_mount_image$gfs2(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000380)=""/154, 0x9a) 22:37:07 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCGMASK(r0, 0x40086602, &(0x7f0000000140)={0x2ed207475c62882a, 0x0, 0x0}) 22:37:07 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x5c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x5c}}, 0x0) 22:37:07 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x101042) write$hidraw(r0, 0x0, 0x0) 22:37:07 executing program 4: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$SOUND_MIXER_WRITE_VOLUME(r0, 0xc0044d0c, 0x0) 22:37:07 executing program 2: syz_open_dev$sg(&(0x7f0000000140), 0xfffffffeffffffff, 0x200c00) 22:37:07 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0xa867, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:37:07 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x5c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x5c}}, 0x0) 22:37:07 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_SEC_KEY={0x4, 0x6}]}, 0x24}}, 0x0) 22:37:07 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001400)={[], [{@smackfsfloor={'smackfsfloor', 0x3d, '^$)-[\''}}, {@smackfsroot}]}) 22:37:07 executing program 4: syz_usb_connect(0x0, 0x7c7, &(0x7f0000000180)=ANY=[@ANYBLOB="12011001ef9667206104000abdad010203010902"], 0x0) 22:37:07 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) write$hidraw(r0, 0x0, 0x0) [ 461.346604][T18034] netlink: 'syz-executor.3': attribute type 6 has an invalid length. 22:37:08 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_KEY={0x2c, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:37:08 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0xa867, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 461.421330][T18041] netlink: 'syz-executor.3': attribute type 6 has an invalid length. [ 461.431798][T18036] gfs2: Unknown parameter 'smackfsfloor' 22:37:08 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x60801) ioctl$EVIOCGMASK(r0, 0xc0189436, &(0x7f0000000280)={0x0, 0x0, 0x0}) 22:37:08 executing program 2: syz_open_dev$evdev(0xfffffffffffffffc, 0x0, 0x40041) [ 461.521276][T18036] gfs2: Unknown parameter 'smackfsfloor' 22:37:08 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0xa0ef, 0x0) ioctl$EVIOCGMASK(r0, 0x5460, &(0x7f0000000280)={0x0, 0x0, 0x0}) 22:37:08 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_KEY={0x2c, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 461.750511][ T8440] usb 5-1: new high-speed USB device number 6 using dummy_hcd 22:37:08 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCGMASK(r0, 0x4020940d, &(0x7f0000000140)={0x1f, 0x0, 0x0}) 22:37:08 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCGMASK(r0, 0x4020940d, &(0x7f0000000280)={0x3, 0x0, 0x0}) 22:37:08 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0xa867, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:37:08 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_KEY={0x2c, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 462.077108][ T8440] usb 5-1: Using ep0 maxpacket: 32 [ 462.239604][ T8440] usb 5-1: config 0 has no interfaces? [ 462.449113][ T8440] usb 5-1: New USB device found, idVendor=0461, idProduct=0a00, bcdDevice=ad.bd [ 462.458373][ T8440] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 462.476344][ T8440] usb 5-1: Product: syz [ 462.482389][ T8440] usb 5-1: Manufacturer: syz [ 462.487023][ T8440] usb 5-1: SerialNumber: syz [ 462.507530][ T8440] usb 5-1: config 0 descriptor?? 22:37:09 executing program 4: r0 = syz_open_dev$evdev(0xfffffffffffffffc, 0x0, 0x40c0) ioctl$EVIOCSABS0(r0, 0x401845c0, 0x0) 22:37:09 executing program 5: syz_open_dev$evdev(0xfffffffffffffffc, 0x0, 0x840c0) 22:37:09 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0xa0ef, 0x0) ioctl$EVIOCGMASK(r0, 0x541b, &(0x7f0000000280)={0x0, 0x0, 0x0}) 22:37:09 executing program 2: syz_open_dev$evdev(0xfffffffffffffffc, 0x0, 0xfffffff6) 22:37:09 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:37:09 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(0xffffffffffffffff, &(0x7f0000847fff)='X', 0xa867, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 462.816456][ T8583] usb 5-1: USB disconnect, device number 6 [ 462.967896][ T25] audit: type=1800 audit(1627943829.575:21): pid=18095 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name=48C7C060 dev="sda1" ino=15197 res=0 errno=0 22:37:09 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0xa0ef, 0x0) ioctl$EVIOCGMASK(r0, 0x4020940d, &(0x7f0000000280)={0x3, 0x0, 0x0}) 22:37:09 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x40, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x20, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}]}]}, 0x40}}, 0x0) 22:37:09 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x2, &(0x7f0000000440)=@raw=[@map], &(0x7f0000000480)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 22:37:09 executing program 2: pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, 0x0) [ 463.102137][ T25] audit: type=1800 audit(1627943829.715:22): pid=18099 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name=48C7C060 dev="sda1" ino=14867 res=0 errno=0 22:37:09 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(0xffffffffffffffff, &(0x7f0000847fff)='X', 0xa867, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:37:09 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x205}, 0x40) 22:37:09 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x40, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x20, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}]}]}, 0x40}}, 0x0) 22:37:09 executing program 3: syz_open_dev$evdev(0xfffffffffffffffc, 0x0, 0x40440) 22:37:09 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0xa0ef, 0x0) ioctl$EVIOCGMASK(r0, 0xc0189436, &(0x7f0000000280)={0x0, 0x0, 0x0}) 22:37:10 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x101042) write$hidraw(r0, 0x0, 0x18) 22:37:10 executing program 4: shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000180)={{0x0, 0xee01, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}}) 22:37:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(0xffffffffffffffff, &(0x7f0000847fff)='X', 0xa867, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:37:10 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0x0, 0x0, 0x0, 0x120}, 0x40) 22:37:10 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x40, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x20, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}]}]}, 0x40}}, 0x0) 22:37:10 executing program 5: openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0x20000, 0x0) 22:37:10 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_MOD(r1, 0x2, r0, 0x0) 22:37:10 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = gettid() openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) tkill(r0, 0x36) 22:37:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, 0x0, 0x0, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:37:10 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x4c}}, 0x0) 22:37:10 executing program 3: perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x6) 22:37:10 executing program 2: bpf$BPF_MAP_GET_FD_BY_ID(0x10, &(0x7f0000000100)={0x0, 0x0, 0x4c9cfa9e467ee79d}, 0xc) 22:37:10 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x2000, &(0x7f00000002c0)) 22:37:10 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_VERDICT_BATCH(r0, &(0x7f0000004c00)={0x0, 0x0, &(0x7f0000004bc0)={&(0x7f0000004b80)={0x20, 0x3, 0x3, 0x201, 0x0, 0x0, {}, [@NFQA_VERDICT_HDR={0xc}]}, 0x20}}, 0x0) 22:37:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, 0x0, 0x0, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:37:10 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x4c}}, 0x0) 22:37:10 executing program 3: openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x440, 0x0) 22:37:10 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f00000000c0)="66b9800000c00f326635000800000f300f20c06635000001000f22c00f01df66b97e0a00000f32ba2000b8b993ef66b92008000066b88ab4000066ba000000000f30ba4300b8f3ffefba4000ec0f01c866b825e412760f23d80f21f86635000000700f23f8", 0x65}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000040)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 22:37:10 executing program 4: request_key(&(0x7f0000002500)='cifs.idmap\x00', &(0x7f0000002540)={'syz', 0x0}, 0x0, 0xfffffffffffffff8) 22:37:11 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x541b, 0x0) 22:37:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, 0x0, 0x0, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:37:11 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x4c}}, 0x0) 22:37:11 executing program 3: r0 = socket$vsock_stream(0x28, 0x1, 0x0) sendmmsg(r0, &(0x7f0000002340)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 22:37:11 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000540), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_TSINFO_GET(r0, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)={&(0x7f0000000740)={0x34, r1, 0x61d, 0x0, 0x0, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vxcan1\x00'}]}]}, 0x34}}, 0x0) 22:37:11 executing program 5: syz_io_uring_setup(0x3277, &(0x7f0000000300)={0x0, 0x0, 0x8}, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f00000007c0), &(0x7f0000000800)) 22:37:11 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x40, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x20, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x40}}, 0x0) 22:37:11 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x2, 0x3, 0x301, 0x0, 0x0, {}, [@NFQA_CFG_CMD={0x8}]}, 0x1c}}, 0x0) 22:37:11 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x6e) 22:37:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff), 0x0, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:37:11 executing program 4: socket$inet6(0xa, 0x3, 0x8) 22:37:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_mreqsrc(r0, 0x0, 0x26, &(0x7f00000003c0)={@loopback, @multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) 22:37:11 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x40, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x20, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x40}}, 0x0) 22:37:11 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$inet(r0, &(0x7f0000000480)={&(0x7f0000000000)={0x2, 0x4e20, @empty}, 0x10, &(0x7f0000000400)=[{&(0x7f0000000040)="17", 0x1}, {&(0x7f0000000140)='\'', 0x1}], 0x2, &(0x7f0000000440)=[@ip_tos_int={{0x14}}, @ip_tos_u8={{0x11}}], 0x30}, 0x8000) 22:37:11 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x2, 0x3, 0x3}, 0x14}}, 0x0) 22:37:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff), 0x0, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:37:11 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000001340), 0x0, &(0x7f00000013c0)={[{@shortname_mixed}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@fat=@discard}]}) 22:37:12 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000180)={'sit0\x00', 0x0}) 22:37:12 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000f40)=@bpf_tracing={0x1a, 0x3, &(0x7f0000000dc0)=@framed, &(0x7f0000000e00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xba49}, 0x78) 22:37:12 executing program 2: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) lseek(r0, 0x0, 0x3) 22:37:12 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x40, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x20, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x40}}, 0x0) 22:37:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff), 0x0, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 465.508810][T18213] FAT-fs (loop4): bogus number of reserved sectors [ 465.532929][T18213] FAT-fs (loop4): Can't find a valid FAT filesystem 22:37:12 executing program 5: r0 = socket$inet(0x2, 0x3, 0x80) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, 0x0, 0x0) [ 465.611172][T18213] FAT-fs (loop4): bogus number of reserved sectors [ 465.642190][T18213] FAT-fs (loop4): Can't find a valid FAT filesystem 22:37:12 executing program 3: bpf$BPF_BTF_GET_NEXT_ID(0x23, 0x0, 0x0) 22:37:12 executing program 2: request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)='%\x00', 0xfffffffffffffff9) 22:37:12 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x4c}}, 0x0) 22:37:12 executing program 4: add_key$fscrypt_v1(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "6ebd46aad5341c8c047b7df03c117810d5f733fe0996c2f86320bb9fd9e7ab503811f60a77b2212df23b661e7e4729ac716ca83919845ab8db87fc3d513ef18e"}, 0x48, 0xfffffffffffffffd) 22:37:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:37:12 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x4020940d, 0x0) 22:37:12 executing program 3: socketpair(0x26, 0x805, 0x5, &(0x7f0000000140)) 22:37:12 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@can_newroute={0x14, 0x18, 0x1}, 0x14}}, 0x0) 22:37:12 executing program 4: syz_open_dev$vcsa(&(0x7f0000000080), 0x0, 0x20040) 22:37:12 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x4c}}, 0x0) 22:37:12 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x18, 0x3, &(0x7f0000000300)=@framed, &(0x7f0000000340)='GPL\x00', 0x8, 0x98, &(0x7f0000000380)=""/152, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 22:37:12 executing program 3: socket$inet6(0xa, 0x0, 0x1034) 22:37:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:37:13 executing program 4: openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_io_uring_setup(0x4972, &(0x7f0000000080), &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, 0x0, 0x0) syz_io_uring_setup(0x1a48, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1}, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ff8000/0x2000)=nil, &(0x7f0000000200), &(0x7f0000000240)) 22:37:13 executing program 2: r0 = epoll_create1(0x0) fsetxattr$security_capability(r0, &(0x7f0000002080), &(0x7f00000020c0)=@v2, 0x14, 0x0) 22:37:13 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x4c}}, 0x0) 22:37:13 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001140)={0x18, 0x3, &(0x7f0000000000)=@raw=[@ldst={0x3}, @call, @jmp], &(0x7f0000000040)='syzkaller\x00', 0x6, 0x1000, &(0x7f0000000080)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 22:37:13 executing program 3: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0xc020660b, 0x0) 22:37:13 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:37:13 executing program 4: keyctl$search(0xa, 0x0, &(0x7f00000000c0)='.request_key_auth\x00', 0x0, 0x0) 22:37:13 executing program 2: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc4}, &(0x7f0000000080)={0x0, "4f87dbe075c5c906652553299a9f8c4727e55e4d79774485609ee0ca3efcf03bc15ad0fa927054d54380dd03436793cca1978e76db16731c31289a0887b8864f"}, 0x48, 0xfffffffffffffffe) add_key$fscrypt_v1(&(0x7f0000000300), 0x0, 0x0, 0x0, r0) 22:37:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:37:13 executing program 5: syz_io_uring_setup(0x4972, &(0x7f0000000080), &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, 0x0, 0x0) syz_io_uring_setup(0x1a48, &(0x7f0000000180), &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ff8000/0x2000)=nil, &(0x7f0000000200), &(0x7f0000000240)) 22:37:13 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000001800)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000040)={0x27c, 0x0, 0x0, 0x0, 0x0, "", [@nested={0xdb, 0x32, 0x0, 0x1, [@generic="ec79d822c086bfb1649cf44c7903a35edebd881a35c1755a2912d4dd9991546e85bca8698a5dd7f1e672cfe9b1f86335c7708aeb566442419bd50671fc95675cd7f62b19a8a98ebff6ccc1d56e906253051d55d97c7747279c3a94432ca9a3b82c65efabcae735b9ae0651a6a513db71393cc117c92a6152b29af19e857f2963543bc38f4e7c79a3efa5052f08833922d73e7ea297d1a62ce40a093d4f90af372a879a559fc74a46ad01b57e96d8e11ff9dd2499575af6cd18b2f016a223ad29133f9d875ab0b3a39b4a7b560d81e205d12ccc864add22"]}, @generic="88426e11a5a8b6a24e5f3814b87dc2b9c54e73f5f72f0ccf5abc992f8339bb488d7ce297", @generic="233df31c208abfc4142405241bb71cf39ab611d81250b9977837a32d765a2f9f69b9cf9f46bba5ae8c2716dc3c7af3c63406dd42b682cca53d771e2487573a5b747ea35680b49495ace9dcda3bd6cb217f1bb834f6453eacc682aa85fe6d1dee1abb4cc8ea5d22549889213167bca0aa4025d1d7649c8b37852ce332cc009058fb5f2e7be05391c63ea28345ce63", @typed={0xd9, 0x0, 0x0, 0x0, @binary="89d02f02aad43b9c73b9afe63941ed28879e03371fba484d01671d553ce7d7df234595c2b4004edaafab1d7f5adaa06ba73ec3b6955e15d241c890c76c44e0053b7262bea6dad9a1530771d8113af9f8adf2c1f9d22504739bbf1537338500d8bf7e80aa4cf86a400d1f654d533cf20ac8bf47fe437652639c775dadabb25293deac0b4a496fa99365e398d884c690c94853e11f9a3a2ecaa247097b4b74befbbcf85120a9eaea65619be8daee114f929215850ac5f15ce6bcdc4cd494c3af36c0c85313f88ba83fcd1dd1eb91b8b06ae089428688"}]}, 0x27c}, {&(0x7f00000002c0)={0xc38, 0x0, 0x0, 0x0, 0x0, "", [@generic="8d5ba5ff5b3cf97cc2efcc193f07501379d6092b8fed84dc274c82c410f3442965ea90e1b404f2e2eaa27e07af6d6efbe1fbb3515c8156d97d2bb02c62450e1ddf5ac9cefc7a8645e3db8f75306d96f675c71a2712b0e0603eab80cd38127b1561cba930d87a5c4f72ec4eba49c0cab5ca5de1f7b85ba543a352610e25d15563f55fa034dbffe4859e26050638c2d903b8343499afd9d8d0934ccbd699d0d9b0a94ed2385af989d53c898e02b700863d05390d6fb2f0802c7945a7ff911f2195369ecb7429", @typed={0x8, 0x0, 0x0, 0x0, @u32}, @generic="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"]}, 0xc38}, {&(0x7f0000001400)={0x10}, 0x10}], 0x3, 0x0, 0x0, 0x24000000}, 0x800) 22:37:13 executing program 4: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) lseek(r0, 0x0, 0x0) 22:37:13 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:37:13 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_EEE_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x14, r1, 0x1}, 0x14}}, 0x0) 22:37:13 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8981, 0x0) 22:37:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0x1, 0x3f00000000000000, 0x0, 0x0) 22:37:13 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:37:13 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8953, 0x0) 22:37:13 executing program 4: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_QUERY(r0, 0xc01864cb, &(0x7f0000000780)={0x0, 0x0}) 22:37:13 executing program 5: openat$zero(0xffffffffffffff9c, 0x0, 0x402000, 0x0) 22:37:14 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x4c}}, 0x0) 22:37:14 executing program 2: inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RSTATu(r0, &(0x7f0000000200)={0x78, 0x7d, 0x0, {{0x0, 0x5f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xb, '/dev/nvram\x00', 0xb, '/dev/nvram\x00', 0xb, '/dev/nvram\x00', 0xb, '/dev/nvram\x00'}, 0x4, '\'-!('}}, 0x78) 22:37:14 executing program 3: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) fsconfig$FSCONFIG_SET_BINARY(r0, 0x2, &(0x7f0000000040)='\x00', &(0x7f0000000080)=';', 0x1) 22:37:14 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5}, 0x40) 22:37:14 executing program 5: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000000), 0x0, 0x0, 0x0) 22:37:14 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x4c}}, 0x0) 22:37:14 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x28, 0xc, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x28}}, 0x0) 22:37:14 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0x1, 0x3f00000000000000, 0x0, 0x0) 22:37:15 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:37:15 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_GET_BYINDEX(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x24, 0xf, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_INDEX={0x6}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 22:37:15 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x4c}}, 0x0) 22:37:15 executing program 3: bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0xe8c8d53bb0cbc7d4}, 0x10) 22:37:15 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xaff2000abc34e4c2, &(0x7f0000001280)) 22:37:15 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000fc0)={0xec4, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="94e175e470bf8f64a65e23c4bd6d78cb334816365cfa7388c1996c4e42f8a8914cebb7c8f5157e47a2fd6dd1ae3731ec9c518c8530569e315d6df830a37214771783d6eb43403693f313c82a3100fe66b2651a0e0e0b358615ba083441921e72d568443ec3a505960db8a0e228661c80625fa7afdedae9ca8547fd11ec45d0cc8eb451bce724691cebddbbe0ab1550", @typed={0x8, 0x0, 0x0, 0x0, @pid=0xffffffffffffffff}, @typed={0x14, 0x0, 0x0, 0x0, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @typed={0x8, 0x0, 0x0, 0x0, @u32}, @generic="fe20d43fbc9fbbaec902df56a2e467c72192bf7cc4bd28cfa855249a77195ab8931761960d80c8c0ce4bbfd47bf5cdf5e8a47a7df90dfb7473d0ce84200cd86d5755619dc28587a30c5bf20f45ec1c3691a198441c6c2bc37ca77d0fe6d85174182adc067741558869441baadaf3dad6db25e7d15c8251adaaf42ad8fa10936cb86f3d3d9bced75a6875df6909c74cb2b467", @nested={0xd65, 0x0, 0x0, 0x1, [@generic="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"]}]}, 0xec4}}, 0x0) 22:37:15 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x48, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x48}}, 0x0) 22:37:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_mreqn(r0, 0x0, 0x0, &(0x7f0000000080)={@loopback, @empty}, &(0x7f0000001240)=0xfffffd24) 22:37:15 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) 22:37:15 executing program 2: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000002b00)={0x0}, 0x20) 22:37:15 executing program 4: getgroups(0x1, &(0x7f0000000080)=[0xee00]) [ 469.289712][ T25] audit: type=1326 audit(1627943835.905:23): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=18344 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665e9 code=0x0 22:37:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0x1, 0x3f00000000000000, 0x0, 0x0) 22:37:16 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x48, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x48}}, 0x0) 22:37:16 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100880, &(0x7f00000012c0)) 22:37:16 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x89a0, 0x0) 22:37:16 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x1000808, &(0x7f0000000100)={[{@fat=@tz_utc}]}) 22:37:16 executing program 4: openat$ptp0(0xffffffffffffff9c, &(0x7f0000000140), 0x109341, 0x0) 22:37:16 executing program 5: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000c80)={0x0}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000001040)={&(0x7f0000000ec0)={{0x14}, [@NFT_MSG_NEWOBJ={0x20, 0x12, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x7}, @NFT_OBJECT_TUNNEL=@NFTA_OBJ_NAME={0x9, 0x2, 'syz1\x00'}}, @NFT_MSG_DELCHAIN={0x84, 0x5, 0xa, 0x101, 0x0, 0x0, {0xa, 0x0, 0x9}, [@NFTA_CHAIN_TYPE={0xa, 0x7, 'route\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz0\x00'}, @NFTA_CHAIN_COUNTERS={0x58, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3000000000000000}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xddbbd5e}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x1}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x6}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x4}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x3f}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x1}]}]}, @NFT_MSG_NEWOBJ={0x3c, 0x12, 0xa, 0x401, 0x0, 0x0, {0x2, 0x0, 0x3}, @NFT_OBJECT_COUNTER=@NFTA_OBJ_DATA={0x28, 0x4, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xb27}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x800}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x9}]}}], {0x14}}, 0x108}, 0x1, 0x0, 0x0, 0x40}, 0x0) 22:37:16 executing program 4: sendmsg$unix(0xffffffffffffffff, &(0x7f00000034c0)={0x0, 0x0, &(0x7f0000003400)=[{&(0x7f00000002c0)="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", 0xcf5}], 0x1}, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000f40)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 469.887970][T18369] FAT-fs (loop2): bogus number of reserved sectors [ 469.911018][T18369] FAT-fs (loop2): Can't find a valid FAT filesystem 22:37:16 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x48, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x48}}, 0x0) 22:37:16 executing program 3: getgroups(0x2, &(0x7f0000000080)=[0x0, 0xee01]) setresgid(0x0, r0, 0x0) [ 470.018801][T18369] FAT-fs (loop2): bogus number of reserved sectors [ 470.078572][T18369] FAT-fs (loop2): Can't find a valid FAT filesystem 22:37:16 executing program 5: keyctl$reject(0x13, 0x0, 0x0, 0x489, 0x0) 22:37:16 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') 22:37:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0xa867, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 22:37:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$inet(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10, 0x0, 0x0, &(0x7f0000000100)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7}}], 0x18}, 0x0) 22:37:17 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:37:17 executing program 3: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000003000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, r0, 0x0) 22:37:17 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_opts(r0, 0x0, 0xd, 0x0, 0x0) 22:37:17 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@RTM_NEWMDB={0x38, 0x54, 0x1, 0x0, 0x0, {}, [@MDBA_SET_ENTRY={0x20}]}, 0x38}}, 0x0) 22:37:17 executing program 2: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000002b00)={&(0x7f0000002ac0)=""/6, 0x0, 0x1000, 0x0, 0x1}, 0x20) 22:37:17 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:37:17 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f000000ea40)=@bpf_lsm={0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:37:17 executing program 4: r0 = inotify_init() inotify_add_watch(r0, 0x0, 0xc000001c) 22:37:17 executing program 3: openat$vcsa(0xffffffffffffff9c, &(0x7f00000002c0), 0x40, 0x0) 22:37:18 executing program 2: openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0xb66c1, 0x0) 22:37:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0xa867, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 22:37:18 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:37:18 executing program 5: openat$nvram(0xffffffffffffff9c, 0x0, 0x410000, 0x0) 22:37:18 executing program 3: epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)={0x0, 0x4, 0x2, 0x1f, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x40000, 0x20000003}, 0x40) ioctl$KVM_SET_BOOT_CPU_ID(0xffffffffffffffff, 0xae78, &(0x7f0000000800)=0x2) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, &(0x7f0000000840)={0x74, 0x0, [0x7]}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000100)={'syztnl2\x00', &(0x7f0000000040)={'syztnl2\x00', 0x0, 0x700, 0x7, 0x2, 0x80, {{0x25, 0x4, 0x3, 0x13, 0x94, 0x64, 0x0, 0x2, 0x4, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, {[@noop, @end, @lsrr={0x83, 0x1b, 0xed, [@loopback, @dev={0xac, 0x14, 0x14, 0x39}, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @multicast2, @private=0xa010101]}, @cipso={0x86, 0x42, 0x3, [{0x5, 0xb, "f80fc0991bd9ff86b3"}, {0x5, 0x9, "6a960fb8877b36"}, {0x4, 0xb, "c51b9481cc0f19de58"}, {0x5, 0xb, "b83be8820d1391bfad"}, {0x5, 0x12, "16f7329da55278e746350176e0b62cfc"}]}, @rr={0x7, 0x1f, 0xda, [@dev={0xac, 0x14, 0x14, 0x20}, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @private=0xa010100, @broadcast, @empty, @loopback]}]}}}}}) openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x80, 0x0) 22:37:18 executing program 4: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f00000002c0), 0xa0442, 0x0) write$P9_RLOCK(r0, 0x0, 0x0) 22:37:18 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, &(0x7f00000000c0)) 22:37:18 executing program 5: syz_io_uring_setup(0x3764, &(0x7f0000000500), &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000580), &(0x7f00000005c0)) 22:37:18 executing program 3: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0xc0045878, 0x0) 22:37:18 executing program 1: clock_gettime(0x2, &(0x7f0000002d00)) 22:37:18 executing program 4: recvmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000005b80)) arch_prctl$ARCH_GET_GS(0x1004, &(0x7f0000000380)) [ 471.942906][ T25] audit: type=1326 audit(1627943838.555:24): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=18434 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665e9 code=0x0 22:37:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0xa867, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 22:37:18 executing program 1: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f00000002c0), 0xa0442, 0x0) write$P9_RLOCK(r0, &(0x7f0000000480)={0x8}, 0x8) 22:37:18 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001500)={0x11, 0x3, &(0x7f00000001c0)=@framed, &(0x7f00000000c0)='GPL\x00', 0x1, 0xbb, &(0x7f00000006c0)=""/187, 0x0, 0xf, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 22:37:18 executing program 5: io_setup(0x8, &(0x7f0000000080)=0x0) io_cancel(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) 22:37:18 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e22, @local}, 0x10) 22:37:18 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) fsetxattr$security_evm(r0, &(0x7f000000ad80), &(0x7f000000adc0)=@v2, 0x9, 0x0) 22:37:19 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x2, &(0x7f0000000440)=@raw=[@map], &(0x7f0000000480)='GPL\x00', 0x0, 0xa1, &(0x7f00000004c0)=""/161, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 472.749742][ T25] audit: type=1326 audit(1627943839.365:25): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=18434 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665e9 code=0x0 22:37:19 executing program 2: fanotify_mark(0xffffffffffffffff, 0x6e, 0x40001009, 0xffffffffffffffff, 0x0) 22:37:19 executing program 0: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f00000006c0)=[{&(0x7f0000000340)='z', 0x1, 0x1000}, {&(0x7f0000000680)='\n', 0x1, 0xfffffffffffffa4f}], 0x0, 0x0) 22:37:19 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, &(0x7f00000000c0)={0x0, 0x0, 0xffffffffffffffff, 0xd2}) 22:37:19 executing program 5: openat$vcsa(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) 22:37:19 executing program 1: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) preadv(r0, &(0x7f0000000100)=[{&(0x7f0000000000)=""/202, 0xca}], 0x1, 0x101, 0x0) 22:37:19 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, 0x0, 0x0) [ 472.879197][ T25] audit: type=1326 audit(1627943839.495:26): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=18467 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665e9 code=0x0 [ 472.899676][T18472] loop0: detected capacity change from 0 to 16378 22:37:19 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x54, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x40) 22:37:19 executing program 4: pipe(0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, &(0x7f0000000480)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 473.007168][T18472] loop0: detected capacity change from 0 to 16378 22:37:19 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002180)={0x0, &(0x7f00000020c0)=""/184, 0x0, 0xb8}, 0x20) 22:37:19 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x1, &(0x7f0000000000)=@raw=[@jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff0}], &(0x7f0000000040)='syzkaller\x00', 0x2, 0xe4, &(0x7f0000000140)=""/228, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 22:37:19 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) connect$unix(r0, &(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x6e) 22:37:19 executing program 2: syz_genetlink_get_family_id$batadv(&(0x7f0000005080), 0xffffffffffffffff) 22:37:19 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0xa, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0x10, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP2={0xc, 0x14, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @local}}]}]}, 0x24}}, 0x0) 22:37:19 executing program 5: openat2$dir(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)={0x40041, 0x0, 0x4}, 0x18) [ 473.705200][ T25] audit: type=1326 audit(1627943840.305:27): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=18467 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665e9 code=0x0 22:37:20 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x13, 0x8, 0x43, 0x0, 0x20, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5}, 0x40) 22:37:20 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x1c5f0c77157827e6, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 22:37:20 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000540), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_TSINFO_GET(r0, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)={&(0x7f0000000740)={0x24, r1, 0x61d, 0x0, 0x0, {}, [@HEADER={0x4}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x24}}, 0x0) 22:37:20 executing program 0: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) pwrite64(r0, 0x0, 0x0, 0x0) 22:37:20 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f00000000c0)="66b9800000c00f326635000800000f300f20c06635000001000f22c00f01df66b97e0a00000f32ba2000b8b993ef66b92008000066b88ab4000066ba000000000f30ba4300b8f3ffefba4000ec0f01c866b825e412760f23d80f21f86635000000700f23f8", 0x65}], 0x1, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000040)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r4, 0x0) 22:37:20 executing program 5: socket$netlink(0x10, 0x3, 0xd1e557f59f7a45c7) 22:37:20 executing program 5: keyctl$search(0xa, 0x0, &(0x7f0000000100)='logon\x00', 0x0, 0x0) 22:37:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_mreqsrc(r0, 0x0, 0x0, 0x0, 0x0) 22:37:20 executing program 1: request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0xfffffffffffffffd) 22:37:20 executing program 2: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$packet(r0, 0x0, 0x0) 22:37:20 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) ppoll(&(0x7f0000001200)=[{r0}], 0x1, &(0x7f0000001240)={0x0, 0x3938700}, 0x0, 0x0) 22:37:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_mreqn(r0, 0x0, 0x20, 0x0, &(0x7f0000000200)) 22:37:20 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000008c0)={0x6, 0x4, 0x2, 0x1f, 0x0, 0x1}, 0x40) 22:37:20 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f00000014c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001480)={&(0x7f0000000740)={0x14}, 0x14}}, 0x0) 22:37:20 executing program 5: bpf$BPF_BTF_GET_NEXT_ID(0x15, 0x0, 0x0) 22:37:20 executing program 2: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) fsconfig$FSCONFIG_SET_BINARY(r0, 0x2, &(0x7f0000000040)='\x00', &(0x7f0000000080), 0x0) 22:37:21 executing program 0: syz_io_uring_setup(0x0, &(0x7f0000000180), &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000240)) 22:37:21 executing program 4: syz_open_procfs(0x0, &(0x7f0000000240)='attr/fscreate\x00') 22:37:21 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) recvfrom$packet(r0, &(0x7f0000000000)=""/243, 0xf3, 0x0, 0x0, 0x0) 22:37:21 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8982, 0x0) 22:37:21 executing program 5: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x5451, 0x0) 22:37:21 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) close_range(r1, r2, 0x0) 22:37:21 executing program 0: keyctl$search(0xa, 0x0, &(0x7f0000000100)='logon\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0) 22:37:21 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_PROTOCOL(r0, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000c80)={&(0x7f0000000c00)={0x14}, 0x14}}, 0x0) 22:37:21 executing program 4: bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0xfffffffffffffe6a) 22:37:21 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f00000008c0)={0x6, 0x4, 0x2, 0x1f, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x40000, 0x20000003}, 0x40) 22:37:21 executing program 2: bpf$BPF_BTF_GET_NEXT_ID(0x9, 0x0, 0x0) 22:37:21 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000008c0)={0x6, 0x0, 0x0, 0x1f, 0x0, 0x1}, 0x40) 22:37:21 executing program 3: r0 = socket$nl_rdma(0x10, 0x3, 0x14) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, 0x0, 0x0) 22:37:21 executing program 0: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100), 0xc) r0 = socket$xdp(0x2c, 0x3, 0x0) mmap$xdp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) 22:37:21 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x8000000) 22:37:21 executing program 5: syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000006c0), 0x0, &(0x7f0000000780)={[{@fat=@gid={'gid', 0x3d, 0xee00}}]}) 22:37:21 executing program 2: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) preadv(r0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/70, 0x46}, {&(0x7f0000001300)=""/4096, 0x1000}], 0x2, 0x0, 0x0) 22:37:21 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000500)={'ip6tnl0\x00', &(0x7f0000000480)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @remote}}}) 22:37:21 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000240)) 22:37:21 executing program 0: pselect6(0x0, 0x0, &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000640)={0x0, 0x3938700}, 0x0) 22:37:21 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000f, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="00000000000900000c000000dff4ef821ec34de5a68f275e28ea4831010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000012400)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000140)={[{@init_itable_val}]}) 22:37:21 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) read$FUSE(r0, &(0x7f0000000fc0)={0x2020}, 0x2020) [ 475.182670][T18588] FAT-fs (loop5): bogus number of reserved sectors [ 475.218283][T18588] FAT-fs (loop5): Can't find a valid FAT filesystem 22:37:21 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg(r0, &(0x7f0000005d00)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, 0x0}}], 0x1, 0x0) 22:37:21 executing program 3: socket$inet(0x2, 0x0, 0xffffffff) [ 475.289990][T18588] FAT-fs (loop5): bogus number of reserved sectors [ 475.296712][T18588] FAT-fs (loop5): Can't find a valid FAT filesystem 22:37:22 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x10, 0x3, &(0x7f0000000040)=@framed, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 22:37:22 executing program 4: prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x1) [ 475.444236][T18610] loop2: detected capacity change from 0 to 1024 22:37:22 executing program 1: bpf$BPF_MAP_GET_FD_BY_ID(0x23, &(0x7f0000000100)={0x0, 0x0, 0x4c9cfa9e467ee79d}, 0xc) 22:37:22 executing program 0: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x5460, 0x0) 22:37:22 executing program 3: r0 = fsopen(&(0x7f0000000000)='fusectl\x00', 0x0) fsmount(r0, 0x0, 0x5) [ 475.561849][T18610] EXT4-fs error (device loop2): ext4_orphan_get:1414: comm syz-executor.2: bad orphan inode 12 [ 475.594028][T18610] ext4_test_bit(bit=11, block=4) = 0 [ 475.604618][T18610] EXT4-fs (loop2): mounted filesystem without journal. Opts: init_itable=0x0000000000000000,,errors=continue. Quota mode: none. 22:37:22 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8980, 0x0) 22:37:22 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) sendmsg$AUDIT_SIGNAL_INFO(r0, 0x0, 0xc800) syz_mount_image$nfs4(&(0x7f0000000240), 0x0, 0x1, 0x3, &(0x7f00000006c0)=[{&(0x7f00000002c0), 0x0, 0x101}, {0x0, 0x0, 0x5}, {0x0}], 0x0, &(0x7f0000000780)={[{'/*!!$%/-,*\xaf}-8 '}, {'\'!,\')'}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@fsmagic}, {@appraise_type}, {@smackfshat={'smackfshat', 0x3d, '/dev/full\x00'}}]}) accept(0xffffffffffffffff, &(0x7f00000010c0)=@nfc_llcp, &(0x7f0000001140)=0x80) 22:37:22 executing program 3: syz_mount_image$nfs4(0x0, 0x0, 0x0, 0x1, &(0x7f00000006c0)=[{&(0x7f00000002c0)="1a", 0x1}], 0x0, 0x0) 22:37:22 executing program 2: syz_mount_image$nfs4(&(0x7f0000000240), &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)) 22:37:22 executing program 1: futex(&(0x7f0000000080), 0x4, 0x0, &(0x7f00000000c0)={0x0, 0x3938700}, &(0x7f0000000100), 0x0) 22:37:22 executing program 5: syz_mount_image$nfs4(0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0), 0x0, 0x0) 22:37:22 executing program 0: openat$zero(0xffffffffffffff9c, &(0x7f000000aa00), 0x1030c2, 0x0) [ 475.861682][T18633] loop4: detected capacity change from 0 to 1 22:37:22 executing program 1: futex(0x0, 0x8b, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) [ 475.960920][T18651] loop4: detected capacity change from 0 to 1 22:37:22 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_PROBE_MESH_LINK(r0, &(0x7f0000001c00)={0x0, 0x0, &(0x7f0000001bc0)={&(0x7f0000000380)={0xec4, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_FRAME={0x286, 0x33, @mgmt_frame=@assoc_resp={@with_ht={{{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, {0x80}, @broadcast, @broadcast, @initial, {0x6, 0x3}}, @ver_80211n={0x0, 0x53c5, 0x3, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0x124, 0x55, @default, @val={0x1, 0x4, [{0x0, 0x1}, {0x6, 0x1}, {0x6c, 0x1}, {0x12, 0x1}]}, @val={0x2d, 0x1a, {0x10, 0x3, 0x2, 0x0, {0x9, 0x2, 0x0, 0x9, 0x0, 0x1, 0x0, 0x1}, 0x8, 0x20, 0x1}}, [{0xdd, 0xbd, "b2a6ebb464553a562694b5747cbb292ec95fbaab13511cc331fc6dac51c5ffac61d95757a99b3bac49319142bd32508757b9dd9631c4855c407fbcfb60d63f8efa74318c80e87ffa9a0d270b9ac3efdd87133db80f202f8297ff6a5e8b12e3c1ecb72f29470dc2a1f58996203cb32a3fb2db0f834ae5647a81c84b2c4a516e2d6c098619283da021a8852a62b23032c3ea21138ac9f1c329c2b1ce50d49701e72091327ef7e785f411044e251e19a7437a0c021585ca47893aea8fa1ab"}, {0xdd, 0xf, "5dddd9f69bd4cc4f38311a65b52527"}, {0xdd, 0xf6, "941c71dc4b7c49048704fe0e775b0d78326d9c037a14a00af797e86c69a41042165a73b934ba74453dddc74d09782562883e302b7210ce75ec3594ba52eb6485f236c4bd1a1c1834a0e2900d2bd8b8e925176993db1c5da50f8efb789ccbc33da2276262a090c0259c1bf5d1d20e406ba4c6e8196aa287adce8fcfffeae6ce95e580c4b949ed921cb37975ae60ccf2f30a1b0735c992365fb182f5bdd8c92526abee7a5cc798a7663b9397bc6274aba66414a61bf47f4ef3cd7185e4b407d1645a4065dc608e8ce9f12ee8aac9be9d1dafc7275393d367cf23857179c2d31b6290f1d8f5453547c30aeb76fd8d15ed21de67148446b3"}, {0xdd, 0x74, "a74f8326b1cb0ed1aab0b4d388a5a776a0c030ab06acbff734d924709bcb0314c249e6b32fecee00a33a87be8b2e80413bac87533c4744975c3f9c1e6f98c54e7501efb79ec945e043f4122d0d3ddfc1841bcaa3520acea2e0c60cf2eee328f11df502e74a8e4f725a3c3d03cce1a1b91975c83d"}]}}, @NL80211_ATTR_FRAME={0x24, 0x33, @mgmt_frame=@action_no_ack={@with_ht={{{0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x1, 0x1}, {0x7f01}, @device_b, @device_a, @random="30349edd292b", {0x1, 0x2}}, @ver_80211n={0x0, 0x36, 0x3, 0x0, 0x0, 0x2, 0x1, 0x0, 0x1}}, @sa_query_req}}, @NL80211_ATTR_FRAME={0x14b, 0x33, @mgmt_frame=@probe_request={@with_ht={{{0x0, 0x0, 0x4, 0x0, 0x0, 0x1}, {0x646c}, @device_a, @broadcast, @from_mac=@broadcast, {0x5, 0x20}}, @ver_80211n={0x0, 0x3, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1}}, @void, @val={0x1, 0x1, [{0x6}]}, @void, @void, @void, [{0xdd, 0x9f, "3b7b17c162663f574576a94259467d9eea13bc11883bf26b2cef2c6c5ef5c2c1bc0e5eb751a3d6d839a185df6c4d45a51033c285a584e044d9886e9ecfbeb8b6e87ae604279cef39230dbf6ac8212280ef0e07f01b29a32229213d5f76951351c409b14840569f9f32077be5bf2c7745a4e1b62b47c93667549eca98f68526d24f25ae43ceffe2cd9abe2c31ac41446182b69472d268174f2d693b52a47a45"}, {0xdd, 0x1c, "f5b0e90c8a8554236b6f1d60d6353a0634c5333ea0fa707c040115e9"}, {0xdd, 0x67, "4b4441f74dbb489e309cadc582f716928dd648df626500fef1d29bb191b3d8867213b871b502701fc5631c1eea36511045ecd0f4c3939b691c5ee269b8f026b16ea16d3a07d6c7cfb67c780264224d4deb2feb4a070db5f805a65449050674d3c4382dad533f07"}]}}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_FRAME={0xaa0, 0x33, @data_frame={@no_qos=@type01, @a_msdu=[{@broadcast, @device_b, 0xa73, "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"}]}}]}, 0xec4}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) 22:37:22 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000400)=[{0x0, 0x0, 0xfffffffffffffffe}]) socket$alg(0x26, 0x5, 0x0) 22:37:22 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_TTY_GET(r0, &(0x7f0000004180)={&(0x7f00000040c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000004140)={&(0x7f0000004100)={0x10}, 0x10}}, 0x0) 22:37:22 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)) 22:37:22 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000e80), 0x0, 0x0) symlinkat(&(0x7f0000000e40)='./file0\x00', r0, &(0x7f0000000ec0)='./file0\x00') 22:37:22 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_ADD(r0, 0x0, 0x0) 22:37:22 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_PROBE_MESH_LINK(r0, &(0x7f0000001c00)={0x0, 0x0, &(0x7f0000001bc0)={&(0x7f0000000380)={0xec4, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_FRAME={0x285, 0x33, @mgmt_frame=@assoc_resp={@with_ht={{{}, {}, @broadcast, @broadcast}}, 0x0, 0x0, @default, @val={0x1, 0x3, [{}, {}, {}]}, @val={0x2d, 0x1a}, [{0xdd, 0xbd, "b2a6ebb464553a562694b5747cbb292ec95fbaab13511cc331fc6dac51c5ffac61d95757a99b3bac49319142bd32508757b9dd9631c4855c407fbcfb60d63f8efa74318c80e87ffa9a0d270b9ac3efdd87133db80f202f8297ff6a5e8b12e3c1ecb72f29470dc2a1f58996203cb32a3fb2db0f834ae5647a81c84b2c4a516e2d6c098619283da021a8852a62b23032c3ea21138ac9f1c329c2b1ce50d49701e72091327ef7e785f411044e251e19a7437a0c021585ca47893aea8fa1ab"}, {0xdd, 0xf, "5dddd9f69bd4cc4f38311a65b52527"}, {0xdd, 0xf6, "941c71dc4b7c49048704fe0e775b0d78326d9c037a14a00af797e86c69a41042165a73b934ba74453dddc74d09782562883e302b7210ce75ec3594ba52eb6485f236c4bd1a1c1834a0e2900d2bd8b8e925176993db1c5da50f8efb789ccbc33da2276262a090c0259c1bf5d1d20e406ba4c6e8196aa287adce8fcfffeae6ce95e580c4b949ed921cb37975ae60ccf2f30a1b0735c992365fb182f5bdd8c92526abee7a5cc798a7663b9397bc6274aba66414a61bf47f4ef3cd7185e4b407d1645a4065dc608e8ce9f12ee8aac9be9d1dafc7275393d367cf23857179c2d31b6290f1d8f5453547c30aeb76fd8d15ed21de67148446b3"}, {0xdd, 0x74, "a74f8326b1cb0ed1aab0b4d388a5a776a0c030ab06acbff734d924709bcb0314c249e6b32fecee00a33a87be8b2e80413bac87533c4744975c3f9c1e6f98c54e7501efb79ec945e043f4122d0d3ddfc1841bcaa3520acea2e0c60cf2eee328f11df502e74a8e4f725a3c3d03cce1a1b91975c83d"}]}}, @NL80211_ATTR_FRAME={0x24, 0x33, @mgmt_frame=@action_no_ack={@with_ht={{{}, {}, @device_b, @device_a, @random="30349edd292b"}}, @sa_query_req}}, @NL80211_ATTR_FRAME={0x149, 0x33, @mgmt_frame=@probe_request={@with_ht={{{}, {}, @device_a, @broadcast, @from_mac=@broadcast}}, @void, @val, @void, @void, @void, [{0xdd, 0x9f, "3b7b17c162663f574576a94259467d9eea13bc11883bf26b2cef2c6c5ef5c2c1bc0e5eb751a3d6d839a185df6c4d45a51033c285a584e044d9886e9ecfbeb8b6e87ae604279cef39230dbf6ac8212280ef0e07f01b29a32229213d5f76951351c409b14840569f9f32077be5bf2c7745a4e1b62b47c93667549eca98f68526d24f25ae43ceffe2cd9abe2c31ac41446182b69472d268174f2d693b52a47a45"}, {0xdd, 0x1c, "f5b0e90c8a8554236b6f1d60d6353a0634c5333ea0fa707c040115e9"}, {0xdd, 0x66, "4b4441f74dbb489e309cadc582f716928dd648df626500fef1d29bb191b3d8867213b871b502701fc5631c1eea36511045ecd0f4c3939b691c5ee269b8f026b16ea16d3a07d6c7cfb67c780264224d4deb2feb4a070db5f805a65449050674d3c4382dad533f"}]}}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_FRAME={0xaa0, 0x33, @data_frame={@no_qos=@type01, @a_msdu=[{@broadcast, @device_b, 0xa73, "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"}]}}]}, 0xec4}}, 0x0) [ 476.276711][T18682] loop0: detected capacity change from 0 to 16383 22:37:22 executing program 4: syz_open_dev$vcsn(&(0x7f000000a840), 0x0, 0x149201) 22:37:23 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_PROBE_MESH_LINK(r0, &(0x7f0000001c00)={0x0, 0x0, &(0x7f0000001bc0)={&(0x7f0000000380)={0xec4, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_FRAME={0x285, 0x33, @mgmt_frame=@assoc_resp={@with_ht={{{}, {}, @broadcast, @broadcast}}, 0x0, 0x0, @default, @val={0x1, 0x3, [{}, {}, {}]}, @val={0x2d, 0x1a}, [{0xdd, 0xbd, "b2a6ebb464553a562694b5747cbb292ec95fbaab13511cc331fc6dac51c5ffac61d95757a99b3bac49319142bd32508757b9dd9631c4855c407fbcfb60d63f8efa74318c80e87ffa9a0d270b9ac3efdd87133db80f202f8297ff6a5e8b12e3c1ecb72f29470dc2a1f58996203cb32a3fb2db0f834ae5647a81c84b2c4a516e2d6c098619283da021a8852a62b23032c3ea21138ac9f1c329c2b1ce50d49701e72091327ef7e785f411044e251e19a7437a0c021585ca47893aea8fa1ab"}, {0xdd, 0xf, "5dddd9f69bd4cc4f38311a65b52527"}, {0xdd, 0xf6, "941c71dc4b7c49048704fe0e775b0d78326d9c037a14a00af797e86c69a41042165a73b934ba74453dddc74d09782562883e302b7210ce75ec3594ba52eb6485f236c4bd1a1c1834a0e2900d2bd8b8e925176993db1c5da50f8efb789ccbc33da2276262a090c0259c1bf5d1d20e406ba4c6e8196aa287adce8fcfffeae6ce95e580c4b949ed921cb37975ae60ccf2f30a1b0735c992365fb182f5bdd8c92526abee7a5cc798a7663b9397bc6274aba66414a61bf47f4ef3cd7185e4b407d1645a4065dc608e8ce9f12ee8aac9be9d1dafc7275393d367cf23857179c2d31b6290f1d8f5453547c30aeb76fd8d15ed21de67148446b3"}, {0xdd, 0x74, "a74f8326b1cb0ed1aab0b4d388a5a776a0c030ab06acbff734d924709bcb0314c249e6b32fecee00a33a87be8b2e80413bac87533c4744975c3f9c1e6f98c54e7501efb79ec945e043f4122d0d3ddfc1841bcaa3520acea2e0c60cf2eee328f11df502e74a8e4f725a3c3d03cce1a1b91975c83d"}]}}, @NL80211_ATTR_FRAME={0x24, 0x33, @mgmt_frame=@action_no_ack={@with_ht={{{}, {}, @device_b, @device_a, @random="30349edd292b"}}, @sa_query_req}}, @NL80211_ATTR_FRAME={0x149, 0x33, @mgmt_frame=@probe_request={@with_ht={{{}, {}, @device_a, @broadcast, @from_mac=@broadcast}}, @void, @val, @void, @void, @void, [{0xdd, 0x9f, "3b7b17c162663f574576a94259467d9eea13bc11883bf26b2cef2c6c5ef5c2c1bc0e5eb751a3d6d839a185df6c4d45a51033c285a584e044d9886e9ecfbeb8b6e87ae604279cef39230dbf6ac8212280ef0e07f01b29a32229213d5f76951351c409b14840569f9f32077be5bf2c7745a4e1b62b47c93667549eca98f68526d24f25ae43ceffe2cd9abe2c31ac41446182b69472d268174f2d693b52a47a45"}, {0xdd, 0x1b, "f5b0e90c8a8554236b6f1d60d6353a0634c5333ea0fa707c040115"}, {0xdd, 0x67, "4b4441f74dbb489e309cadc582f716928dd648df626500fef1d29bb191b3d8867213b871b502701fc5631c1eea36511045ecd0f4c3939b691c5ee269b8f026b16ea16d3a07d6c7cfb67c780264224d4deb2feb4a070db5f805a65449050674d3c4382dad533f07"}]}}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_FRAME={0xaa0, 0x33, @data_frame={@no_qos=@type01, @a_msdu=[{@broadcast, @device_b, 0xa73, "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"}]}}]}, 0xec4}}, 0x0) 22:37:23 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 22:37:23 executing program 1: syz_read_part_table(0x0, 0x2, &(0x7f0000000400)=[{0x0, 0x0, 0xfffffffffffffffe}, {0x0}]) [ 476.418350][T18682] loop0: detected capacity change from 0 to 16383 22:37:23 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_PROBE_MESH_LINK(r0, &(0x7f0000001c00)={0x0, 0x0, &(0x7f0000001bc0)={&(0x7f0000000380)={0xec4, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_FRAME={0x285, 0x33, @mgmt_frame=@assoc_resp={@with_ht={{{}, {}, @broadcast, @broadcast}}, 0x0, 0x0, @default, @val={0x1, 0x3, [{}, {}, {}]}, @val={0x2d, 0x1a}, [{0xdd, 0xbd, "b2a6ebb464553a562694b5747cbb292ec95fbaab13511cc331fc6dac51c5ffac61d95757a99b3bac49319142bd32508757b9dd9631c4855c407fbcfb60d63f8efa74318c80e87ffa9a0d270b9ac3efdd87133db80f202f8297ff6a5e8b12e3c1ecb72f29470dc2a1f58996203cb32a3fb2db0f834ae5647a81c84b2c4a516e2d6c098619283da021a8852a62b23032c3ea21138ac9f1c329c2b1ce50d49701e72091327ef7e785f411044e251e19a7437a0c021585ca47893aea8fa1ab"}, {0xdd, 0xf, "5dddd9f69bd4cc4f38311a65b52527"}, {0xdd, 0xf6, "941c71dc4b7c49048704fe0e775b0d78326d9c037a14a00af797e86c69a41042165a73b934ba74453dddc74d09782562883e302b7210ce75ec3594ba52eb6485f236c4bd1a1c1834a0e2900d2bd8b8e925176993db1c5da50f8efb789ccbc33da2276262a090c0259c1bf5d1d20e406ba4c6e8196aa287adce8fcfffeae6ce95e580c4b949ed921cb37975ae60ccf2f30a1b0735c992365fb182f5bdd8c92526abee7a5cc798a7663b9397bc6274aba66414a61bf47f4ef3cd7185e4b407d1645a4065dc608e8ce9f12ee8aac9be9d1dafc7275393d367cf23857179c2d31b6290f1d8f5453547c30aeb76fd8d15ed21de67148446b3"}, {0xdd, 0x74, "a74f8326b1cb0ed1aab0b4d388a5a776a0c030ab06acbff734d924709bcb0314c249e6b32fecee00a33a87be8b2e80413bac87533c4744975c3f9c1e6f98c54e7501efb79ec945e043f4122d0d3ddfc1841bcaa3520acea2e0c60cf2eee328f11df502e74a8e4f725a3c3d03cce1a1b91975c83d"}]}}, @NL80211_ATTR_FRAME={0x24, 0x33, @mgmt_frame=@action_no_ack={@with_ht={{{}, {}, @device_b, @device_a, @random="30349edd292b"}}, @sa_query_req}}, @NL80211_ATTR_FRAME={0x149, 0x33, @mgmt_frame=@probe_request={@with_ht={{{0x0, 0x0, 0x4, 0x0, 0x0, 0x1}, {0x646c}, @device_a, @broadcast, @from_mac=@broadcast, {0x5, 0x20}}}, @void, @val, @void, @void, @void, [{0xdd, 0x9f, "3b7b17c162663f574576a94259467d9eea13bc11883bf26b2cef2c6c5ef5c2c1bc0e5eb751a3d6d839a185df6c4d45a51033c285a584e044d9886e9ecfbeb8b6e87ae604279cef39230dbf6ac8212280ef0e07f01b29a32229213d5f76951351c409b14840569f9f32077be5bf2c7745a4e1b62b47c93667549eca98f68526d24f25ae43ceffe2cd9abe2c31ac41446182b69472d268174f2d693b52a47a45"}, {0xdd, 0x1c, "f5b0e90c8a8554236b6f1d60d6353a0634c5333ea0fa707c040115e9"}, {0xdd, 0x66, "4b4441f74dbb489e309cadc582f716928dd648df626500fef1d29bb191b3d8867213b871b502701fc5631c1eea36511045ecd0f4c3939b691c5ee269b8f026b16ea16d3a07d6c7cfb67c780264224d4deb2feb4a070db5f805a65449050674d3c4382dad533f"}]}}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_FRAME={0xaa0, 0x33, @data_frame={@no_qos=@type01, @a_msdu=[{@broadcast, @device_b, 0xa74, "f759b8a8cfb8e94fe2374ef5ccc5c64fc4f788e9f663ed232f708ee13c7dbc1cee5cd2b29be9cf3afa8eab58b5a4e154b0a87f6107187cd027e4fa6402eeab78b096889c17d5a9c0dd5489c5bd3dd6fe7749f4366448bc437324eaea77bc76f658aa76e5f5105d4184e8f1bc73ac437a175a8defca5aec836c89986ec9e9e34487301fb7199dcba836c2290ee0830bb3a077e208bd9c2359b5954ffee69f35b534817fc9742d0bbdb64b46353c056758d717ddcaf89aea72c55134f9618660faed93f087c2a5b35d6a51bbefb612edd3fdca796939f3a765feebf92ad5f6384d67b0270b2b103ab93b3e13109eef7a50bcc127678231a93a71dad81cc7a236d06b7e856c8b811a6dc6a1940ab89758ebfa31fa3e883c062ef4f26b107a7249a6939d80f688c521a5d917ea74e66319ab561269911d640af1baea9cb348d1cd8577d9cabcc17eae8f21ebedacac43454b18e39e0382d7022005823640f004060c65cce8bfcf5bcee216c24a982d46bc59c4f368a317a251a1a2079e862e46155bc944c4c9426ed5315f64688e1fb2f66dc9db548b2737fea1de70c95dd414c1acad10f4e709d2850aaec7e0933fdeecf0fed2b11c773aaf02d449d91c7e1b68cc59d509b065aa2b9d4b4cc348b2d23c636b0d5853a4e08feaaf7a97a8c0abd5816e66e7d84ca2ac978baf599a980ffe0f143666a4832d745d06892a43fbe8f68805b5c7cdbbcc37b0ae449e114a74f675d799f55c4c28ccfe302b982a28fc167c030f172318a4f0980bf7423cf16eb193d44e78f81cc65e243dd3f47788f7c8965c145141f4db37fab61aa0b6ad27d01f1bb7f8ede26b839215cded3360c1653da4d18c6dbc6b26e55853770306b653ca04eeb6de22bc7ffd52a4a48615ea63aab596a6048ce6dc4c304e60542a0f9bc60448a5cce1be3efc155ac86a7dca2ba60351786b60d0f8dbf66736879aab1339f6a1475830c616f82e98b15850b5d5459b75b8a72dd47b34ebc5054cc9c1967f27e7c5d30a512d9727e3ba8c329517c3948ac472f17089c5add889772bcb5e75f8516ea4746ffc612ddbad403acdc532919400dbd18feb2aa84cbf67496241ce9fe37fc067a63efd01e33d0098ab6ee408c821b701ff853650eb1b4e3c15d013467d785017c009ee84052217332abb1843fc5aa409567f9a6351e4926603478458837bd3739e15a8d48f376759e3f73b9da024846ffcd94a34a9d8a6cab9ac5f6e9e0f14aac29a1bd8c464f1764f5de76885e53fa4436259153d188aea2f95b9bc1f27c46997d89637cc01a925f89512a0ce05674a904e5fe8030675aec215438aa155fb4363f1fe5e2da8268ca0b77806de6016b4fea82cbb7831df9f0c0f99380418cf4a7e761e3b894b3393df1d60c4ebb00841df838dfb8f72d93f2802e09fe815eba9ef11673677355e8ced780c86ed397877fa79ab290d6fed1e27bec40542b177158191bf7481693d83b12f9aa4a993e46a92438a49c42cefd2d40edaf1611bc59890ea35b1e793dbf912963f7a2e55c5f3c357959edea0ba273139d04faaa0ded17db385248e94df7a5d8b4d39205137a0ab4ec4ed73a181db4f58cfd592fc70ac3cfb0a75ccd300a2e135b06f85c228b99b5aa5131a00555f27e23135e07d01050367a02c0ab5a181b2c6f1cd0d611c9fa0928fb1d783aed0f618b0ca98bce7d3ce22632dd537673613ffb914160f116669484952d530aedde06bbc67bcbd82d333fcfbd060ff47c902b6c42fde08a5b626cba66c9cde76432ea521a96ab892c680dc99e8c4faefa46acf0532185476bba2cb08cf6dfed0099f266eadce46693e8df3a843da66bfa3f46d5939bdeade4b90b67c8479ce33fe19315781697c9e36982a6b6e04515e85ea98a364b5d30c352156970d3b5fbfa758888f91e8d3c934ef2584714c1edb87ed64ca644f85726dbda85cd2e3f5dd42bc2c2b30b9e0b8dddfa850a82b73392c4a336197f64afe7032724bf5911a101672f57c2de7d6d9e8c28adeab353134801b3f262d8f858658849ecbf1109c1ba5c9361e7548e1d4bab449661fe83edc91c832b551ef1d2be4ac19560c067b0120e2736e58242bbad40085200db6c7a6fe3ac7d3414cfb62c6358c1139e9eae9775fbb73e357a2723d8fbd02726e45036fd94145efaed1032214e0c49cee39a9b1b9ae5aa7881397daada02a3677948b70c1182c4d0ee5fa68e7b9ae2175b906ccb28da55d528d345dc1aff106d0ad61131b79f6433271be7dba2626fbe0de908787cb388c7aa07dfc47898d0e4399ebac1f640f7cca604ac4ae9a4e92e0393d0246b1690d15c69af4fe7c1cdd3b20788f7256d0d4c49e4b4b2169f214d41a460d3b2424c3b3bce28e5a672432896c1422adb26faa83acc99c405828bd4bf05966b9eb8ed0ce6e57040c09c25985f017793117703ec67f8180087936d9c06a1a2cea9707484e5fc967e0b68f23e0071ee35593e2f31a4de4552fa6983b0e0c27cee16cfdb3bf4e01652ed5b81cee8b6c9b3d51888145734112cf1e6ed9f61d15fa878a0cdeab96a4d244780d9ad3556fbcb173c371b79a7a0123f6f2ff6625716bdb7d7fe90b91b82d64e28a0f20bd83088376bd8366f7435b28681c8de547f18fb93d2260fbc4383e5a530eeaf6cf82fa578dfd50e0f05c1fc85058fa0d13a38bd38e12ddc2349ed7b757de29f9a0dc316f9feb26f8f4112baa7b0196ab6f1f92c1c9d83a5162d4e3768cd8f665339f30a6df89da97c0f104e5f2745f9249146daa3d43587d4de1b9c2c5c974db267746ca8450de5640db14ad68dba64e6232d3a65c48291f7f5d60285921614df99664604c2ffe924cd0fcda2bac203ef01d91d9d1c1cacaf435a7df0e52ce6d428c420d079a8d3846a68504f9c7c8b80a3036d25cc6d1621a2ef65b353d5618d2afdd2c3ddbfbfcd77a51eb9b851315d576522f1fcbe79c716e7b864304a8c70d24ac33aebfcce56d57eeb9761b73f90a34e2c4f65a1426d835d2182adb8ad3e9b7cad0ff2dd131fee64d1e1ef0fc239f813ca9b134866478cb09bff286d08e998464a300db20c3bd9d8591667854e3ff6c8fbe15fd3db32c51d3db9b82d2430c823b0cb70d0bac0fe08f099d87b8d5f6ba27fbde6b047b14bd398d7201b8f97df634d2b9ba0eb8c81190541057aaae1829bef8349265a4f134da91ca4517c6c7f2a52a76310cc76acb7eca1a6df57c9307d289850fe3ba75db2b63fe5e368d5313cb43487c44779391760008cb9dbec6a8462e9cd868fb904ab28fc7524cb8d084614d429a8c51e49a3770920ffec033ff997534862a5bc53e5a087abf651b34b9cce61213e63581c69d221f7f12b5eedb051931627e1ae6d385c472920afe65a572334c779f8868ea04f18604d1a8e8e33e54ddddd867d6d02bc52cb9c452935b32b06c22ec20df79ee00b2f2edf6000460e223e9e6b27cea02681b7599116607f0067b996335f787793bf7296719349b3c782f1708cfe54e3ae317877d8858f012b4f92f4cf5d7348589e66c0fcc9c09c9c2e4967d4257a0c8e73339514a8a49995de35b8a59b61cdf569260f187e65ab36f03b1826f9c4e410aa211d3281cc3adb1135fa6a4ac79c01dd85ef07fa1c0bd0886a0fa91584d533bc97ca6c4360d73cb7e7a2ea9d7a4f71a6a6da1afeba42abd956cba0bae45c29091f35df757985fe6a53218772bc21986b59afd5638c5929da7dcdddb6a29a6ab74edec544131e90cb3bf9bc5c06bd77f8b3b4b142e9c78cefa1ddab9b65e"}]}}]}, 0xec4}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) 22:37:23 executing program 0: openat$zero(0xffffffffffffff9c, &(0x7f000000aa00), 0x0, 0x0) 22:37:23 executing program 5: mmap$usbfs(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 22:37:23 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f0000001e80), 0x0, 0x0) [ 476.599662][T18706] loop1: detected capacity change from 0 to 16383 22:37:23 executing program 3: accept(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, 0x0) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000700)) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000780)={'wlan0\x00'}) socket(0x1d, 0x0, 0x0) [ 476.733377][T18706] loop1: detected capacity change from 0 to 16383 22:37:23 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r0, 0x11, 0x65, &(0x7f0000000000), &(0x7f0000000040)=0x4) 22:37:23 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(r0, &(0x7f0000002d80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 22:37:23 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1, &(0x7f0000000780)={[{'\'!,\')'}], [{@appraise_type}, {@smackfshat={'smackfshat', 0x3d, '/dev/full\x00'}}, {@dont_appraise}]}) [ 476.958686][T18722] can: request_module (can-proto-0) failed. [ 477.013457][T18729] can: request_module (can-proto-0) failed. 22:37:23 executing program 4: syz_read_part_table(0x8, 0x6, &(0x7f0000000400)=[{&(0x7f0000000080)="ee0cdfa8c87d0911a9a6fbfaa7488c0d59da38396be20dfcabe97eca", 0x1c, 0xfffffffffffffffe}, {&(0x7f00000000c0)="91b28208f031b76ca042ab22edf7ee4af5cfcd362adcd87809b9fed2bb42801d98edce1cbf395fe1e8ef13194f5cb94687abcb8814b1c46059666138394311ed567c8863b5e7a0be6f1d357c833b3dfc85ddc1950766aa72a03251e661624ee54130502e5bec23361d3a7934b6a0008e0434b5bfd65ea58a7bfabf9cd220f2be68b1c7deb373ce14169ea14ffece280fcae70ef107ed07bbf8052e0cb1f7d7038a410e512445f2a2b507a1da7f760b278cae00704910a4a4dd6ba88f82320f1b9dd6e89b6cce571d0388e20ed6b292a5ccee67", 0xd3}, {&(0x7f00000001c0)="acc95bc8c925c49b5cc24e4a305674c718592c6f25f3eab1c6553ef27da081d326a3edf5b1905e6b5030b371a5d5f67339beeb64a22ef9078b724bf818e0017b20e3bc4a9b80387afbe19c978b11c87d4eaa0611db1cc175c36cfab5a7addaf1ce5fb7ec0449e36b2a84089eef76eae7bbffe40ab37d8e068580416554011bba", 0x80, 0x3}, {&(0x7f0000000240)="ab586bd0c4e1405ec805285bbde8dbd506fa02ee3db42cee289fcb73813f74d1832cb9e7adce47ca801d8226e3c1dbdf5039b0d7c057957dda32cb34a75e3103a05c0ce9820c336eb4f893e7c69cf3786bd22dccc23b1c1ad73a14eaddb63a82c4dac3bbd1c5062cf0731d9809712700e118bcaca1e0a80765c30bd8ecd40a2462cb955540d41577ea7f8ba3d7a87ddf601f6403a4ccec54fe89964eb2277f2d6ade1007cb713ca17eeb1350", 0xac, 0x5}, {&(0x7f0000000300), 0x0, 0x9}, {&(0x7f0000000340)="6eda3c9d913ad9b054ef5409c287fc76c72b4857f45a70b366c4a99337fb4648a9b9a14ec175fe24f3b3f6eca58cc54bdbd92bc9466448f68b7e66ac6511f62cb26427de452f110f76b2f9d2f444c6dd86b7b508e7837ae28347a93cebf95d9bc06adcdb81c8a323b93b4e1f9d1c0241ef272dc7c7209d0b406bac0d27ad2bb856c538d0185868b3ef97777ec6b2b256b50771a3e30ec435637393f5ac65c09a5af636acde24c8992e1af0f95856930cf1b4eb6bbb6e3884b121605b4100ec", 0xbf, 0x7ff}]) futex(0x0, 0x8b, 0x0, 0x0, &(0x7f0000000500), 0x4) nanosleep(&(0x7f0000000000)={0x77359400}, &(0x7f0000000040)) 22:37:23 executing program 1: fanotify_mark(0xffffffffffffffff, 0x42, 0x8, 0xffffffffffffff9c, 0x0) 22:37:23 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) sendmsg$AUDIT_SIGNAL_INFO(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x10, 0x3f2, 0x100, 0x70bd29, 0x25dfdbfd, "", ["", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x8800}, 0xc800) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000001c0)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000000140)="09057245e9e75a6fefd9bfb0ecb31322cd313922d4401d386ccfcefd579a4586aba8705220b78a278b724ecead928af2d1f9d14fccc32ebd33d3f091f84737238a7aa3dd82c2aa4c19eacd4101945fda761d4fc50894f4ad97def2e5c21ff8c212d7d154a0d5b8fb20f5a9d40dc19a477cc002289b", 0x75, r0}, 0x68) r1 = syz_mount_image$nfs4(&(0x7f0000000240), &(0x7f0000000280)='./file0\x00', 0x1, 0x7, &(0x7f00000006c0)=[{&(0x7f00000002c0)="1a39276a02695bcfd3c727d65ed65843a6f9c879dc9467a2b2b912b38b042220fd0be94644b22ffef5ac86acd6bb6094db03d5d3b1287cad77ff5603945199c52f7af3deffae9356ac594cbc456bc0aeb37003ef192ad6fff3aa84f78ad11682a0ffe6b2dfdcd71831daba0c5cb7a35d5d0503a51a79a867fb58171ab3083f55f362339f9abfe7a55bb5cafab49ebbf8e007fa3cc17d3b218ecb5fb2be36a2c95d56d22b40badb8336a2528e9ae9a3d3d2d533fbf45418c4bf9969300c451b4ea8c511206062d8db8a494cf4587546d1f5e62184ad675ae8a6c21131ac", 0xdd, 0x101}, {&(0x7f00000003c0)="02fc3a406d07c7c78e4236d508f65c08ee94081ff5943e1bf53c2a54dd59db874fc16f590009bcc7a7fc6a13a939cf6bc9c25cfbfa33198131a1925891a7313ad66d4bb6ba2d846cb3aee02b81f3cec5af8085fb71e5eab3fc885a95", 0x5c, 0x6}, {&(0x7f0000000440)="221262df2cedbdec8ce2bfdfde14b711b891820ab846973bf4ed0236e35434f8a8e6d9e7431be3df0c5188710ccabb4bc559f9b4b34cb37e4c47316710be73f53093a23c3df93364e234552b7cfc559d56ed8faad381802dee1f6a5505fdbeca9d8ac39b782b115abde82a6b1bf52a0783c5866116ceb65d302ace1ecf1792a54cbf36f93925b30961fae518b352bdd03c9b06df2fe1ffaa6fbe6607f77f265289b98762ccdf55957520cd28a702c7acd4b1c2c653", 0xb5, 0x5}, {&(0x7f0000000500), 0x0, 0x8}, {&(0x7f0000000540)="bc72ead7fec93b5c448ac78895745db60992d926fe43509a546a687985daab2646d6afd7597a744927a742f5f661232b191893dd4f06571914f6e5e9c439c7f35552154b5a08a68da0bbfa888185f5d9", 0x50, 0x3}, {&(0x7f00000005c0)="d64373e8545e45bdf338f93d5950b8489e4c437bc22546106d", 0x19}, {&(0x7f0000000600)="65f41295a4581b95272b9c499813a25d5397af8f1f5007e5da96e2cf657ea8d5e3b4b81bed2e10366fd36e7e1d9e7ccad6f6b3238c02be69d6794ba77400f4eec36f024202e05474d0f9f1ca676591ed17a173cc153833383a02d5c05cdaf066c8f86947f601239b56e071934b2bf65f0d9f1ebc02846d3fbad594945bb8b1cb601ed0", 0x83, 0x2}], 0x1, &(0x7f0000000780)={[{'/*!!$%/-,*\xaf}-8 '}, {'\'!,\')'}], [{@subj_type={'subj_type', 0x3d, '/dev/full\x00'}}, {@pcr={'pcr', 0x3d, 0x1b}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@fsmagic={'fsmagic', 0x3d, 0x3f}}, {@fsuuid={'fsuuid', 0x3d, {[0x64, 0x32, 0x64, 0x30, 0x5a, 0x66, 0x35, 0x37], 0x2d, [0x31, 0x37, 0x32, 0x32], 0x2d, [0x6, 0x62, 0x64, 0x30], 0x2d, [0x56, 0x62, 0x31, 0x32], 0x2d, [0x39, 0x32, 0x64, 0x32, 0x37, 0x35, 0x0, 0x35]}}}, {@appraise_type}, {@uid_gt={'uid>', 0xee01}}, {@smackfshat={'smackfshat', 0x3d, '/dev/full\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/,&\\:*:/'}}, {@dont_appraise}]}) fchmodat(r1, &(0x7f00000008c0)='./file0\x00', 0x118) accept(0xffffffffffffffff, &(0x7f00000010c0)=@nfc_llcp, &(0x7f0000001140)=0x80) 22:37:23 executing program 3: syz_genetlink_get_family_id$netlbl_cipso(&(0x7f000000a800), 0xffffffffffffffff) 22:37:23 executing program 2: futex(0x0, 0x0, 0x0, 0x0, &(0x7f0000000500), 0x0) r0 = fork() sched_rr_get_interval(r0, &(0x7f0000000000)) 22:37:23 executing program 1: sendmsg$AUDIT_SIGNAL_INFO(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$nfs4(&(0x7f0000000240), 0x0, 0x0, 0x1, &(0x7f00000006c0)=[{0x0}], 0x0, &(0x7f0000000780)={[{'/*!!$%/-,*\xaf}-8 '}, {'\'!,\')'}], [{@pcr}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x32], 0x2d, [], 0x2d, [], 0x2d, [0x0, 0x0, 0x0, 0x32], 0x2d, [0x39]}}}]}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000980)={'syztnl0\x00', 0x0}) [ 477.265259][T18746] loop0: detected capacity change from 0 to 1 [ 477.292591][T18748] loop4: detected capacity change from 0 to 16383 [ 477.302543][T18746] nfs4: Unknown parameter '/*!!$%/-' 22:37:24 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) sendmsg$AUDIT_SIGNAL_INFO(r0, 0x0, 0x0) [ 477.388619][T18746] loop0: detected capacity change from 0 to 1 22:37:24 executing program 0: syz_mount_image$nfs4(&(0x7f0000000240), 0x0, 0x0, 0x1, &(0x7f00000006c0)=[{&(0x7f00000002c0)="1a", 0x1}], 0x0, &(0x7f0000000780)) 22:37:24 executing program 1: syz_read_part_table(0x8, 0x5, &(0x7f0000000400)=[{&(0x7f0000000080)="ee0cdfa8c87d0911a9a6fbfaa7488c0d59da38396be20dfcab", 0x19, 0xfffffffffffffffe}, {&(0x7f00000000c0)}, {0x0, 0x0, 0x3}, {0x0, 0x0, 0x5}, {0x0}]) futex(0x0, 0x0, 0x0, 0x0, &(0x7f0000000500), 0x4) nanosleep(&(0x7f0000000000)={0x77359400}, &(0x7f0000000040)) 22:37:24 executing program 3: syz_open_dev$vcsn(&(0x7f000000a840), 0x3, 0x149201) [ 477.676844][T18791] loop1: detected capacity change from 0 to 16383 22:37:24 executing program 5: syz_read_part_table(0x0, 0x1, &(0x7f0000000400)=[{0x0, 0x0, 0xfffffffffffffffe}]) 22:37:24 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r0) sendmsg$NL80211_CMD_PROBE_MESH_LINK(r0, &(0x7f0000001c00)={0x0, 0x0, &(0x7f0000001bc0)={&(0x7f0000000380)={0xed0, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_FRAME={0x286, 0x33, @mgmt_frame=@assoc_resp={@with_ht={{{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, {0x80}, @broadcast, @broadcast, @initial, {0x6, 0x3}}, @ver_80211n={0x0, 0x53c5, 0x3, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0x124, 0x55, @default, @val={0x1, 0x4, [{0x0, 0x1}, {0x6, 0x1}, {0x6c, 0x1}, {0x12, 0x1}]}, @val={0x2d, 0x1a, {0x10, 0x3, 0x2, 0x0, {0x9, 0x2, 0x0, 0x9, 0x0, 0x1, 0x0, 0x1}, 0x8, 0x20, 0x1}}, [{0xdd, 0xbd, "b2a6ebb464553a562694b5747cbb292ec95fbaab13511cc331fc6dac51c5ffac61d95757a99b3bac49319142bd32508757b9dd9631c4855c407fbcfb60d63f8efa74318c80e87ffa9a0d270b9ac3efdd87133db80f202f8297ff6a5e8b12e3c1ecb72f29470dc2a1f58996203cb32a3fb2db0f834ae5647a81c84b2c4a516e2d6c098619283da021a8852a62b23032c3ea21138ac9f1c329c2b1ce50d49701e72091327ef7e785f411044e251e19a7437a0c021585ca47893aea8fa1ab"}, {0xdd, 0xf, "5dddd9f69bd4cc4f38311a65b52527"}, {0xdd, 0xf6, "941c71dc4b7c49048704fe0e775b0d78326d9c037a14a00af797e86c69a41042165a73b934ba74453dddc74d09782562883e302b7210ce75ec3594ba52eb6485f236c4bd1a1c1834a0e2900d2bd8b8e925176993db1c5da50f8efb789ccbc33da2276262a090c0259c1bf5d1d20e406ba4c6e8196aa287adce8fcfffeae6ce95e580c4b949ed921cb37975ae60ccf2f30a1b0735c992365fb182f5bdd8c92526abee7a5cc798a7663b9397bc6274aba66414a61bf47f4ef3cd7185e4b407d1645a4065dc608e8ce9f12ee8aac9be9d1dafc7275393d367cf23857179c2d31b6290f1d8f5453547c30aeb76fd8d15ed21de67148446b3"}, {0xdd, 0x74, "a74f8326b1cb0ed1aab0b4d388a5a776a0c030ab06acbff734d924709bcb0314c249e6b32fecee00a33a87be8b2e80413bac87533c4744975c3f9c1e6f98c54e7501efb79ec945e043f4122d0d3ddfc1841bcaa3520acea2e0c60cf2eee328f11df502e74a8e4f725a3c3d03cce1a1b91975c83d"}]}}, @NL80211_ATTR_FRAME={0x24, 0x33, @mgmt_frame=@action_no_ack={@with_ht={{{0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x1, 0x1}, {0x7f01}, @device_b, @device_a, @random="30349edd292b", {0x1, 0x2}}, @ver_80211n={0x0, 0x36, 0x3, 0x0, 0x0, 0x2, 0x1, 0x0, 0x1}}, @sa_query_req}}, @NL80211_ATTR_FRAME={0x14b, 0x33, @mgmt_frame=@probe_request={@with_ht={{{0x0, 0x0, 0x4, 0x0, 0x0, 0x1}, {0x646c}, @device_a, @broadcast, @from_mac=@broadcast, {0x5, 0x20}}, @ver_80211n={0x0, 0x3, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1}}, @void, @val={0x1, 0x1, [{0x6}]}, @void, @void, @void, [{0xdd, 0x9f, "3b7b17c162663f574576a94259467d9eea13bc11883bf26b2cef2c6c5ef5c2c1bc0e5eb751a3d6d839a185df6c4d45a51033c285a584e044d9886e9ecfbeb8b6e87ae604279cef39230dbf6ac8212280ef0e07f01b29a32229213d5f76951351c409b14840569f9f32077be5bf2c7745a4e1b62b47c93667549eca98f68526d24f25ae43ceffe2cd9abe2c31ac41446182b69472d268174f2d693b52a47a45"}, {0xdd, 0x1c, "f5b0e90c8a8554236b6f1d60d6353a0634c5333ea0fa707c040115e9"}, {0xdd, 0x67, "4b4441f74dbb489e309cadc582f716928dd648df626500fef1d29bb191b3d8867213b871b502701fc5631c1eea36511045ecd0f4c3939b691c5ee269b8f026b16ea16d3a07d6c7cfb67c780264224d4deb2feb4a070db5f805a65449050674d3c4382dad533f07"}]}}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_FRAME={0xaac, 0x33, @data_frame={@no_qos=@type01, @a_msdu=[{@broadcast, @device_b, 0xa80, "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"}]}}]}, 0xed0}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) [ 477.885873][T18809] loop5: detected capacity change from 0 to 16383 [ 478.117259][T18748] loop4: detected capacity change from 0 to 16383 22:37:25 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000040)={0x14}, 0x14}}, 0x0) 22:37:25 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mlock(&(0x7f0000ffd000/0x1000)=nil, 0x1000) 22:37:25 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_TTY_GET(r0, &(0x7f0000004180)={0x0, 0x0, &(0x7f0000004140)={&(0x7f0000004100)={0x10}, 0x10}}, 0x0) 22:37:25 executing program 2: perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:37:25 executing program 5: syz_genetlink_get_family_id$team(&(0x7f0000000380), 0xffffffffffffffff) syz_genetlink_get_family_id$batadv(&(0x7f00000005c0), 0xffffffffffffffff) [ 478.492990][T18791] loop1: detected capacity change from 0 to 16383 22:37:25 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x1030c2, 0x0) 22:37:25 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) sendmsg$AUDIT_SIGNAL_INFO(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x10, 0x3f2, 0x100, 0x70bd29, 0x25dfdbfd, "", ["", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x8800}, 0xc800) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000001c0)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000000140)="09057245e9e75a6fefd9bfb0ecb31322cd313922d4401d386ccfcefd579a4586aba8705220b78a278b724ecead928af2d1f9d14fccc32ebd33d3f091f84737238a7aa3dd82c2aa4c19eacd4101945fda761d4fc50894f4ad97def2e5c21ff8c212d7d154a0d5b8fb20f5a9d40dc19a477cc002289b", 0x75}, 0x68) r1 = syz_mount_image$nfs4(&(0x7f0000000240), &(0x7f0000000280)='./file0\x00', 0x1, 0x7, &(0x7f00000006c0)=[{&(0x7f00000002c0)="1a39276a02695bcfd3c727d65ed65843a6f9c879dc9467a2b2b912b38b042220fd0be94644b22ffef5ac86acd6bb6094db03d5d3b1287cad77ff5603945199c52f7af3deffae9356ac594cbc456bc0aeb37003ef192ad6fff3aa84f78ad11682a0ffe6b2dfdcd71831daba0c5cb7a35d5d0503a51a79a867fb58171ab3083f55f362339f9abfe7a55bb5cafab49ebbf8e007fa3cc17d3b218ecb5fb2be36a2c95d56d22b40badb8336a2528e9ae9a3d3d2d533fbf45418c4bf9969300c451b4ea8c511206062d8db8a494cf4587546d1f5e62184ad675ae8a6c21131ac", 0xdd, 0x101}, {&(0x7f00000003c0)="02fc3a406d07c7c78e4236d508f65c08ee94081ff5943e1bf53c2a54dd59db874fc16f590009bcc7a7fc6a13a939cf6bc9c25cfbfa33198131a1925891a7313ad66d4bb6ba2d846cb3aee02b81f3cec5af8085fb71e5eab3fc885a95d80e3c685b26b070199b862a8b", 0x69, 0x6}, {&(0x7f0000000440)="221262df2cedbdec8ce2bfdfde14b711b891820ab846973bf4ed0236e35434f8a8e6d9e7431be3df0c5188710ccabb4bc559f9b4b34cb37e4c47316710be73f53093a23c3df93364e234552b7cfc559d56ed8faad381802dee1f6a5505fdbeca9d8ac39b782b115abde82a6b1bf52a0783c5866116ceb65d302ace1ecf1792a54cbf36f93925b30961fae518b352bdd03c9b06df2fe1ffaa6fbe6607f77f265289b98762ccdf55957520cd28a702c7acd4b1c2c653", 0xb5, 0x5}, {&(0x7f0000000500), 0x0, 0x8}, {&(0x7f0000000540)="bc72ead7fec93b5c448ac78895745db60992d926fe43509a546a687985daab2646d6afd7597a744927a742f5f661232b191893dd4f06571914f6e5e9c439c7f35552154b5a08a68da0bbfa888185f5d989b68bc4152f32dc8759bba91fb36a4b94be444ab95cf1f8ec", 0x69, 0x3}, {&(0x7f00000005c0)="d64373e8545e45bdf338f93d5950b8489e4c437bc22546106d", 0x19}, {&(0x7f0000000600)="65f41295a4581b95272b9c499813a25d5397af8f1f5007e5da96e2cf657ea8d5e3b4b81bed2e10366fd36e7e1d9e7ccad6f6b3238c02be69d6794ba77400f4eec36f024202e05474d0f9f1ca676591ed17a173cc153833383a02d5c05cdaf066c8f86947f601239b56e071934b2bf65f0d9f1e", 0x73, 0x2}], 0x1, &(0x7f0000000780)={[{'/*!!$%/-,*\xaf}-8 '}, {'\'!,\')'}], [{@subj_type={'subj_type', 0x3d, '/dev/full\x00'}}, {@pcr={'pcr', 0x3d, 0x1b}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@fsmagic={'fsmagic', 0x3d, 0x3f}}, {@fsuuid={'fsuuid', 0x3d, {[0x64, 0x32, 0x64, 0x30, 0x5a, 0x66, 0x35, 0x37], 0x2d, [0x31, 0x37, 0x32, 0x32], 0x2d, [0x6, 0x62, 0x64, 0x30], 0x2d, [0x56, 0x62, 0x31, 0x32], 0x2d, [0x39, 0x32, 0x64, 0x32, 0x37, 0x35, 0x0, 0x35]}}}, {@appraise_type}, {@uid_gt={'uid>', 0xee01}}, {@smackfshat={'smackfshat', 0x3d, '/dev/full\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/,&\\:*:/'}}, {@dont_appraise}]}) fchmodat(r1, &(0x7f00000008c0)='./file0\x00', 0x118) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000000980)={'syztnl0\x00', &(0x7f0000000900)={'ip6tnl0\x00', 0x0, 0x2f, 0xc6, 0x6, 0x1000, 0x40, @local, @private2={0xfc, 0x2, '\x00', 0x1}, 0x109d1037d2d4711e, 0x8000, 0xffff, 0x2}}) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000e80), 0x200000, 0x0) accept(r2, &(0x7f00000010c0)=@nfc_llcp, &(0x7f0000001140)=0x80) 22:37:25 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(r0, &(0x7f0000002d80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2000, 0x0) 22:37:25 executing program 1: utimensat(0xffffffffffffffff, 0x0, &(0x7f0000000c80)={{}, {0x0, 0xea60}}, 0x0) 22:37:25 executing program 0: perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:37:25 executing program 4: syz_open_dev$vcsn(&(0x7f000000a840), 0x3, 0x0) 22:37:25 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, 0x0, 0x0) [ 478.936352][T18846] loop5: detected capacity change from 0 to 1 22:37:25 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)) [ 478.996648][T18846] nfs4: Unknown parameter '/*!!$%/-' 22:37:25 executing program 0: syz_read_part_table(0x8, 0x2, &(0x7f0000000400)=[{&(0x7f0000000080), 0x0, 0xfffffffffffffffe}, {0x0}]) 22:37:25 executing program 2: syz_read_part_table(0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) [ 479.092064][T18846] loop5: detected capacity change from 0 to 1 22:37:25 executing program 3: sched_rr_get_interval(0x0, &(0x7f0000000000)) fork() prlimit64(0x0, 0x0, 0x0, &(0x7f0000000040)) 22:37:25 executing program 1: ppoll(0x0, 0x0, &(0x7f0000001240)={0x0, 0x3938700}, &(0x7f0000001280), 0x8) 22:37:25 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000500), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_SETPARAMS(r2, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000a40)={&(0x7f0000000a00)={0x14, r1, 0x8c6eb067ab94f4c7, 0x0, 0x0, {0x21}}, 0x14}}, 0x0) [ 479.330607][T18868] loop0: detected capacity change from 0 to 16383 [ 479.440660][T18868] loop0: detected capacity change from 0 to 16383 22:37:26 executing program 4: perf_event_open(&(0x7f0000000640)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:37:26 executing program 1: waitid(0x0, 0x0, &(0x7f00000004c0), 0x0, 0x0) 22:37:26 executing program 2: r0 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000002a40), 0x2, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(r0, 0xc0205647, &(0x7f0000002b00)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}) 22:37:26 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x40, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x20, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x40}}, 0x0) 22:37:26 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0xa867, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:37:26 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001e80), 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS32(r0, 0x80585414, 0x0) 22:37:26 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x89f7, &(0x7f00000002c0)={'ip6_vti0\x00', 0x0}) 22:37:26 executing program 1: syz_open_dev$vcsn(&(0x7f000000a840), 0x0, 0x0) 22:37:26 executing program 2: syz_mount_image$nfs4(&(0x7f0000000f40), &(0x7f0000000f80)='./file0\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000fc0)={[], [{@seclabel}]}) 22:37:26 executing program 5: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 22:37:26 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x0, 0x0, 0x0, &(0x7f0000000440)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 22:37:26 executing program 3: openat$zero(0xffffffffffffff9c, &(0x7f0000000100), 0x210100, 0x0) 22:37:26 executing program 1: futex(0x0, 0xd, 0x0, &(0x7f0000000040), &(0x7f0000000080), 0x0) 22:37:26 executing program 4: syz_open_dev$usbfs(&(0x7f000000ac40), 0x0, 0x0) 22:37:26 executing program 0: syz_genetlink_get_family_id$team(&(0x7f0000000380), 0xffffffffffffffff) syz_genetlink_get_family_id$batadv(0x0, 0xffffffffffffffff) 22:37:26 executing program 5: r0 = fork() get_robust_list(r0, &(0x7f00000001c0)=0x0, &(0x7f0000000180)) [ 480.159667][T18922] nfs4: Unknown parameter 'seclabel' [ 480.241094][T18922] nfs4: Unknown parameter 'seclabel' 22:37:26 executing program 3: futex(0x0, 0x8b, 0x0, 0x0, &(0x7f0000000500), 0x0) 22:37:26 executing program 1: syz_read_part_table(0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x4) 22:37:26 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0xa867, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:37:27 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, 0x0, 0x0) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0xa867, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:37:27 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0xa867, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:37:27 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = getpid() sched_setscheduler(r1, 0x5, 0x0) sendto$inet6(r0, &(0x7f0000847fff)='X', 0xa867, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:37:27 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = getpid() sched_setscheduler(r1, 0x5, 0x0) sendto$inet6(r0, &(0x7f0000847fff)='X', 0xa867, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:37:27 executing program 1 (fault-call:5 fault-nth:0): perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0xa867, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:37:28 executing program 2 (fault-call:2 fault-nth:0): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:37:28 executing program 0 (fault-call:0 fault-nth:0): syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000280)="10c4645f01000000010000000100004e36049b", 0x13, 0xb206}], 0x0, &(0x7f0000000080)={[{@nointegrity}]}) 22:37:28 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) r3 = syz_open_procfs(0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, 0x0, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) r5 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$F2FS_IOC_SET_PIN_FILE(r5, 0x4004f50d, &(0x7f0000000140)=0x1) socket$inet_icmp_raw(0x2, 0x3, 0x1) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) syz_genetlink_get_family_id$devlink(0x0, r0) setsockopt$inet_icmp_ICMP_FILTER(r3, 0x1, 0x1, &(0x7f0000000100)={0x9}, 0x4) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @multicast2}, 0x10) splice(r0, 0x0, r4, 0x0, 0x2ffff, 0x0) 22:37:28 executing program 3: sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x3, 0x1, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000500)={{r0}, 0x0, 0x0, @unused=[0x5b, 0x3ff, 0x2, 0xa0], @name="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"}) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f00000000c0)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x8040, 0x2c) pipe2(0x0, 0x0) exit_group(0x0) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) clock_nanosleep(0x2, 0x1c58461, &(0x7f0000000280)={0x0, r2+10000000}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000240)=0x1e0f7dca) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000200), 0x88) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000440)=ANY=[@ANYBLOB="73797a3100ffa75b5faaf1bf7976bcc2ffb6305ab90bdb42eb554d0ee3e317b43fbbb65a74d06685db0e5c9b81e1dc07929d05000000e63f18a9f882d17081f1f100e7628d8a5ffa6a3061b7d5bdd2bcff03000000000000e02d19817dfe8052d0b8da148e5970d3d50d98cf7c13c6e144c763f09a5a4cb4b162f3fa796d6fae9519181882b8cebee9fe2cdc42dade096fb4385179139d4fa6c372f7fb87587905ca2f9fbfd5b7f3e600000000"], 0x8c) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x4000010, r3, 0xf2ab4000) [ 481.562654][T18978] FAULT_INJECTION: forcing a failure. [ 481.562654][T18978] name failslab, interval 1, probability 0, space 0, times 1 [ 481.652068][T18978] CPU: 0 PID: 18978 Comm: syz-executor.0 Not tainted 5.14.0-rc3-next-20210730-syzkaller #0 [ 481.662096][T18978] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 481.672664][T18978] Call Trace: [ 481.676213][T18978] dump_stack_lvl+0xcd/0x134 [ 481.681169][T18978] should_fail.cold+0x5/0xa [ 481.685785][T18978] ? __do_sys_memfd_create+0xf7/0x5a0 [ 481.691242][T18978] should_failslab+0x5/0x10 [ 481.695841][T18978] __kmalloc+0x72/0x330 [ 481.700057][T18978] __do_sys_memfd_create+0xf7/0x5a0 [ 481.705279][T18978] ? hmm_vma_walk_hugetlb_entry+0x8b0/0x8b0 [ 481.711196][T18978] ? syscall_enter_from_user_mode+0x21/0x70 [ 481.717626][T18978] do_syscall_64+0x35/0xb0 [ 481.722075][T18978] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 481.728247][T18978] RIP: 0033:0x4665e9 [ 481.732230][T18978] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 481.752532][T18978] RSP: 002b:00007f531cd5ff48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 481.760958][T18978] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004665e9 [ 481.769185][T18978] RDX: 000000000001640c RSI: 0000000000000000 RDI: 00000000004bee86 [ 481.777247][T18978] RBP: 0000000000000002 R08: 000000000000b206 R09: ffffffffffffffff [ 481.786014][T18978] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 481.794601][T18978] R13: 0000000020000100 R14: 000000000001640c R15: 0000000020000080 [ 481.815147][T18983] FAULT_INJECTION: forcing a failure. [ 481.815147][T18983] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 481.950737][T18983] CPU: 1 PID: 18983 Comm: syz-executor.2 Not tainted 5.14.0-rc3-next-20210730-syzkaller #0 [ 481.960786][T18983] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 481.971581][T18983] Call Trace: [ 481.975151][T18983] dump_stack_lvl+0xcd/0x134 [ 481.980318][T18983] should_fail.cold+0x5/0xa [ 481.984944][T18983] _copy_from_user+0x2c/0x180 [ 481.989732][T18983] __copy_msghdr_from_user+0x91/0x4b0 [ 481.995448][T18983] ? __ia32_sys_shutdown+0x70/0x70 [ 482.000590][T18983] ? mark_lock+0xef/0x17b0 [ 482.005174][T18983] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 482.011623][T18983] sendmsg_copy_msghdr+0xa1/0x160 [ 482.016764][T18983] ? do_recvmmsg+0x6d0/0x6d0 [ 482.021507][T18983] ? lock_chain_count+0x20/0x20 [ 482.027321][T18983] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 482.033331][T18983] ___sys_sendmsg+0xc6/0x170 [ 482.037947][T18983] ? sendmsg_copy_msghdr+0x160/0x160 [ 482.043266][T18983] ? __fget_files+0x21b/0x3e0 [ 482.048023][T18983] ? lock_downgrade+0x6e0/0x6e0 [ 482.053173][T18983] ? __fget_files+0x23d/0x3e0 [ 482.057882][T18983] ? __fget_light+0xea/0x280 [ 482.062504][T18983] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 482.069416][T18983] __sys_sendmsg+0xe5/0x1b0 [ 482.074135][T18983] ? __sys_sendmsg_sock+0x30/0x30 [ 482.080260][T18983] ? syscall_enter_from_user_mode+0x21/0x70 [ 482.086188][T18983] do_syscall_64+0x35/0xb0 [ 482.090910][T18983] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 482.097620][T18983] RIP: 0033:0x4665e9 [ 482.101706][T18983] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 482.121767][T18983] RSP: 002b:00007fd04f274188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 482.130291][T18983] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 482.138973][T18983] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000004 [ 482.146965][T18983] RBP: 00007fd04f2741d0 R08: 0000000000000000 R09: 0000000000000000 [ 482.154951][T18983] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 482.162933][T18983] R13: 00007ffc86d9b19f R14: 00007fd04f274300 R15: 0000000000022000 22:37:28 executing program 5: syz_read_part_table(0x0, 0x1, &(0x7f0000000400)=[{0x0, 0x0, 0x7ff}]) [ 482.194972][T18984] FAULT_INJECTION: forcing a failure. [ 482.194972][T18984] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 482.278018][T18984] CPU: 1 PID: 18984 Comm: syz-executor.1 Not tainted 5.14.0-rc3-next-20210730-syzkaller #0 [ 482.288060][T18984] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 482.298306][T18984] Call Trace: [ 482.301598][T18984] dump_stack_lvl+0xcd/0x134 [ 482.306211][T18984] should_fail.cold+0x5/0xa [ 482.310732][T18984] _copy_from_user+0x2c/0x180 [ 482.315429][T18984] move_addr_to_kernel.part.0+0x31/0x110 [ 482.321724][T18984] __sys_sendto+0x166/0x320 [ 482.326242][T18984] ? __ia32_sys_getpeername+0xb0/0xb0 [ 482.331631][T18984] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 482.337653][T18984] ? irqentry_enter+0x28/0x50 [ 482.342367][T18984] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 482.348551][T18984] ? lockdep_hardirqs_on+0x79/0x100 [ 482.353774][T18984] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 482.359961][T18984] ? trace_hardirqs_on+0x38/0x1c0 [ 482.365106][T18984] __x64_sys_sendto+0xdd/0x1b0 [ 482.369889][T18984] ? __sys_sendto+0x320/0x320 [ 482.374581][T18984] do_syscall_64+0x35/0xb0 [ 482.379011][T18984] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 482.384930][T18984] RIP: 0033:0x4665e9 [ 482.388834][T18984] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 482.409238][T18984] RSP: 002b:00007f50265cd188 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 482.418012][T18984] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 22:37:29 executing program 3: futex(&(0x7f0000000080), 0x4, 0x0, 0x0, &(0x7f0000000100), 0x0) [ 482.425992][T18984] RDX: 000000000000a867 RSI: 0000000020847fff RDI: 0000000000000004 [ 482.433981][T18984] RBP: 00007f50265cd1d0 R08: 000000002005ffe4 R09: 000000000000001c [ 482.441961][T18984] R10: 3f00000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 482.449933][T18984] R13: 00007ffe5d0ce2bf R14: 00007f50265cd300 R15: 0000000000022000 22:37:29 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="1a", 0x1, 0x101}, {&(0x7f00000003c0)="02fc3a406d07c7c78e4236d508f65c08ee94081ff5943e1bf53c2a54dd59db874fc16f590009bcc7a7fc6a13a939cf6bc9c25cfbfa33198131a1925891a7313ad66d4bb6ba2d846cb3aee02b81f3", 0x4e}, {0x0, 0x0, 0x5}, {&(0x7f0000000500)}, {&(0x7f0000000540)="bc", 0x1}, {0x0}], 0x1, &(0x7f0000000780)={[{'/*!!$%/-,*\xaf}-8 '}, {'\'!,\')'}], [{@subj_type={'subj_type', 0x3d, '/dev/full\x00'}}, {@pcr}, {@appraise_type}, {@uid_gt={'uid>', 0xee01}}, {@smackfshat={'smackfshat', 0x3d, '/dev/full\x00'}}, {@dont_appraise}]}) 22:37:29 executing program 3: syz_mount_image$nfs4(&(0x7f0000000240), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)) [ 482.613725][T18992] loop5: detected capacity change from 0 to 7 [ 482.672711][T18996] loop4: detected capacity change from 0 to 1 [ 482.681446][T18992] Dev loop5: unable to read RDB block 7 [ 482.688984][T18992] loop5: unable to read partition table [ 482.701838][T18992] loop5: partition table beyond EOD, truncated 22:37:29 executing program 3: syz_genetlink_get_family_id$team(&(0x7f0000000380), 0xffffffffffffffff) syz_genetlink_get_family_id$batadv(&(0x7f00000005c0), 0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) [ 482.721088][T18992] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) [ 482.737728][ T8440] Bluetooth: hci5: command 0x0406 tx timeout 22:37:29 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000280)="10c4645f01000000010000000100004e36049b", 0x13, 0xb206}], 0x0, &(0x7f0000000080)={[{@nointegrity}]}) [ 482.793472][T18992] loop5: detected capacity change from 0 to 7 [ 482.793499][T18996] loop4: detected capacity change from 0 to 1 [ 482.876397][T18992] Dev loop5: unable to read RDB block 7 [ 482.884729][T18992] loop5: unable to read partition table [ 482.904439][T18992] loop5: partition table beyond EOD, truncated 22:37:29 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SHOW_PORTS(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000600), r0) [ 482.927515][T18992] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) [ 482.961652][T19013] loop0: detected capacity change from 0 to 178 [ 483.023422][T19013] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 483.023422][T19013] [ 483.133683][T19013] ERROR: (device loop0): remounting filesystem as read-only [ 483.168831][T19013] xtLookup: xtSearch returned -5 [ 483.173815][T19013] read_mapping_page failed! 22:37:29 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0xa867, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:37:29 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r0, 0x11, 0x65, 0x0, &(0x7f0000000040)) 22:37:29 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000001e40), 0x0, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f0000001e00), r0) 22:37:29 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 483.180807][T19013] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 483.187682][T19013] Mount JFS Failure: -5 [ 483.191872][T19013] jfs_mount failed w/return code = -5 22:37:29 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:37:30 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000280)="10c4645f01000000010000000100004e36049b", 0x13, 0xb206}], 0x0, &(0x7f0000000080)={[{@nointegrity}]}) 22:37:30 executing program 4: ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) socket(0x1d, 0x0, 0x1) 22:37:30 executing program 5: utimensat(0xffffffffffffffff, 0x0, &(0x7f0000000c80)={{}, {0x0, 0xea60}}, 0x0) mlock(&(0x7f0000ffd000/0x1000)=nil, 0x1000) 22:37:30 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SHOW_PORTS(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000740), 0xffffffffffffffff) 22:37:30 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x2, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 483.720681][T19041] loop0: detected capacity change from 0 to 178 [ 483.804028][T19041] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 483.804028][T19041] 22:37:30 executing program 5: sendmsg$NLBL_CIPSOV4_C_ADD(0xffffffffffffffff, 0x0, 0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f00000001c0), 0xc0000, 0x0) [ 483.909223][T19041] ERROR: (device loop0): remounting filesystem as read-only 22:37:30 executing program 4: syz_read_part_table(0x8, 0x6, &(0x7f0000000400)=[{&(0x7f0000000080)="ee0cdfa8c87d0911a9a6fbfaa7488c0d59da38396be20dfcabe97eca5b0e9b3ce6583caf2f46fb36fedeeb5a0c7974dd411a648b60fa5d0d", 0x38, 0xfffffffffffffffe}, {&(0x7f00000000c0)="91b28208f031b76ca042ab22edf7ee4af5cfcd362adcd87809b9fed2bb42801d98edce1cbf395fe1e8ef13194f5cb94687abcb8814b1c46059666138394311ed567c8863b5e7a0be6f1d357c833b3dfc85ddc1950766aa72a03251e661624ee54130502e5bec23361d3a7934b6a0008e0434b5bfd65ea58a7bfabf9cd220f2be68b1c7deb373ce14169ea14ffece280fcae70ef107ed07bbf8052e0cb1f7d7038a410e512445f2a2b507a1da7f760b278cae00704910a4a4dd6ba88f82320f1b9dd6e89b6cce571d0388e20ed6b292a5ccee67", 0xd3}, {&(0x7f00000001c0)="acc95bc8c925c49b5cc24e4a305674c718592c6f25f3eab1c6553ef27da081d326a3edf5b1905e6b5030b371a5d5f67339beeb64a22ef9078b724bf818e0017b20e3bc4a9b80387afbe19c978b11c87d4eaa0611db1cc175c36cfab5a7addaf1ce5fb7ec0449e36b2a84089eef76eae7bbffe40ab37d8e068580416554011bba", 0x80, 0x3}, {&(0x7f0000000240)="ab586bd0c4e1405ec805285bbde8dbd506fa02ee3db42cee289fcb73813f74d1832cb9e7adce47ca801d8226e3c1dbdf5039b0d7c057957dda32cb34a75e3103a05c0ce9820c336eb4f893e7c69cf3786bd22dccc23b1c1ad73a14eaddb63a82c4dac3bbd1c5062cf0731d9809712700e118bcaca1e0a80765c30bd8ecd40a2462cb955540d41577ea7f8ba3d7a87ddf601f6403a4ccec54fe89964eb2277f2d6ade1007cb713ca17eeb1350", 0xac, 0x5}, {&(0x7f0000000300), 0x0, 0x9}, {&(0x7f0000000340)="6eda3c9d913ad9b054ef5409c287fc76c72b4857f45a70b366c4a99337fb4648a9b9a14ec175fe24f3b3f6eca58cc54bdbd92bc9466448f68b7e66ac6511f62cb26427de452f110f76b2f9d2f444c6dd86b7b508e7837ae28347a93cebf95d9bc06adcdb81c8a323b93b4e1f9d1c0241ef272dc7c7209d0b406bac0d27ad2bb856c538d0185868b3ef97777ec6b2b256b50771a3e30ec435637393f5ac65c09a5af636acde24c8992e1af0f95856930cf1b4eb6bbb6e3884b121605b4100ec", 0xbf, 0x7ff}]) futex(0x0, 0x8b, 0x0, 0x0, &(0x7f0000000500), 0x4) socket$alg(0x26, 0x5, 0x0) [ 483.977173][T19041] xtLookup: xtSearch returned -5 [ 484.014102][T19041] read_mapping_page failed! [ 484.055039][T19041] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 484.105350][T19041] Mount JFS Failure: -5 [ 484.200616][T19041] jfs_mount failed w/return code = -5 22:37:30 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='4', 0xa867, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:37:30 executing program 3: syz_open_dev$usbfs(&(0x7f000000ac40), 0x5b63, 0x6002) 22:37:30 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x3, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 484.318142][T19057] loop4: detected capacity change from 0 to 16383 22:37:31 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000280)="10c4645f01000000010000000100004e36049b", 0x13, 0xb206}], 0x0, &(0x7f0000000080)={[{@nointegrity}]}) 22:37:31 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) 22:37:31 executing program 4: syz_read_part_table(0x8, 0x0, 0x0) futex(0x0, 0x8b, 0x0, 0x0, &(0x7f0000000500), 0x0) 22:37:31 executing program 3: fchmodat(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$nfs4(&(0x7f00000009c0), &(0x7f0000000a00)='./file0\x00', 0x0, 0x1, &(0x7f0000000b00)=[{&(0x7f0000000a40)="9e422aaca1d4200f1c4bc270cf28d85a9fd1b7ec047b7186b8eb198a7c8c9eff09d1ae2e38aae5f8dddd355f1c653b48af891403d5ae707f9418973aa9cb95e12d29001088e6a7f21704aae9b679a2cfc3c34866221158c397712cd1a3706156ef993c727a31af0acb8283a1d4d6031a962a49a17ff936e6e98b", 0x7a}], 0x20000, &(0x7f0000000b40)={[{'-^'}], [{@permit_directio}, {@smackfsfloor={'smackfsfloor', 0x3d, '$\''}}]}) 22:37:31 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x4, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 484.744447][T19073] loop0: detected capacity change from 0 to 178 22:37:31 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f000000a800), 0xffffffffffffffff) syz_open_dev$vcsn(&(0x7f000000a840), 0x3, 0x0) socket(0x18, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f000000aa00), 0x1030c2, 0x0) [ 484.942035][T19073] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 484.942035][T19073] 22:37:31 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x5, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 485.039548][T19073] ERROR: (device loop0): remounting filesystem as read-only 22:37:31 executing program 3: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000001c0)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000000140)="09057245e9e75a6fefd9bfb0ecb31322cd313922d4401d386ccfcefd579a4586aba8705220b78a278b724ecead928af2d1f9d14fccc32ebd33d3f091f84737238a7aa3dd82c2aa4c", 0x48}, 0x68) r1 = syz_mount_image$nfs4(&(0x7f0000000240), &(0x7f0000000280)='./file0\x00', 0x1, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="1a39276a02695bcfd3c727d65ed65843a6f9c879dc9467a2b2b912b38b042220fd0be94644b22ffef5ac86acd6bb6094db03d5d3b1287cad77ff5603945199c52f7af3deffae9356ac594cbc456bc0aeb37003ef192ad6fff3aa84f78ad11682a0ffe6b2dfdcd71831daba0c5cb7a3", 0x6f, 0x101}, {&(0x7f00000003c0)="02", 0x1}, {&(0x7f0000000440)="221262df2cedbdec8ce2bfdfde14b711b891820ab846973bf4ed0236e35434f8a8e6d9e7431be3df0c5188710ccabb4bc559f9b4b34cb37e4c47316710be73f53093a23c3df93364e234552b7cfc559d56ed8faad381802dee1f6a5505fdbeca9d8ac39b782b115abde82a6b1bf52a0783c5866116ceb65d302ace1ecf1792a54cbf36f93925b30961fae518b352bdd03c9b06df2fe1ffaa6fbe6607f77f265289b98762ccdf55957520cd28a702c7acd4b1c2c6", 0xb4}, {0x0, 0x0, 0x8}, {&(0x7f00000005c0)="d64373e8545e45bdf338f93d5950b8489e4c437bc2", 0x15}, {0x0, 0x0, 0x2}], 0x1, &(0x7f0000000780)={[{'/*!!$%/-,*\xaf}-8 '}, {'\'!,\')'}], [{@subj_type={'subj_type', 0x3d, '/dev/full\x00'}}, {@pcr={'pcr', 0x3d, 0x1b}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@fsmagic={'fsmagic', 0x3d, 0x3f}}, {@fsuuid={'fsuuid', 0x3d, {[0x64, 0x32, 0x64, 0x30, 0x5a, 0x66, 0x35, 0x37], 0x2d, [0x31, 0x37, 0x32, 0x32], 0x2d, [0x6, 0x62, 0x64, 0x30], 0x2d, [0x56, 0x62, 0x31, 0x32], 0x2d, [0x39, 0x32, 0x64, 0x32, 0x37, 0x35, 0x0, 0x35]}}}, {@uid_gt={'uid>', 0xee01}}, {@smackfshat={'smackfshat', 0x3d, '/dev/full\x00'}}, {@dont_appraise}]}) fchmodat(r1, &(0x7f00000008c0)='./file0\x00', 0x118) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000000980)={'syztnl0\x00', &(0x7f0000000900)={'ip6tnl0\x00', 0x0, 0x2f, 0xc6, 0x6, 0x1000, 0x40, @local, @private2={0xfc, 0x2, '\x00', 0x1}, 0x109d1037d2d4711e, 0x8000, 0xffff, 0x2}}) accept(0xffffffffffffffff, &(0x7f00000010c0)=@nfc_llcp, &(0x7f0000001140)=0x80) [ 485.144696][T19073] xtLookup: xtSearch returned -5 [ 485.187658][T19073] read_mapping_page failed! 22:37:31 executing program 4: clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) setitimer(0x2, &(0x7f00000000c0)={{}, {0x0, r0/1000+10000}}, &(0x7f0000000100)) [ 485.214742][T19073] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 485.256385][T19073] Mount JFS Failure: -5 [ 485.289941][T19073] jfs_mount failed w/return code = -5 [ 485.384591][T19073] loop0: detected capacity change from 0 to 178 [ 485.467913][T19111] loop3: detected capacity change from 0 to 1 [ 485.510905][T19111] nfs4: Unknown parameter '/*!!$%/-' 22:37:32 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0x123, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:37:32 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x6, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:37:32 executing program 5: r0 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCADDDLCI(r0, 0x8980, 0x0) 22:37:32 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000280)="10c4645f01000000010000000100004e36049b", 0x13, 0xb206}], 0x0, &(0x7f0000000080)={[{@nointegrity}]}) [ 485.598231][T19116] loop3: detected capacity change from 0 to 1 22:37:32 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SHOW_PORTS(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) [ 485.658331][T19116] nfs4: Unknown parameter '/*!!$%/-' 22:37:32 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_PROBE_MESH_LINK(r0, &(0x7f0000001c00)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000001bc0)={&(0x7f0000000380)={0xec4, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_FRAME={0x285, 0x33, @mgmt_frame=@assoc_resp={@with_ht={{{}, {}, @broadcast, @broadcast}}, 0x0, 0x0, @default, @val={0x1, 0x3, [{}, {}, {}]}, @val={0x2d, 0x1a}, [{0xdd, 0xbd, "b2a6ebb464553a562694b5747cbb292ec95fbaab13511cc331fc6dac51c5ffac61d95757a99b3bac49319142bd32508757b9dd9631c4855c407fbcfb60d63f8efa74318c80e87ffa9a0d270b9ac3efdd87133db80f202f8297ff6a5e8b12e3c1ecb72f29470dc2a1f58996203cb32a3fb2db0f834ae5647a81c84b2c4a516e2d6c098619283da021a8852a62b23032c3ea21138ac9f1c329c2b1ce50d49701e72091327ef7e785f411044e251e19a7437a0c021585ca47893aea8fa1ab"}, {0xdd, 0xf, "5dddd9f69bd4cc4f38311a65b52527"}, {0xdd, 0xf6, "941c71dc4b7c49048704fe0e775b0d78326d9c037a14a00af797e86c69a41042165a73b934ba74453dddc74d09782562883e302b7210ce75ec3594ba52eb6485f236c4bd1a1c1834a0e2900d2bd8b8e925176993db1c5da50f8efb789ccbc33da2276262a090c0259c1bf5d1d20e406ba4c6e8196aa287adce8fcfffeae6ce95e580c4b949ed921cb37975ae60ccf2f30a1b0735c992365fb182f5bdd8c92526abee7a5cc798a7663b9397bc6274aba66414a61bf47f4ef3cd7185e4b407d1645a4065dc608e8ce9f12ee8aac9be9d1dafc7275393d367cf23857179c2d31b6290f1d8f5453547c30aeb76fd8d15ed21de67148446b3"}, {0xdd, 0x74, "a74f8326b1cb0ed1aab0b4d388a5a776a0c030ab06acbff734d924709bcb0314c249e6b32fecee00a33a87be8b2e80413bac87533c4744975c3f9c1e6f98c54e7501efb79ec945e043f4122d0d3ddfc1841bcaa3520acea2e0c60cf2eee328f11df502e74a8e4f725a3c3d03cce1a1b91975c83d"}]}}, @NL80211_ATTR_FRAME={0x24, 0x33, @mgmt_frame=@action_no_ack={@with_ht={{{}, {}, @device_b, @device_a, @random="30349edd292b"}}, @sa_query_req}}, @NL80211_ATTR_FRAME={0x149, 0x33, @mgmt_frame=@probe_request={@with_ht={{{}, {}, @device_a, @broadcast, @from_mac=@broadcast}}, @void, @val, @void, @void, @void, [{0xdd, 0x9f, "3b7b17c162663f574576a94259467d9eea13bc11883bf26b2cef2c6c5ef5c2c1bc0e5eb751a3d6d839a185df6c4d45a51033c285a584e044d9886e9ecfbeb8b6e87ae604279cef39230dbf6ac8212280ef0e07f01b29a32229213d5f76951351c409b14840569f9f32077be5bf2c7745a4e1b62b47c93667549eca98f68526d24f25ae43ceffe2cd9abe2c31ac41446182b69472d268174f2d693b52a47a45"}, {0xdd, 0x1c, "f5b0e90c8a8554236b6f1d60d6353a0634c5333ea0fa707c040115e9"}, {0xdd, 0x66, "4b4441f74dbb489e309cadc582f716928dd648df626500fef1d29bb191b3d8867213b871b502701fc5631c1eea36511045ecd0f4c3939b691c5ee269b8f026b16ea16d3a07d6c7cfb67c780264224d4deb2feb4a070db5f805a65449050674d3c4382dad533f"}]}}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_FRAME={0xaa0, 0x33, @data_frame={@no_qos=@type01, @a_msdu=[{@broadcast, @device_b, 0xa73, "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"}]}}]}, 0xec4}}, 0x0) 22:37:32 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x7, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:37:32 executing program 5: utimensat(0xffffffffffffffff, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) [ 485.914563][T19138] loop0: detected capacity change from 0 to 178 22:37:32 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000400)=[{0x0, 0x0, 0xfffffffffffffffe}]) futex(0x0, 0x8b, 0x0, 0x0, 0x0, 0x0) [ 485.992104][T19138] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 485.992104][T19138] 22:37:32 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0x2f4, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 486.038439][T19138] ERROR: (device loop0): remounting filesystem as read-only [ 486.078960][T19138] xtLookup: xtSearch returned -5 [ 486.095583][T19138] read_mapping_page failed! [ 486.116788][T19138] jfs_mount: diMount(ipaimap) failed w/rc = -5 22:37:32 executing program 3: socket$nl_sock_diag(0x10, 0x3, 0x4) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f000000a800), 0xffffffffffffffff) 22:37:32 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x8, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 486.128560][T19138] Mount JFS Failure: -5 [ 486.145544][T19138] jfs_mount failed w/return code = -5 22:37:32 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_PROBE_MESH_LINK(r0, &(0x7f0000001c00)={0x0, 0x0, &(0x7f0000001bc0)={&(0x7f0000000380)={0xec4, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_FRAME={0x285, 0x33, @mgmt_frame=@assoc_resp={@with_ht={{{}, {}, @broadcast, @broadcast}}, 0x0, 0x0, @default, @val={0x1, 0x3, [{}, {}, {}]}, @val={0x2d, 0x1a}, [{0xdd, 0xbd, "b2a6ebb464553a562694b5747cbb292ec95fbaab13511cc331fc6dac51c5ffac61d95757a99b3bac49319142bd32508757b9dd9631c4855c407fbcfb60d63f8efa74318c80e87ffa9a0d270b9ac3efdd87133db80f202f8297ff6a5e8b12e3c1ecb72f29470dc2a1f58996203cb32a3fb2db0f834ae5647a81c84b2c4a516e2d6c098619283da021a8852a62b23032c3ea21138ac9f1c329c2b1ce50d49701e72091327ef7e785f411044e251e19a7437a0c021585ca47893aea8fa1ab"}, {0xdd, 0xf, "5dddd9f69bd4cc4f38311a65b52527"}, {0xdd, 0xf6, "941c71dc4b7c49048704fe0e775b0d78326d9c037a14a00af797e86c69a41042165a73b934ba74453dddc74d09782562883e302b7210ce75ec3594ba52eb6485f236c4bd1a1c1834a0e2900d2bd8b8e925176993db1c5da50f8efb789ccbc33da2276262a090c0259c1bf5d1d20e406ba4c6e8196aa287adce8fcfffeae6ce95e580c4b949ed921cb37975ae60ccf2f30a1b0735c992365fb182f5bdd8c92526abee7a5cc798a7663b9397bc6274aba66414a61bf47f4ef3cd7185e4b407d1645a4065dc608e8ce9f12ee8aac9be9d1dafc7275393d367cf23857179c2d31b6290f1d8f5453547c30aeb76fd8d15ed21de67148446b3"}, {0xdd, 0x74, "a74f8326b1cb0ed1aab0b4d388a5a776a0c030ab06acbff734d924709bcb0314c249e6b32fecee00a33a87be8b2e80413bac87533c4744975c3f9c1e6f98c54e7501efb79ec945e043f4122d0d3ddfc1841bcaa3520acea2e0c60cf2eee328f11df502e74a8e4f725a3c3d03cce1a1b91975c83d"}]}}, @NL80211_ATTR_FRAME={0x24, 0x33, @mgmt_frame=@action_no_ack={@with_ht={{{}, {}, @device_b, @device_a, @random="30349edd292b"}}, @sa_query_req}}, @NL80211_ATTR_FRAME={0x149, 0x33, @mgmt_frame=@probe_request={@with_ht={{{0x0, 0x0, 0x4, 0x0, 0x0, 0x1}, {0x646c}, @device_a, @broadcast, @from_mac=@broadcast, {0x5, 0x20}}, @ver_80211n={0x0, 0x3, 0x0, 0x3}}, @void, @val, @void, @void, @void, [{0xdd, 0x9f, "3b7b17c162663f574576a94259467d9eea13bc11883bf26b2cef2c6c5ef5c2c1bc0e5eb751a3d6d839a185df6c4d45a51033c285a584e044d9886e9ecfbeb8b6e87ae604279cef39230dbf6ac8212280ef0e07f01b29a32229213d5f76951351c409b14840569f9f32077be5bf2c7745a4e1b62b47c93667549eca98f68526d24f25ae43ceffe2cd9abe2c31ac41446182b69472d268174f2d693b52a47a45"}, {0xdd, 0x1c, "f5b0e90c8a8554236b6f1d60d6353a0634c5333ea0fa707c040115e9"}, {0xdd, 0x66, "4b4441f74dbb489e309cadc582f716928dd648df626500fef1d29bb191b3d8867213b871b502701fc5631c1eea36511045ecd0f4c3939b691c5ee269b8f026b16ea16d3a07d6c7cfb67c780264224d4deb2feb4a070db5f805a65449050674d3c4382dad533f"}]}}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_FRAME={0xaa0, 0x33, @data_frame={@no_qos=@type01, @a_msdu=[{@broadcast, @device_b, 0xa73, "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"}]}}]}, 0xec4}}, 0x0) [ 486.230697][T19138] loop0: detected capacity change from 0 to 178 [ 486.246627][T19151] loop4: detected capacity change from 0 to 16383 [ 486.261385][T19138] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 486.261385][T19138] [ 486.364856][T19138] ERROR: (device loop0): remounting filesystem as read-only 22:37:33 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000380)={'syztnl1\x00', 0x0}) 22:37:33 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x9, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 486.431739][T19138] xtLookup: xtSearch returned -5 [ 486.432721][T19151] loop4: detected capacity change from 0 to 16383 [ 486.485947][T19138] read_mapping_page failed! [ 486.528566][T19138] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 486.557794][T19138] Mount JFS Failure: -5 [ 486.577561][T19138] jfs_mount failed w/return code = -5 22:37:33 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x5, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000280)="10c4645f01000000010000000100004e36049b", 0x13, 0xb206}], 0x0, &(0x7f0000000080)={[{@nointegrity}]}) 22:37:33 executing program 3: syz_mount_image$nfs4(&(0x7f0000004780), &(0x7f00000047c0)='./file0\x00', 0x0, 0x0, 0x0, 0x12200e, &(0x7f00000058c0)) 22:37:33 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0x4df, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:37:33 executing program 4: r0 = socket$nl_audit(0x10, 0x3, 0x9) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x10e, 0x484, 0x0, 0x0) 22:37:33 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0xa, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:37:33 executing program 5: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0}, 0x20) 22:37:33 executing program 4: r0 = fork() get_robust_list(r0, 0x0, &(0x7f0000000180)) [ 486.930444][T19195] loop0: detected capacity change from 0 to 178 22:37:33 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_PROBE_MESH_LINK(r0, &(0x7f0000001c00)={0x0, 0x0, &(0x7f0000001bc0)={&(0x7f0000000380)={0xec4, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_FRAME={0x285, 0x33, @mgmt_frame=@assoc_resp={@with_ht={{{}, {}, @broadcast, @broadcast}}, 0x0, 0x0, @default, @val={0x1, 0x3, [{}, {}, {}]}, @val={0x2d, 0x1a, {0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x1}}, [{0xdd, 0xbd, "b2a6ebb464553a562694b5747cbb292ec95fbaab13511cc331fc6dac51c5ffac61d95757a99b3bac49319142bd32508757b9dd9631c4855c407fbcfb60d63f8efa74318c80e87ffa9a0d270b9ac3efdd87133db80f202f8297ff6a5e8b12e3c1ecb72f29470dc2a1f58996203cb32a3fb2db0f834ae5647a81c84b2c4a516e2d6c098619283da021a8852a62b23032c3ea21138ac9f1c329c2b1ce50d49701e72091327ef7e785f411044e251e19a7437a0c021585ca47893aea8fa1ab"}, {0xdd, 0xf, "5dddd9f69bd4cc4f38311a65b52527"}, {0xdd, 0xf6, "941c71dc4b7c49048704fe0e775b0d78326d9c037a14a00af797e86c69a41042165a73b934ba74453dddc74d09782562883e302b7210ce75ec3594ba52eb6485f236c4bd1a1c1834a0e2900d2bd8b8e925176993db1c5da50f8efb789ccbc33da2276262a090c0259c1bf5d1d20e406ba4c6e8196aa287adce8fcfffeae6ce95e580c4b949ed921cb37975ae60ccf2f30a1b0735c992365fb182f5bdd8c92526abee7a5cc798a7663b9397bc6274aba66414a61bf47f4ef3cd7185e4b407d1645a4065dc608e8ce9f12ee8aac9be9d1dafc7275393d367cf23857179c2d31b6290f1d8f5453547c30aeb76fd8d15ed21de67148446b3"}, {0xdd, 0x74, "a74f8326b1cb0ed1aab0b4d388a5a776a0c030ab06acbff734d924709bcb0314c249e6b32fecee00a33a87be8b2e80413bac87533c4744975c3f9c1e6f98c54e7501efb79ec945e043f4122d0d3ddfc1841bcaa3520acea2e0c60cf2eee328f11df502e74a8e4f725a3c3d03cce1a1b91975c83d"}]}}, @NL80211_ATTR_FRAME={0x24, 0x33, @mgmt_frame=@action_no_ack={@with_ht={{{}, {}, @device_b, @device_a, @random="30349edd292b"}}, @sa_query_req}}, @NL80211_ATTR_FRAME={0x149, 0x33, @mgmt_frame=@probe_request={@with_ht={{{}, {}, @device_a, @broadcast, @from_mac=@broadcast}}, @void, @val, @void, @void, @void, [{0xdd, 0x9f, "3b7b17c162663f574576a94259467d9eea13bc11883bf26b2cef2c6c5ef5c2c1bc0e5eb751a3d6d839a185df6c4d45a51033c285a584e044d9886e9ecfbeb8b6e87ae604279cef39230dbf6ac8212280ef0e07f01b29a32229213d5f76951351c409b14840569f9f32077be5bf2c7745a4e1b62b47c93667549eca98f68526d24f25ae43ceffe2cd9abe2c31ac41446182b69472d268174f2d693b52a47a45"}, {0xdd, 0x1c, "f5b0e90c8a8554236b6f1d60d6353a0634c5333ea0fa707c040115e9"}, {0xdd, 0x66, "4b4441f74dbb489e309cadc582f716928dd648df626500fef1d29bb191b3d8867213b871b502701fc5631c1eea36511045ecd0f4c3939b691c5ee269b8f026b16ea16d3a07d6c7cfb67c780264224d4deb2feb4a070db5f805a65449050674d3c4382dad533f"}]}}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_FRAME={0xaa0, 0x33, @data_frame={@no_qos=@type01, @a_msdu=[{@broadcast, @device_b, 0xa73, "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"}]}}]}, 0xec4}}, 0x0) [ 487.018735][T19195] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 487.018735][T19195] 22:37:33 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0xb, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 487.079326][T19195] ERROR: (device loop0): remounting filesystem as read-only [ 487.152410][T19195] xtLookup: xtSearch returned -5 22:37:33 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0x6b0, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 487.185761][T19195] read_mapping_page failed! 22:37:33 executing program 5: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_SET_FEATURE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) sendmsg$AUDIT_TTY_SET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) [ 487.211575][T19195] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 487.249099][T19195] Mount JFS Failure: -5 22:37:33 executing program 4: syz_read_part_table(0x8, 0x6, &(0x7f0000000400)=[{&(0x7f0000000080)="ee0cdfa8c87d0911a9a6fbfaa7488c0d59da38396be20dfcabe97eca5b0e9b3ce6583caf2f46fb36fedeeb5a0c7974dd411a648b60fa5d0d", 0x38, 0xfffffffffffffffe}, {&(0x7f00000000c0)="91b28208f031b76ca042ab22edf7ee4af5cfcd362adcd87809b9fed2bb42801d98edce1cbf395fe1e8ef13194f5cb94687abcb8814b1c46059666138394311ed567c8863b5e7a0be6f1d357c833b3dfc85ddc1950766aa72a03251e661624ee54130502e5bec23361d3a7934b6a0008e0434b5bfd65ea58a7bfabf9cd220f2be68b1c7deb373ce14169ea14ffece280fcae70ef107ed07bbf8052e0cb1f7d7038a410e512445f2a2b507a1da7f760b278cae00704910a4a4dd6ba88f82320f1b9dd6e89b6cce571d0388e20ed6b292a5ccee67", 0xd3}, {&(0x7f00000001c0)="acc95bc8c925c49b5cc24e4a305674c718592c6f25f3eab1c6553ef27da081d326a3edf5b1905e6b5030b371a5d5f67339beeb64a22ef9078b724bf818e0017b20e3bc4a9b80387afbe19c978b11c87d4eaa0611db1cc175c36cfab5a7addaf1ce5fb7ec0449e36b2a84089eef76eae7bbffe40ab37d8e068580416554011bba", 0x80, 0x3}, {&(0x7f0000000240)="ab586bd0c4e1405ec805285bbde8dbd506fa02ee3db42cee289fcb73813f74d1832cb9e7adce47ca801d8226e3c1dbdf5039b0d7c057957dda32cb34a75e3103a05c0ce9820c336eb4f893e7c69cf3786bd22dccc23b1c1ad73a14eaddb63a82c4dac3bbd1c5062cf0731d9809712700e118bcaca1e0a80765c30bd8ecd40a2462cb955540d41577ea7f8ba3d7a87ddf601f6403a4ccec54fe89964eb2277f2d6ade1007cb713ca17eeb1350", 0xac, 0x5}, {&(0x7f0000000300), 0x0, 0x9}, {&(0x7f0000000340)="6eda3c9d913ad9b054ef5409c287fc76c72b4857f45a70b366c4a99337fb4648a9b9a14ec175fe24f3b3f6eca58cc54bdbd92bc9466448f68b7e66ac6511f62cb26427de452f110f76b2f9d2f444c6dd86b7b508e7837ae28347a93cebf95d9bc06adcdb81c8a323b93b4e1f9d1c0241ef272dc7c7209d0b406bac0d27ad2bb856c538d0185868b3ef97777ec6b2b256b50771a3e30ec435637393f5ac65c09a5af636acde24c8992e1af0f95856930cf1b4eb6bbb6e3884b121605b4100ec", 0xbf, 0x7ff}]) socket$alg(0x26, 0x5, 0x0) [ 487.274957][T19195] jfs_mount failed w/return code = -5 [ 487.359443][T19195] loop0: detected capacity change from 0 to 178 [ 487.404006][T19195] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 487.404006][T19195] [ 487.446152][T19195] ERROR: (device loop0): remounting filesystem as read-only [ 487.497701][T19195] xtLookup: xtSearch returned -5 [ 487.518691][T19195] read_mapping_page failed! [ 487.540259][T19195] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 487.574983][T19195] Mount JFS Failure: -5 [ 487.588909][T19223] loop4: detected capacity change from 0 to 16383 [ 487.604885][T19195] jfs_mount failed w/return code = -5 22:37:34 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x6, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000280)="10c4645f01000000010000000100004e36049b", 0x13, 0xb206}], 0x0, &(0x7f0000000080)={[{@nointegrity}]}) 22:37:34 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) sendmsg$AUDIT_SIGNAL_INFO(r0, 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000001c0)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000000140)="09057245e9e75a6fefd9bfb0ecb31322cd313922d4401d386ccfcefd579a4586aba8705220b78a278b724ecead928af2d1f9d14fccc32ebd33d3f0", 0x3b, r0}, 0x68) r1 = syz_mount_image$nfs4(&(0x7f0000000240), &(0x7f0000000280)='./file0\x00', 0x1, 0x5, &(0x7f00000006c0)=[{&(0x7f00000002c0)="1a39276a02695bcfd3c727d65ed65843a6f9c879dc9467a2b2b912b38b042220fd0be94644b22ffef5ac86acd6bb6094db03d5d3b1287cad77ff5603945199c52f7af3deffae9356ac594cbc456bc0aeb37003ef192ad6fff3aa84f78ad11682a0ffe6b2dfdcd71831daba0c5cb7a35d5d0503a51a79a867fb58171ab3083f55f362339f9abfe7a55bb5cafab49ebbf8e007fa3cc17d3b218ecb5fb2be36a2c95d56d22b40badb8336a2528e9ae9a3d3d2d533fbf45418c4bf9969300c451b4ea8c511206062d8db8a494cf4587546d1f5e62184ad675a", 0xd7, 0x101}, {&(0x7f0000000440)="221262df2cedbdec8ce2bfdfde14b711b891820ab846973bf4ed0236e35434f8a8e6d9e7431be3df0c5188710ccabb4bc559f9b4b34cb37e4c47316710be73f53093a23c3df93364e234552b7cfc559d56ed8faad381802dee1f6a5505fdbeca9d8ac39b782b115abde82a6b1bf52a0783c5866116ceb65d302ace1ecf1792a54cbf36f93925b30961fae518b352bdd03c9b06df2fe1ffaa6fbe6607f77f265289b98762ccdf55957520", 0xaa, 0x5}, {&(0x7f0000000500), 0x0, 0x8}, {&(0x7f0000000540)="bc72ead7fec93b5c448ac78895745db60992d926fe43509a546a687985daab2646d6afd7597a744927a742f5f661232b191893dd4f06571914f6e5e9c439c7f35552154b5a08a68da0bbfa888185f5d989b68bc4152f32dc8759bba91fb36a", 0x5f, 0x3}, {&(0x7f00000005c0)="d64373e8545e45bdf338f93d59", 0xd}], 0x1, &(0x7f0000000780)={[{'/*!!$%/-,*\xaf}-8 '}, {'\'!,\')'}], [{@subj_type={'subj_type', 0x3d, '/dev/full\x00'}}, {@pcr={'pcr', 0x3d, 0x1b}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@fsmagic={'fsmagic', 0x3d, 0x3f}}, {@fsuuid={'fsuuid', 0x3d, {[0x64, 0x32, 0x64, 0x0, 0x0, 0x0, 0x35, 0x37], 0x2d, [0x31, 0x37, 0x0, 0x32], 0x2d, [0x0, 0x62, 0x64, 0x30], 0x2d, [0x56, 0x62, 0x0, 0x32], 0x2d, [0x39, 0x32, 0x64, 0x32, 0x37, 0x35, 0x0, 0x35]}}}, {@uid_gt={'uid>', 0xee01}}, {@smackfshat={'smackfshat', 0x3d, '/dev/full\x00'}}, {@dont_appraise}]}) fchmodat(r1, &(0x7f00000008c0)='./file0\x00', 0x118) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000e80), 0x200000, 0x0) accept(r2, &(0x7f00000010c0)=@nfc_llcp, &(0x7f0000001140)=0x80) 22:37:34 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0xf, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:37:34 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r0) sendmsg$NL80211_CMD_PROBE_MESH_LINK(r0, &(0x7f0000001c00)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000001bc0)={&(0x7f0000000380)={0xec4, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_FRAME={0x285, 0x33, @mgmt_frame=@assoc_resp={@with_ht={{{}, {}, @broadcast, @broadcast}}, 0x0, 0x0, @default, @val={0x1, 0x3, [{}, {}, {}]}, @val={0x2d, 0x1a}, [{0xdd, 0xbd, "b2a6ebb464553a562694b5747cbb292ec95fbaab13511cc331fc6dac51c5ffac61d95757a99b3bac49319142bd32508757b9dd9631c4855c407fbcfb60d63f8efa74318c80e87ffa9a0d270b9ac3efdd87133db80f202f8297ff6a5e8b12e3c1ecb72f29470dc2a1f58996203cb32a3fb2db0f834ae5647a81c84b2c4a516e2d6c098619283da021a8852a62b23032c3ea21138ac9f1c329c2b1ce50d49701e72091327ef7e785f411044e251e19a7437a0c021585ca47893aea8fa1ab"}, {0xdd, 0xf, "5dddd9f69bd4cc4f38311a65b52527"}, {0xdd, 0xf6, "941c71dc4b7c49048704fe0e775b0d78326d9c037a14a00af797e86c69a41042165a73b934ba74453dddc74d09782562883e302b7210ce75ec3594ba52eb6485f236c4bd1a1c1834a0e2900d2bd8b8e925176993db1c5da50f8efb789ccbc33da2276262a090c0259c1bf5d1d20e406ba4c6e8196aa287adce8fcfffeae6ce95e580c4b949ed921cb37975ae60ccf2f30a1b0735c992365fb182f5bdd8c92526abee7a5cc798a7663b9397bc6274aba66414a61bf47f4ef3cd7185e4b407d1645a4065dc608e8ce9f12ee8aac9be9d1dafc7275393d367cf23857179c2d31b6290f1d8f5453547c30aeb76fd8d15ed21de67148446b3"}, {0xdd, 0x74, "a74f8326b1cb0ed1aab0b4d388a5a776a0c030ab06acbff734d924709bcb0314c249e6b32fecee00a33a87be8b2e80413bac87533c4744975c3f9c1e6f98c54e7501efb79ec945e043f4122d0d3ddfc1841bcaa3520acea2e0c60cf2eee328f11df502e74a8e4f725a3c3d03cce1a1b91975c83d"}]}}, @NL80211_ATTR_FRAME={0x24, 0x33, @mgmt_frame=@action_no_ack={@with_ht={{{}, {}, @device_b, @device_a, @random="30349edd292b"}}, @sa_query_req}}, @NL80211_ATTR_FRAME={0x149, 0x33, @mgmt_frame=@probe_request={@with_ht={{{}, {}, @device_a, @broadcast, @from_mac=@broadcast}}, @void, @val, @void, @void, @void, [{0xdd, 0x9f, "3b7b17c162663f574576a94259467d9eea13bc11883bf26b2cef2c6c5ef5c2c1bc0e5eb751a3d6d839a185df6c4d45a51033c285a584e044d9886e9ecfbeb8b6e87ae604279cef39230dbf6ac8212280ef0e07f01b29a32229213d5f76951351c409b14840569f9f32077be5bf2c7745a4e1b62b47c93667549eca98f68526d24f25ae43ceffe2cd9abe2c31ac41446182b69472d268174f2d693b52a47a45"}, {0xdd, 0x1c, "f5b0e90c8a8554236b6f1d60d6353a0634c5333ea0fa707c040115e9"}, {0xdd, 0x66, "4b4441f74dbb489e309cadc582f716928dd648df626500fef1d29bb191b3d8867213b871b502701fc5631c1eea36511045ecd0f4c3939b691c5ee269b8f026b16ea16d3a07d6c7cfb67c780264224d4deb2feb4a070db5f805a65449050674d3c4382dad533f"}]}}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_FRAME={0xaa0, 0x33, @data_frame={@no_qos=@type01, @a_msdu=[{@broadcast, @device_b, 0xa73, "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"}]}}]}, 0xec4}}, 0x0) 22:37:34 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0x89b, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 487.759607][T19223] loop4: detected capacity change from 0 to 16383 22:37:34 executing program 4: syz_mount_image$nfs4(0x0, 0x0, 0x0, 0x1, &(0x7f00000006c0)=[{&(0x7f00000003c0)="02", 0x1}], 0x0, 0x0) [ 487.930432][T19244] loop3: detected capacity change from 0 to 1 22:37:34 executing program 5: perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) 22:37:34 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x10, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 488.022394][T19244] nfs4: Unknown parameter '/*!!$%/-' [ 488.073992][T19253] loop0: detected capacity change from 0 to 178 [ 488.129906][T19244] loop3: detected capacity change from 0 to 1 22:37:34 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0xa6c, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 488.208227][T19253] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 488.208227][T19253] 22:37:34 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000480), 0x4080, 0x0) [ 488.278428][T19253] ERROR: (device loop0): remounting filesystem as read-only [ 488.326335][T19253] xtLookup: xtSearch returned -5 [ 488.360149][T19253] read_mapping_page failed! 22:37:35 executing program 5: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) [ 488.393940][T19253] jfs_mount: diMount(ipaimap) failed w/rc = -5 22:37:35 executing program 4: socket$nl_sock_diag(0x10, 0x3, 0x4) socket$nl_route(0x10, 0x3, 0x0) [ 488.467876][T19253] Mount JFS Failure: -5 [ 488.502410][T19253] jfs_mount failed w/return code = -5 [ 488.601716][T19253] loop0: detected capacity change from 0 to 178 [ 488.658018][T19253] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 488.658018][T19253] [ 488.716655][T19253] ERROR: (device loop0): remounting filesystem as read-only [ 488.767801][T19253] xtLookup: xtSearch returned -5 [ 488.772871][T19253] read_mapping_page failed! [ 488.794178][T19253] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 488.826523][T19253] Mount JFS Failure: -5 [ 488.830778][T19253] jfs_mount failed w/return code = -5 22:37:35 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x7, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000280)="10c4645f01000000010000000100004e36049b", 0x13, 0xb206}], 0x0, &(0x7f0000000080)={[{@nointegrity}]}) 22:37:35 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x11, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:37:35 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0xc57, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:37:35 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r0) sendmsg$NL80211_CMD_PROBE_MESH_LINK(r0, &(0x7f0000001c00)={0x0, 0x0, &(0x7f0000001bc0)={0x0}}, 0x0) 22:37:35 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000140)={&(0x7f0000000040)={0x14}, 0x14}}, 0x0) 22:37:35 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x40) 22:37:35 executing program 5: socket(0x0, 0x80017, 0x0) 22:37:35 executing program 4: mlock(&(0x7f0000ffc000/0x2000)=nil, 0x2000) 22:37:35 executing program 3: getsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, 0x0, 0x0) 22:37:36 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0xf0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 489.391188][T19309] loop0: detected capacity change from 0 to 178 [ 489.497036][T19309] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 489.497036][T19309] 22:37:36 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0xe28, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 489.620978][T19309] ERROR: (device loop0): remounting filesystem as read-only 22:37:36 executing program 4: pipe2(0x0, 0x0) syz_genetlink_get_family_id$mptcp(0x0, 0xffffffffffffffff) [ 489.696402][T19309] xtLookup: xtSearch returned -5 [ 489.707833][T19309] read_mapping_page failed! [ 489.722705][T19309] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 489.750225][T19309] Mount JFS Failure: -5 [ 489.774872][T19309] jfs_mount failed w/return code = -5 [ 489.849074][T19309] loop0: detected capacity change from 0 to 178 [ 489.871334][T19309] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 489.871334][T19309] [ 489.916381][T19309] ERROR: (device loop0): remounting filesystem as read-only [ 489.961699][T19309] xtLookup: xtSearch returned -5 [ 489.979433][T19309] read_mapping_page failed! [ 489.997047][T19309] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 490.027389][T19309] Mount JFS Failure: -5 [ 490.046184][T19309] jfs_mount failed w/return code = -5 22:37:36 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000280)="10c4645f01000000010000000100004e36049b", 0x13, 0xb206}], 0x0, &(0x7f0000000080)={[{@nointegrity}]}) 22:37:36 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$mptcp(0x0, 0xffffffffffffffff) sendmsg$NLBL_MGMT_C_ADD(r0, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x106040}, 0xc, &(0x7f0000000a00)={0x0}}, 0x0) 22:37:36 executing program 4: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000980)={'wpan1\x00'}) 22:37:36 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0x1013, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:37:36 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x300, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:37:36 executing program 3: sendmsg$IEEE802154_LIST_IFACE(0xffffffffffffffff, 0x0, 0x0) 22:37:37 executing program 3: syz_read_part_table(0x8, 0x6, &(0x7f0000000400)=[{&(0x7f0000000080)="ee0cdfa8c87d0911a9a6fbfaa7488c0d59da38396be20dfcabe97eca5b0e9b3ce6583caf2f46fb36fedeeb5a0c7974dd411a648b60fa5d0d", 0x38, 0xfffffffffffffffe}, {&(0x7f00000000c0)="91b28208f031b76ca042ab22edf7ee4af5cfcd362adcd87809b9fed2bb42801d98edce1cbf395fe1e8ef13194f5cb94687abcb8814b1c46059666138394311ed567c8863b5e7a0be6f1d357c833b3dfc85ddc1950766aa72a03251e661624ee54130502e5bec23361d3a7934b6a0008e0434b5bfd65ea58a7bfabf9cd220f2be68b1c7deb373ce14169ea14ffece280fcae70ef107ed07bbf8052e0cb1f7d7038a410e512445f2a2b507a1da7f760b278cae00704910a4a4dd6ba88f82320f1b9dd6e89b6cce571d0388e20ed6b292a5ccee67", 0xd3}, {&(0x7f00000001c0)="acc95bc8c925c49b5cc24e4a305674c718592c6f25f3eab1c6553ef27da081d326a3edf5b1905e6b5030b371a5d5f67339beeb64a22ef9078b724bf818e0017b20e3bc4a9b80387afbe19c978b11c87d4eaa0611db1cc175c36cfab5a7addaf1ce5fb7ec0449e36b2a84089eef76eae7bbffe40ab37d8e068580416554011bba", 0x80, 0x3}, {&(0x7f0000000240)="ab586bd0c4e1405ec805285bbde8dbd506fa02ee3db42cee289fcb73813f74d1832cb9e7adce47ca801d8226e3c1dbdf5039b0d7c057957dda32cb34a75e3103a05c0ce9820c336eb4f893e7c69cf3786bd22dccc23b1c1ad73a14eaddb63a82c4dac3bbd1c5062cf0731d9809712700e118bcaca1e0a80765c30bd8ecd40a2462cb955540d41577ea7f8ba3d7a87ddf601f6403a4ccec54fe89964eb2277f2d6ade1007cb713ca17eeb1350", 0xac, 0x5}, {&(0x7f0000000300), 0x0, 0x9}, {&(0x7f0000000340)="6eda3c9d913ad9b054ef5409c287fc76c72b4857f45a70b366c4a99337fb4648a9b9a14ec175fe24f3b3f6eca58cc54bdbd92bc9466448f68b7e66ac6511f62cb26427de452f110f76b2f9d2f444c6dd86b7b508e7837ae28347a93cebf95d9bc06adcdb81c8a323b93b4e1f9d1c0241ef272dc7c7209d0b406bac0d27ad2bb856c538d0185868b3ef97777ec6b2b256b50771a3e30ec435637393f5ac65c09a5af636acde24c8992e1af0f95856930cf1b4eb6bbb6e3884b121605b4100ec", 0xbf, 0x7ff}]) futex(0x0, 0x8b, 0x0, 0x0, &(0x7f0000000500), 0x4) socket$alg(0x26, 0x5, 0x0) nanosleep(&(0x7f0000000000)={0x77359400}, &(0x7f0000000040)) 22:37:37 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) [ 490.502738][T19349] loop0: detected capacity change from 0 to 178 22:37:37 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x4ae, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:37:37 executing program 5: pipe2(&(0x7f0000000100), 0x0) [ 490.633823][T19349] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 490.633823][T19349] [ 490.707622][T19355] loop3: detected capacity change from 0 to 16383 [ 490.718948][T19349] ERROR: (device loop0): remounting filesystem as read-only 22:37:37 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0x11e4, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:37:37 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmmsg$sock(r0, &(0x7f0000000d80)=[{{&(0x7f0000000a80)=@nfc, 0x80, &(0x7f0000000d40)=[{0x0}, {0x0}], 0x2}}], 0x1, 0x0) [ 490.760711][T19349] xtLookup: xtSearch returned -5 [ 490.780517][T19349] read_mapping_page failed! [ 490.798046][T19349] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 490.818934][T19349] Mount JFS Failure: -5 [ 490.832292][T19349] jfs_mount failed w/return code = -5 [ 490.928417][T19349] loop0: detected capacity change from 0 to 178 [ 490.955539][T19349] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 490.955539][T19349] [ 491.002356][T19349] ERROR: (device loop0): remounting filesystem as read-only [ 491.036381][T19349] xtLookup: xtSearch returned -5 [ 491.063908][T19349] read_mapping_page failed! [ 491.084335][T19349] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 491.123992][T19349] Mount JFS Failure: -5 [ 491.143194][T19349] jfs_mount failed w/return code = -5 22:37:37 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x9, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000280)="10c4645f01000000010000000100004e36049b", 0x13, 0xb206}], 0x0, &(0x7f0000000080)={[{@nointegrity}]}) 22:37:37 executing program 5: syz_genetlink_get_family_id$gtp(&(0x7f0000000840), 0xffffffffffffffff) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, 0x0) 22:37:37 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x500, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:37:37 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r0, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x106040}, 0xc, &(0x7f0000000a00)={0x0}}, 0x0) 22:37:38 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0x13cf, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:37:38 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000012c0)={0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000003740), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000002680)={0xffffffffffffffff}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000002680)) sendmsg$unix(r0, &(0x7f00000037c0)={0x0, 0x0, &(0x7f00000036c0)=[{&(0x7f0000001380)="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", 0x1000}, {&(0x7f0000002380)="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", 0xec1}], 0x2, &(0x7f0000003780)=[@rights={{0x18, 0x1, 0x1, [r1, r2]}}], 0x18}, 0x0) [ 491.520596][T19391] loop0: detected capacity change from 0 to 178 [ 491.529823][T19355] loop3: detected capacity change from 0 to 16383 [ 491.593618][T19391] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 491.593618][T19391] [ 491.631008][T19391] ERROR: (device loop0): remounting filesystem as read-only [ 491.685633][T19391] xtLookup: xtSearch returned -5 22:37:38 executing program 3: pipe2(0x0, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f0000000180), 0xffffffffffffffff) 22:37:38 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000780)={0x14, 0x0, 0x4}, 0x14}}, 0x0) syz_genetlink_get_family_id$nl802154(&(0x7f00000008c0), r0) 22:37:38 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x600, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:37:38 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) link(&(0x7f0000000400)='./file0/file0\x00', 0x0) [ 491.706982][T19391] read_mapping_page failed! [ 491.711726][T19391] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 491.718536][T19391] Mount JFS Failure: -5 [ 491.722919][T19391] jfs_mount failed w/return code = -5 [ 491.801891][T19391] loop0: detected capacity change from 0 to 178 [ 491.830406][T19391] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 491.830406][T19391] 22:37:38 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0x15a0, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 491.894359][T19391] ERROR: (device loop0): remounting filesystem as read-only 22:37:38 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000001cc0), 0x4) [ 491.956448][T19391] xtLookup: xtSearch returned -5 [ 491.961445][T19391] read_mapping_page failed! [ 491.965979][T19391] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 492.025623][T19391] Mount JFS Failure: -5 [ 492.036277][T19391] jfs_mount failed w/return code = -5 22:37:38 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xa, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000280)="10c4645f01000000010000000100004e36049b", 0x13, 0xb206}], 0x0, &(0x7f0000000080)={[{@nointegrity}]}) 22:37:38 executing program 4: ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wpan4\x00'}) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f00000004c0), r0) r1 = getpgrp(0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000500)='ns/net\x00') read$FUSE(0xffffffffffffffff, &(0x7f0000000540)={0x2020}, 0x2020) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f00000027c0), r0) syz_open_procfs$namespace(r1, &(0x7f0000002ac0)='ns/mnt\x00') 22:37:38 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x700, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:37:38 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_PORT_POOL_SET(r0, &(0x7f0000002300)={&(0x7f0000002140)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000022c0)={&(0x7f00000021c0)={0x14, 0x0, 0x4}, 0x14}}, 0x0) 22:37:38 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(0x0, r0) syz_open_procfs$namespace(0x0, &(0x7f0000000500)='ns/net\x00') 22:37:38 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0x178b, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:37:39 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x900, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:37:39 executing program 5: bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff, 0xf6d7a805de12cf1}, 0x10) 22:37:39 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSETELEM(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0xd, 0xa, 0x5}, 0x14}}, 0x0) [ 492.439273][T19439] loop0: detected capacity change from 0 to 178 [ 492.490616][T19439] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 492.490616][T19439] [ 492.537194][T19439] ERROR: (device loop0): remounting filesystem as read-only [ 492.595534][T19439] xtLookup: xtSearch returned -5 22:37:39 executing program 3: r0 = socket$vsock_stream(0x28, 0x1, 0x0) sendmmsg(r0, &(0x7f0000007a40)=[{{&(0x7f0000002a80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random="cf7c99710911"}, 0x80, &(0x7f0000002cc0)=[{0x0}, {0x0}], 0x2, &(0x7f0000002d00)=[{0x10, 0x109}, {0x18, 0x0, 0x0, "e4"}], 0x28}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) [ 492.650196][T19439] read_mapping_page failed! [ 492.711970][T19439] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 492.789241][T19439] Mount JFS Failure: -5 22:37:39 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0xa00, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 492.814607][T19439] jfs_mount failed w/return code = -5 22:37:39 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x9) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000000c0)={0x0}}, 0x0) [ 492.898514][T19439] loop0: detected capacity change from 0 to 178 [ 492.937699][T19439] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 492.937699][T19439] [ 492.967834][T19439] ERROR: (device loop0): remounting filesystem as read-only [ 492.998619][T19439] xtLookup: xtSearch returned -5 [ 493.013410][T19439] read_mapping_page failed! [ 493.041866][T19439] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 493.092325][T19439] Mount JFS Failure: -5 22:37:39 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xc, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000280)="10c4645f01000000010000000100004e36049b", 0x13, 0xb206}], 0x0, &(0x7f0000000080)={[{@nointegrity}]}) 22:37:39 executing program 4: creat(&(0x7f0000000100)='./file0\x00', 0x0) creat(&(0x7f0000000600)='./file0/file1\x00', 0x0) 22:37:39 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0x195c, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:37:39 executing program 3: lchown(&(0x7f0000000540)='./file0\x00', 0xffffffffffffffff, 0x0) 22:37:39 executing program 5: r0 = socket$pppoe(0x18, 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) [ 493.121368][T19439] jfs_mount failed w/return code = -5 22:37:39 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0xb00, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:37:40 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000087c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bind$unix(r0, &(0x7f0000000380)=@file={0x1, './file0\x00'}, 0x6e) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) pipe(&(0x7f0000000400)) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, 0x0) sendmsg$BATADV_CMD_TP_METER(0xffffffffffffffff, 0x0, 0x0) 22:37:40 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0x1b47, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:37:40 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0xf00, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:37:40 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSETELEM(r0, &(0x7f0000000140)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14}, 0x14}}, 0x0) 22:37:40 executing program 5: r0 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(r0, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}, 0x4, 0x0, 0x0, 0x4}}, 0x2e) [ 493.473437][T19483] loop0: detected capacity change from 0 to 178 [ 493.509546][T19483] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 493.509546][T19483] [ 493.545224][T19483] ERROR: (device loop0): remounting filesystem as read-only [ 493.592849][T19483] xtLookup: xtSearch returned -5 [ 493.622219][T19483] read_mapping_page failed! [ 493.647817][T19483] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 493.679286][T19483] Mount JFS Failure: -5 [ 493.712211][T19483] jfs_mount failed w/return code = -5 22:37:40 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x1100, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 493.800036][T19483] loop0: detected capacity change from 0 to 178 [ 493.879035][T19483] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 493.879035][T19483] [ 493.924782][T19483] ERROR: (device loop0): remounting filesystem as read-only [ 493.948564][T19483] xtLookup: xtSearch returned -5 [ 493.968748][T19483] read_mapping_page failed! [ 493.984572][T19483] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 494.005581][T19483] Mount JFS Failure: -5 [ 494.022134][T19483] jfs_mount failed w/return code = -5 22:37:40 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000280)="10c4645f01000000010000000100004e36049b", 0x13, 0xb206}], 0x0, &(0x7f0000000080)={[{@nointegrity}]}) 22:37:40 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000087c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@file={0x1, './file0\x00'}, 0x6e) 22:37:40 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x40, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}, @NFT_MSG_DELFLOWTABLE={0x30, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x4}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}]}], {0x14, 0x10}}, 0xb8}}, 0x0) 22:37:40 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000087c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bind$unix(r0, &(0x7f0000000380)=@file={0x1, './file0\x00'}, 0x6e) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) pipe(&(0x7f0000000400)) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, 0x0) sendmsg$BATADV_CMD_TP_METER(0xffffffffffffffff, 0x0, 0x0) 22:37:40 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0x1d18, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:37:40 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x3f00, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 494.465061][T19528] loop0: detected capacity change from 0 to 178 22:37:41 executing program 4: bpf$PROG_LOAD(0x13, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 22:37:41 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSETELEM(r0, &(0x7f0000000140)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x20, 0xd, 0xa, 0x5, 0x0, 0x0, {}, [@NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}]}, 0x20}}, 0x0) 22:37:41 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0xae04, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 494.593233][T19528] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 494.593233][T19528] [ 494.691418][T19528] ERROR: (device loop0): remounting filesystem as read-only [ 494.710818][T19528] xtLookup: xtSearch returned -5 [ 494.735109][T19528] read_mapping_page failed! [ 494.753886][T19528] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 494.781763][T19528] Mount JFS Failure: -5 [ 494.800004][T19528] jfs_mount failed w/return code = -5 22:37:41 executing program 3: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) bind(r0, 0x0, 0x0) 22:37:41 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0xf000, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:37:41 executing program 4: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) bind(r0, &(0x7f00000000c0)=@ethernet={0x0, @multicast}, 0x80) [ 494.875201][T19528] loop0: detected capacity change from 0 to 178 [ 494.935216][T19528] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 494.935216][T19528] [ 495.010573][T19528] ERROR: (device loop0): remounting filesystem as read-only [ 495.057269][T19528] xtLookup: xtSearch returned -5 [ 495.076078][T19528] read_mapping_page failed! [ 495.095883][T19528] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 495.118583][T19528] Mount JFS Failure: -5 [ 495.134940][T19528] jfs_mount failed w/return code = -5 22:37:41 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000280)="10c4645f01000000010000000100004e36049b", 0x13, 0xb206}], 0x0, &(0x7f0000000080)={[{@nointegrity}]}) 22:37:41 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0x1f03, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:37:41 executing program 5: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/net\x00') ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, 0x0) 22:37:41 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, &(0x7f0000000440)={'sit0\x00', 0x0}) 22:37:41 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x30000, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:37:42 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000380)={0x17, 0x0, 0x20, 0x200, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5}, 0x40) [ 495.566426][T19563] loop0: detected capacity change from 0 to 178 22:37:42 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x34000, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:37:42 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000080)=@mangle={'mangle\x00', 0x1f, 0x6, 0x650, 0x318, 0x0, 0x318, 0xe8, 0x1d8, 0x580, 0x580, 0x580, 0x580, 0x580, 0x6, 0x0, {[{{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'team0\x00', 'veth0_to_bridge\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@empty}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @local, [], [], 'wg0\x00', 'wg0\x00'}, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private2, @ipv6=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @private1, [], [], 'ip6gre0\x00', 'veth0_to_batadv\x00'}, 0x0, 0x118, 0x140, 0x0, {}, [@common=@dst={{0x48}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@loopback}}}, {{@ipv6={@mcast1, @private1, [], [], 'team_slave_0\x00', 'bond0\x00'}, 0x0, 0x138, 0x180, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x0, 0x0, 0x0, 0x0, @remote, @ipv4={'\x00', '\xff\xff', @remote}, @private2}}]}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv6=@mcast2, @ipv4=@broadcast}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6b0) 22:37:42 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_GET(r0, &(0x7f00000009c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000940)={0x18, 0x1, 0x7, 0x201, 0x0, 0x0, {}, [@NFACCT_FILTER={0x4}]}, 0x18}}, 0x0) [ 495.674517][T19563] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 495.674517][T19563] 22:37:42 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0x20d4, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 495.768364][T19563] ERROR: (device loop0): remounting filesystem as read-only [ 495.871769][T19563] xtLookup: xtSearch returned -5 [ 495.906014][T19563] read_mapping_page failed! [ 495.910775][T19563] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 495.956874][T19563] Mount JFS Failure: -5 [ 495.964007][T19575] x_tables: duplicate underflow at hook 1 [ 496.005621][T19563] jfs_mount failed w/return code = -5 [ 496.083196][T19563] loop0: detected capacity change from 0 to 178 [ 496.137155][T19563] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 496.137155][T19563] [ 496.255821][T19563] ERROR: (device loop0): remounting filesystem as read-only [ 496.303831][T19563] xtLookup: xtSearch returned -5 [ 496.354960][T19563] read_mapping_page failed! [ 496.364864][T19563] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 496.389319][T19563] Mount JFS Failure: -5 22:37:43 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@gettclass={0x24, 0x2a, 0x303}, 0x24}}, 0x0) 22:37:43 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000140)={'wpan4\x00'}) [ 496.400939][T19563] jfs_mount failed w/return code = -5 22:37:43 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x10, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000280)="10c4645f01000000010000000100004e36049b", 0x13, 0xb206}], 0x0, &(0x7f0000000080)={[{@nointegrity}]}) 22:37:43 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x400300, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:37:43 executing program 4: pipe(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0x1c00000) 22:37:43 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0x22bf, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:37:43 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x9}, 0x14}}, 0x0) 22:37:43 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'memory'}]}, 0x8) 22:37:43 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000087c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, 0x0, 0x0) 22:37:43 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0xf0ffff, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 496.893402][T19607] loop0: detected capacity change from 0 to 178 22:37:43 executing program 3: socketpair(0x2, 0x0, 0x7ff, &(0x7f0000000000)) [ 497.015641][T19607] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 497.015641][T19607] 22:37:43 executing program 5: pipe(&(0x7f0000000800)={0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, 0xffffffffffffffff) 22:37:43 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0x2490, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 497.072976][T19607] ERROR: (device loop0): remounting filesystem as read-only [ 497.127515][T19607] xtLookup: xtSearch returned -5 [ 497.157493][T19607] read_mapping_page failed! 22:37:43 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSETELEM(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x20, 0xd, 0xa, 0x5, 0x0, 0x0, {}, [@NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}]}, 0x20}}, 0x0) [ 497.180935][T19607] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 497.211091][T19607] Mount JFS Failure: -5 [ 497.234355][T19607] jfs_mount failed w/return code = -5 [ 497.320261][T19607] loop0: detected capacity change from 0 to 178 [ 497.333160][T19607] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 497.333160][T19607] [ 497.353793][T19607] ERROR: (device loop0): remounting filesystem as read-only [ 497.375751][T19607] xtLookup: xtSearch returned -5 [ 497.380726][T19607] read_mapping_page failed! [ 497.385262][T19607] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 497.405916][T19607] Mount JFS Failure: -5 [ 497.410532][T19607] jfs_mount failed w/return code = -5 22:37:44 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x11, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000280)="10c4645f01000000010000000100004e36049b", 0x13, 0xb206}], 0x0, &(0x7f0000000080)={[{@nointegrity}]}) 22:37:44 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x1000000, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:37:44 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) 22:37:44 executing program 5: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) getsockname(r0, &(0x7f0000000000)=@generic, &(0x7f0000000080)=0x80) 22:37:44 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) accept(r0, 0x0, 0x0) 22:37:44 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x4, &(0x7f00000000c0)=""/4, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 22:37:44 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x2000000, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:37:44 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0x267b, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:37:44 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x14) sendmsg$GTP_CMD_DELPDP(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) [ 497.885743][T19643] loop0: detected capacity change from 0 to 178 [ 497.908689][T19643] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 497.908689][T19643] [ 497.933427][T19643] ERROR: (device loop0): remounting filesystem as read-only [ 497.957595][T19643] xtLookup: xtSearch returned -5 [ 497.976216][T19643] read_mapping_page failed! [ 497.993201][T19643] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 498.016890][T19643] Mount JFS Failure: -5 22:37:44 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_ASSOCIATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={0x1c, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) [ 498.054523][T19643] jfs_mount failed w/return code = -5 22:37:44 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x3000000, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 498.176118][T19643] loop0: detected capacity change from 0 to 178 [ 498.226307][T19643] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 498.226307][T19643] 22:37:44 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000500)=ANY=[@ANYBLOB="18ded120df6b09135492f986a999a02ccc"]) [ 498.318644][T19643] ERROR: (device loop0): remounting filesystem as read-only [ 498.371271][T19643] xtLookup: xtSearch returned -5 [ 498.397069][T19643] read_mapping_page failed! [ 498.403257][T19643] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 498.410010][T19643] Mount JFS Failure: -5 [ 498.414683][T19643] jfs_mount failed w/return code = -5 22:37:45 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x23, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000280)="10c4645f01000000010000000100004e36049b", 0x13, 0xb206}], 0x0, &(0x7f0000000080)={[{@nointegrity}]}) 22:37:45 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x4000000, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:37:45 executing program 3: bpf$PROG_LOAD(0xd, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 22:37:45 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_GET(r0, &(0x7f00000009c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000940)={0x28, 0x1, 0x7, 0x201, 0x0, 0x0, {}, [@NFACCT_FILTER={0x14, 0x7, 0x0, 0x1, [@NFACCT_FILTER_MASK={0x8}, @NFACCT_FILTER_VALUE={0x8}]}]}, 0x28}}, 0x0) 22:37:45 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) read(r0, &(0x7f0000000000)=""/167, 0xa7) 22:37:45 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0x284c, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:37:45 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x5000000, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 498.851323][T19680] loop0: detected capacity change from 0 to 178 [ 498.919511][T19680] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 498.919511][T19680] [ 498.974913][T19680] ERROR: (device loop0): remounting filesystem as read-only [ 499.013358][T19680] xtLookup: xtSearch returned -5 22:37:45 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, [@alu]}, &(0x7f0000000080)='GPL\x00', 0x0, 0x4, &(0x7f00000000c0)=""/4, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180), 0x8, 0x10, &(0x7f00000001c0)={0x0, 0x0, 0xfffffffe, 0x1}, 0x10}, 0x78) [ 499.040832][T19680] read_mapping_page failed! 22:37:45 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xf) syz_genetlink_get_family_id$ipvs(&(0x7f0000000000), r0) [ 499.064666][T19680] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 499.123398][T19680] Mount JFS Failure: -5 [ 499.154743][T19680] jfs_mount failed w/return code = -5 [ 499.257952][T19680] loop0: detected capacity change from 0 to 178 22:37:45 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x6000000, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 499.340801][T19680] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 499.340801][T19680] 22:37:46 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0x2a37, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 499.432438][T19680] ERROR: (device loop0): remounting filesystem as read-only 22:37:46 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000000)="e0", 0x1}], 0x1) [ 499.495812][T19680] xtLookup: xtSearch returned -5 [ 499.513963][T19680] read_mapping_page failed! [ 499.531074][T19680] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 499.554557][T19680] Mount JFS Failure: -5 [ 499.569017][T19680] jfs_mount failed w/return code = -5 22:37:46 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x48, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000280)="10c4645f01000000010000000100004e36049b", 0x13, 0xb206}], 0x0, &(0x7f0000000080)={[{@nointegrity}]}) 22:37:46 executing program 3: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000140), 0x4) 22:37:46 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x7000000, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:37:46 executing program 4: bpf$BPF_LINK_UPDATE(0x18, 0x0, 0x0) 22:37:46 executing program 5: socketpair(0x23, 0x0, 0x7, &(0x7f00000003c0)) 22:37:46 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0x2c08, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:37:46 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x7, 0x0, 0x0, 0x0, 0xa54}, 0x40) 22:37:46 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x8000000, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:37:46 executing program 4: bpf$BPF_LINK_UPDATE(0x1d, 0x0, 0x700) [ 500.087199][T19728] loop0: detected capacity change from 0 to 178 22:37:46 executing program 5: r0 = epoll_create1(0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r0, 0x8010661b, 0x0) [ 500.169818][T19728] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 500.169818][T19728] [ 500.225660][T19728] ERROR: (device loop0): remounting filesystem as read-only [ 500.266385][T19728] xtLookup: xtSearch returned -5 22:37:46 executing program 3: bpf$BPF_LINK_UPDATE(0x1e, 0x0, 0x0) [ 500.298787][T19728] read_mapping_page failed! 22:37:46 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x9000000, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 500.331962][T19728] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 500.377829][T19728] Mount JFS Failure: -5 [ 500.409621][T19728] jfs_mount failed w/return code = -5 [ 500.518844][T19728] loop0: detected capacity change from 0 to 178 [ 500.540164][T19728] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 500.540164][T19728] [ 500.576715][T19728] ERROR: (device loop0): remounting filesystem as read-only [ 500.605192][T19728] xtLookup: xtSearch returned -5 [ 500.620045][T19728] read_mapping_page failed! [ 500.643925][T19728] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 500.672154][T19728] Mount JFS Failure: -5 [ 500.689636][T19728] jfs_mount failed w/return code = -5 22:37:47 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4c, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000280)="10c4645f01000000010000000100004e36049b", 0x13, 0xb206}], 0x0, &(0x7f0000000080)={[{@nointegrity}]}) 22:37:47 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001c80), 0x0, 0x0) write$binfmt_script(r0, 0x0, 0x0) 22:37:47 executing program 5: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000002c0)='dctcp\x00', 0x6) 22:37:47 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) ppoll(&(0x7f0000000040)=[{r0}], 0x1, &(0x7f0000000080)={0x0, 0x3938700}, 0x0, 0x0) 22:37:47 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0x2df3, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:37:47 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0xa000000, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:37:47 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x9) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14}, 0x14}}, 0x0) 22:37:47 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0xb000000, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:37:47 executing program 3: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100), 0x0}, 0x48) 22:37:47 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000087c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000004780)=[{{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, 0x0}}], 0x1, 0x0) [ 501.068554][T19768] loop0: detected capacity change from 0 to 178 22:37:47 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0x2fc4, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 501.134151][T19768] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 501.134151][T19768] [ 501.150188][ T1372] ieee802154 phy0 wpan0: encryption failed: -22 [ 501.156527][ T1372] ieee802154 phy1 wpan1: encryption failed: -22 [ 501.217729][T19768] ERROR: (device loop0): remounting filesystem as read-only [ 501.244776][T19768] xtLookup: xtSearch returned -5 [ 501.268695][T19768] read_mapping_page failed! 22:37:47 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0xf000000, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 501.291927][T19768] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 501.329829][T19768] Mount JFS Failure: -5 [ 501.343896][T19768] jfs_mount failed w/return code = -5 [ 501.423979][T19768] loop0: detected capacity change from 0 to 178 [ 501.460891][T19768] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 501.460891][T19768] [ 501.504656][T19768] ERROR: (device loop0): remounting filesystem as read-only [ 501.525180][T19768] xtLookup: xtSearch returned -5 [ 501.530152][T19768] read_mapping_page failed! [ 501.534698][T19768] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 501.553435][T19768] Mount JFS Failure: -5 [ 501.558393][T19768] jfs_mount failed w/return code = -5 22:37:48 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x60, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000280)="10c4645f01000000010000000100004e36049b", 0x13, 0xb206}], 0x0, &(0x7f0000000080)={[{@nointegrity}]}) 22:37:48 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$GTP_CMD_DELPDP(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x7f1f}, 0x0) 22:37:48 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) recvmsg$can_bcm(r0, &(0x7f0000002580)={0x0, 0x0, 0x0}, 0x0) 22:37:48 executing program 4: r0 = socket(0x2a, 0x2, 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, 0x0, 0x0) 22:37:48 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x10000000, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:37:48 executing program 5: r0 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(r0, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}, 0x4}}, 0x2e) 22:37:48 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0x31af, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:37:48 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x11000000, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:37:48 executing program 4: syz_genetlink_get_family_id$devlink(&(0x7f0000000880), 0xffffffffffffffff) [ 501.989427][T19806] loop0: detected capacity change from 0 to 178 [ 502.083420][T19806] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 502.083420][T19806] [ 502.116146][T19806] ERROR: (device loop0): remounting filesystem as read-only [ 502.146905][T19806] xtLookup: xtSearch returned -5 [ 502.166693][T19806] read_mapping_page failed! [ 502.188134][T19806] jfs_mount: diMount(ipaimap) failed w/rc = -5 22:37:48 executing program 5: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000480)='ns/net\x00') ioctl$NS_GET_USERNS(r0, 0xb701, 0x0) 22:37:48 executing program 4: socketpair(0x25, 0x1, 0x3, &(0x7f0000002000)) [ 502.254426][T19806] Mount JFS Failure: -5 [ 502.299384][T19806] jfs_mount failed w/return code = -5 22:37:49 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x3f000000, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 502.381516][T19806] loop0: detected capacity change from 0 to 178 [ 502.414869][T19806] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 502.414869][T19806] [ 502.470483][T19806] ERROR: (device loop0): remounting filesystem as read-only [ 502.510373][T19806] xtLookup: xtSearch returned -5 [ 502.542585][T19806] read_mapping_page failed! [ 502.571787][T19806] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 502.623451][T19806] Mount JFS Failure: -5 [ 502.644906][T19806] jfs_mount failed w/return code = -5 22:37:49 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x68, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000280)="10c4645f01000000010000000100004e36049b", 0x13, 0xb206}], 0x0, &(0x7f0000000080)={[{@nointegrity}]}) 22:37:49 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_STATUS(r0, &(0x7f00000014c0)={0x0, 0x0, &(0x7f0000001480)={&(0x7f00000013c0)={0x14}, 0x14}}, 0x0) 22:37:49 executing program 3: r0 = socket(0x2a, 0x2, 0x0) bind$netlink(r0, &(0x7f0000000080), 0xc) 22:37:49 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000080)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5c0, 0x318, 0x0, 0x318, 0xe8, 0x1d8, 0x580, 0x580, 0x580, 0x580, 0x580, 0x6, 0x0, {[{{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'team0\x00', 'veth0_to_bridge\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@empty}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @local, [], [], 'wg0\x00', 'wg0\x00'}, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private2, @ipv6=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @private1, [], [], 'ip6gre0\x00', 'veth0_to_batadv\x00'}, 0x0, 0x118, 0x140, 0x0, {}, [@common=@dst={{0x48}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@loopback}}}, {{@ipv6={@mcast1, @private1, [], [], 'team_slave_0\x00', 'bond0\x00'}, 0x0, 0xa8, 0xf0}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv6=@mcast2, @ipv4=@broadcast}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) 22:37:49 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x9effffff, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:37:49 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0x3380, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:37:49 executing program 4: r0 = socket(0x11, 0x2, 0x0) getsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, 0x0, 0x0) [ 503.020941][T19847] loop0: detected capacity change from 0 to 178 22:37:49 executing program 5: pipe(&(0x7f0000000800)={0xffffffffffffffff}) sendmsg$DEVLINK_CMD_TRAP_GET(r0, 0x0, 0x0) 22:37:49 executing program 3: setsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000040)={0x0, "0e5fe0"}, 0x6) r0 = socket(0x2a, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) [ 503.086850][T19847] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 503.086850][T19847] [ 503.148768][T19847] ERROR: (device loop0): remounting filesystem as read-only 22:37:49 executing program 4: pipe(&(0x7f0000000800)={0xffffffffffffffff}) connect$caif(r0, 0x0, 0x0) 22:37:49 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0xae040000, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 503.200068][T19847] xtLookup: xtSearch returned -5 [ 503.233600][T19847] read_mapping_page failed! [ 503.256784][T19847] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 503.296090][T19847] Mount JFS Failure: -5 [ 503.324318][T19847] jfs_mount failed w/return code = -5 22:37:50 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000000c0), 0x4) [ 503.421131][T19847] loop0: detected capacity change from 0 to 178 [ 503.469265][T19847] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 503.469265][T19847] [ 503.499811][T19847] ERROR: (device loop0): remounting filesystem as read-only [ 503.521235][T19847] xtLookup: xtSearch returned -5 [ 503.539964][T19847] read_mapping_page failed! [ 503.559086][T19847] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 503.569438][T19847] Mount JFS Failure: -5 [ 503.573706][T19847] jfs_mount failed w/return code = -5 22:37:50 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x6c, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000280)="10c4645f01000000010000000100004e36049b", 0x13, 0xb206}], 0x0, &(0x7f0000000080)={[{@nointegrity}]}) 22:37:50 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x76, 0x4) setsockopt$sock_int(r1, 0x1, 0x7, &(0x7f0000000080), 0x4) bind$inet(r1, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x3) sendto$inet(r1, &(0x7f00000012c0)="11268a927f", 0xad11, 0x11, 0x0, 0x3400) 22:37:50 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_cpus\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r1, &(0x7f0000000080)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) recvmmsg(r1, 0x0, 0x0, 0x20, &(0x7f0000000580)={0x77359400}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r2, 0x0, 0x8000000000004) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) sendmsg$kcm(r1, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x1}], 0x1, 0x0, 0x0, 0x40020a00}, 0x0) 22:37:50 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0x356b, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:37:50 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0xb72b4afa, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:37:50 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x20000378) 22:37:50 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000040)={'batadv_slave_0\x00'}) [ 503.816726][T19888] loop0: detected capacity change from 0 to 178 22:37:50 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0xf0ffffff, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 503.859076][T19890] netlink: 'syz-executor.4': attribute type 11 has an invalid length. [ 503.891695][T19888] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 503.891695][T19888] [ 503.926994][T19890] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.4'. [ 503.967994][T19888] ERROR: (device loop0): remounting filesystem as read-only [ 504.021288][T19888] xtLookup: xtSearch returned -5 [ 504.068137][T19888] read_mapping_page failed! [ 504.108159][T19888] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 504.175897][T19888] Mount JFS Failure: -5 22:37:50 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$GTP_CMD_DELPDP(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0xf0}, 0x0) [ 504.209791][T19888] jfs_mount failed w/return code = -5 22:37:50 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0xfa4a2bb7, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 504.340466][T19888] loop0: detected capacity change from 0 to 178 22:37:51 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0x373c, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:37:51 executing program 5: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_CONNECT(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14, r0, 0x1, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) [ 504.391517][T19888] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 504.391517][T19888] [ 504.499260][T19888] ERROR: (device loop0): remounting filesystem as read-only [ 504.541788][T19888] xtLookup: xtSearch returned -5 [ 504.570832][T19888] read_mapping_page failed! [ 504.601071][T19888] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 504.619717][T19920] netlink: 'syz-executor.4': attribute type 11 has an invalid length. [ 504.647511][T19888] Mount JFS Failure: -5 [ 504.715421][T19920] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.4'. [ 504.731862][T19888] jfs_mount failed w/return code = -5 22:37:51 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x74, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000280)="10c4645f01000000010000000100004e36049b", 0x13, 0xb206}], 0x0, &(0x7f0000000080)={[{@nointegrity}]}) 22:37:51 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x6, &(0x7f0000000480)={r2, @in6={{0xa, 0x0, 0x0, @mcast1}}}, &(0x7f0000000140)=0x2d3) 22:37:51 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0xfffff000, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:37:51 executing program 5: bpf$BPF_LINK_UPDATE(0xc, 0x0, 0x0) 22:37:51 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_cpus\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r1, &(0x7f0000000080)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) recvmmsg(r1, 0x0, 0x0, 0x20, &(0x7f0000000580)={0x77359400}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r2, 0x0, 0x8000000000004) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) sendmsg$kcm(r1, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x1}], 0x1, 0x0, 0x0, 0x40020a00}, 0x0) 22:37:51 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5}, 0x40) 22:37:51 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0x3927, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 505.263684][T19947] loop0: detected capacity change from 0 to 178 22:37:51 executing program 5: r0 = socket$pppoe(0x18, 0x1, 0x0) sendmmsg(r0, &(0x7f0000004080)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) [ 505.363448][T19947] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 505.363448][T19947] 22:37:52 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0xffffff7f, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:37:52 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4020000}, 0xc) [ 505.444946][T19947] ERROR: (device loop0): remounting filesystem as read-only [ 505.519099][T19947] xtLookup: xtSearch returned -5 [ 505.532163][T19947] read_mapping_page failed! [ 505.542640][T19947] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 505.555322][T19947] Mount JFS Failure: -5 [ 505.555339][T19947] jfs_mount failed w/return code = -5 [ 505.583526][T19954] netlink: 'syz-executor.4': attribute type 11 has an invalid length. [ 505.583585][T19954] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.4'. 22:37:52 executing program 5: bpf$PROG_LOAD(0x3, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 22:37:52 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0x3af8, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 505.749746][T19947] loop0: detected capacity change from 0 to 178 [ 505.788334][T19947] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 505.788334][T19947] [ 505.850074][T19947] ERROR: (device loop0): remounting filesystem as read-only [ 505.935578][T19947] xtLookup: xtSearch returned -5 [ 505.982208][T19947] read_mapping_page failed! [ 506.006011][T19947] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 506.043742][T19947] Mount JFS Failure: -5 [ 506.119054][T19947] jfs_mount failed w/return code = -5 22:37:52 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x7a, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000280)="10c4645f01000000010000000100004e36049b", 0x13, 0xb206}], 0x0, &(0x7f0000000080)={[{@nointegrity}]}) 22:37:52 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0xffffff9e, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:37:52 executing program 3: pipe(0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000000880), 0xffffffffffffffff) 22:37:52 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f00000003c0)={'sit0\x00', &(0x7f0000000340)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) 22:37:53 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008dc0)={0xffffffffffffffff}, 0x4) 22:37:53 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0x3ce3, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:37:53 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff}) connect$nfc_raw(r0, 0x0, 0x0) 22:37:53 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0xfffffff0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 506.572992][T19996] loop0: detected capacity change from 0 to 178 [ 506.639188][T19996] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 506.639188][T19996] 22:37:53 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 506.728173][T19996] ERROR: (device loop0): remounting filesystem as read-only [ 506.782245][T19996] xtLookup: xtSearch returned -5 [ 506.830684][T19996] read_mapping_page failed! 22:37:53 executing program 4: pipe(&(0x7f0000000800)) syz_genetlink_get_family_id$devlink(&(0x7f0000000880), 0xffffffffffffffff) 22:37:53 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0x3eb4, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 506.899629][T19996] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 506.913015][T19996] Mount JFS Failure: -5 [ 506.938400][T19996] jfs_mount failed w/return code = -5 22:37:53 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0xffffffff, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 507.069605][T19996] loop0: detected capacity change from 0 to 178 [ 507.123179][T19996] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 507.123179][T19996] [ 507.209063][T19996] ERROR: (device loop0): remounting filesystem as read-only [ 507.297004][T19996] xtLookup: xtSearch returned -5 [ 507.344678][T19996] read_mapping_page failed! [ 507.380349][T19996] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 507.480032][T19996] Mount JFS Failure: -5 [ 507.528577][T19996] jfs_mount failed w/return code = -5 22:37:54 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x9b, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000280)="10c4645f01000000010000000100004e36049b", 0x13, 0xb206}], 0x0, &(0x7f0000000080)={[{@nointegrity}]}) 22:37:54 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000087c0)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f00000088c0)=[{&(0x7f0000008800)='b', 0x1}], 0x1) recvfrom$unix(r0, &(0x7f0000000000)=""/64, 0x40, 0x0, 0x0, 0x0) 22:37:54 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x0, 'memory'}]}, 0x8) 22:37:54 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_cpus\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r1, &(0x7f0000000080)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) recvmmsg(r1, 0x0, 0x0, 0x20, &(0x7f0000000580)={0x77359400}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r2, 0x0, 0x8000000000004) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) sendmsg$kcm(r1, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff008}], 0x4, 0x0, 0x0, 0x40020a00}, 0x6d70) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x48011) 22:37:54 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0xf, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:37:54 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0x409f, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:37:54 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x14, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 507.901579][T20037] loop0: detected capacity change from 0 to 178 [ 507.921114][T20039] netlink: 'syz-executor.4': attribute type 11 has an invalid length. 22:37:54 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x19}, 0x40) 22:37:54 executing program 3: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000100)="ba", &(0x7f0000000200)}, 0x48) [ 507.950267][T20039] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.4'. [ 507.971808][T20037] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 507.971808][T20037] [ 508.088976][T20037] ERROR: (device loop0): remounting filesystem as read-only [ 508.146712][T20037] xtLookup: xtSearch returned -5 [ 508.211741][T20037] read_mapping_page failed! [ 508.277352][T20037] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 508.357001][T20037] Mount JFS Failure: -5 22:37:55 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000001b80)={0x11, 0x0, 0x0, 0x6}, 0x40) 22:37:55 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0xc0, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 508.459599][T20037] jfs_mount failed w/return code = -5 22:37:55 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000140), 0x4) 22:37:55 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfe, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000280)="10c4645f01000000010000000100004e36049b", 0x13, 0xb206}], 0x0, &(0x7f0000000080)={[{@nointegrity}]}) 22:37:55 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0x4270, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 508.650975][T20064] netlink: 'syz-executor.4': attribute type 11 has an invalid length. [ 508.728606][T20064] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.4'. 22:37:55 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x38, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x4}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}]}, @NFT_MSG_DELFLOWTABLE={0x38, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x4}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}]}], {0x14, 0x10}}, 0xb8}}, 0x0) [ 508.854774][T20080] loop0: detected capacity change from 0 to 178 [ 508.903239][T20080] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 508.903239][T20080] [ 508.987847][T20080] ERROR: (device loop0): remounting filesystem as read-only 22:37:55 executing program 4: bpf$PROG_LOAD(0x18, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 22:37:55 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000008680)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) 22:37:55 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0xec0, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 509.041306][T20080] xtLookup: xtSearch returned -5 [ 509.086850][T20080] read_mapping_page failed! 22:37:55 executing program 5: socketpair(0x11, 0x0, 0x0, &(0x7f0000000180)) 22:37:55 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0x445b, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 509.152590][T20080] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 509.212091][T20080] Mount JFS Failure: -5 [ 509.240220][T20080] jfs_mount failed w/return code = -5 22:37:55 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0xa54, 0xffffffffffffffff, 0xcc1}, 0x40) [ 509.342840][T20080] loop0: detected capacity change from 0 to 178 22:37:56 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x33fe0, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:37:56 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x0, 0x0, 0x0, 0xa54}, 0x40) [ 509.391294][T20080] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 509.391294][T20080] 22:37:56 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f00000003c0)={'sit0\x00', &(0x7f0000000340)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x10}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) [ 509.480495][T20080] ERROR: (device loop0): remounting filesystem as read-only [ 509.523808][T20080] xtLookup: xtSearch returned -5 [ 509.560287][T20080] read_mapping_page failed! [ 509.600427][T20080] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 509.665129][T20080] Mount JFS Failure: -5 [ 509.711907][T20080] jfs_mount failed w/return code = -5 22:37:56 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x110, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000280)="10c4645f01000000010000000100004e36049b", 0x13, 0xb206}], 0x0, &(0x7f0000000080)={[{@nointegrity}]}) 22:37:56 executing program 3: socketpair(0x22, 0x0, 0x9, &(0x7f00000002c0)) 22:37:56 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$F2FS_IOC_RESERVE_COMPRESS_BLOCKS(r0, 0x8008f513, 0x0) 22:37:56 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0x462c, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:37:56 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_MPATH(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r1, 0x303, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) 22:37:56 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x200002d4, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:37:56 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_ASSOCIATE(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x44, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}, [@NL80211_ATTR_DISABLE_HT={0x4}, @NL80211_ATTR_VHT_CAPABILITY={0x10}, @NL80211_ATTR_USE_MFP={0x8}]}, 0x44}}, 0x0) 22:37:56 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x14, 0x0, 0x0, 0x0, 0x108}, 0x40) 22:37:56 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x14) sendmsg$GTP_CMD_DELPDP(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) [ 510.045177][T20134] loop0: detected capacity change from 0 to 178 [ 510.110936][T20134] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 510.110936][T20134] [ 510.164712][T20134] ERROR: (device loop0): remounting filesystem as read-only 22:37:56 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x7ffff000, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 510.215432][T20134] xtLookup: xtSearch returned -5 [ 510.267118][T20134] read_mapping_page failed! [ 510.305401][T20134] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 510.353806][T20134] Mount JFS Failure: -5 22:37:57 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0xc0, 0x0) 22:37:57 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x82c, 0x1}, 0x40) [ 510.376227][T20134] jfs_mount failed w/return code = -5 [ 510.426950][T20134] loop0: detected capacity change from 0 to 178 [ 510.458476][T20134] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 510.458476][T20134] [ 510.506531][T20134] ERROR: (device loop0): remounting filesystem as read-only [ 510.540207][T20134] xtLookup: xtSearch returned -5 [ 510.559124][T20134] read_mapping_page failed! [ 510.571188][T20134] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 510.589401][T20134] Mount JFS Failure: -5 [ 510.594058][T20134] jfs_mount failed w/return code = -5 22:37:57 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x210, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000280)="10c4645f01000000010000000100004e36049b", 0x13, 0xb206}], 0x0, &(0x7f0000000080)={[{@nointegrity}]}) 22:37:57 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000a40)) 22:37:57 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0x4817, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:37:57 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0xfffffdef, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:37:57 executing program 4: sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x8080) r0 = socket$vsock_stream(0x28, 0x1, 0x0) sendmmsg(r0, &(0x7f0000007a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000003440)=@phonet={0x23, 0x2}, 0x80, &(0x7f0000003940)=[{0x0}, {0x0}, {0x0}], 0x3}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000006500)=[{&(0x7f0000006440)}], 0x1}}, {{&(0x7f0000006580)=@ax25={{0x3, @null, 0x5}, [@default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @null, @bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default]}, 0x80, &(0x7f0000007940)=[{0x0}, {0x0}, {0x0}, {0x0}, {&(0x7f0000007800)}, {0x0}], 0x6}}], 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000087c0)) 22:37:57 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, 0x0, 0x0) 22:37:57 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000080)=@mangle={'mangle\x00', 0x1f, 0x6, 0x650, 0x318, 0x0, 0x318, 0xe8, 0x1d8, 0x580, 0x580, 0x580, 0x580, 0x580, 0x6, 0x0, {[{{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [0xffffffff, 0xffffff00, 0xffffffff, 0xffffff00], [0xff, 0x0, 0x0, 0xffffff00], 'team0\x00', 'veth0_to_bridge\x00', {0xff}, {}, 0x67, 0x1f, 0x0, 0x8}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x4a9, 0x0, @ipv4=@empty}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @local, [0xff000000], [0xffffffff], 'wg0\x00', 'wg0\x00', {}, {}, 0x0, 0x7f, 0x1, 0x8}, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private2, @ipv6=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1, [0xff000000, 0xff000000, 0xff000000], [0x0, 0x0, 0xff0000ff, 0xffffffff], 'ip6gre0\x00', 'veth0_to_batadv\x00', {}, {}, 0x76, 0x81, 0x5, 0x22}, 0x0, 0x118, 0x140, 0x0, {}, [@common=@dst={{0x48}, {0x0, 0x0, 0x0, [0x7fff, 0xfd5, 0x8, 0x8001, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x1, 0x8, 0x4]}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x8, 0xffff, @ipv4=@loopback, 0x4e22}}}, {{@ipv6={@mcast1, @private1, [0x0, 0xffffff00, 0xff000000], [0xffffffff, 0xffffff00, 0x0, 0xffffff00], 'team_slave_0\x00', 'bond0\x00', {}, {}, 0xff, 0xff, 0x2, 0x30}, 0x0, 0x138, 0x180, 0x0, {}, [@common=@srh1={{0x90}, {0x67, 0x0, 0x0, 0xc1, 0x231, @remote, @ipv4={'\x00', '\xff\xff', @remote}, @private2={0xfc, 0x2, '\x00', 0x1}, [0x0, 0x0, 0xff, 0xffffffff], [0xffffff00, 0xffffff00, 0x0, 0xffffffff], [0x0, 0xff, 0xffffffff, 0xff000000], 0x80, 0x60}}]}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv6=@mcast2, @ipv4=@broadcast, 0x0, 0xa, 0x6}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6b0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) 22:37:57 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000500)=ANY=[]) [ 510.856540][T20172] loop0: detected capacity change from 0 to 178 22:37:57 executing program 4: bpf$MAP_CREATE(0xa, &(0x7f00000000c0), 0x40) 22:37:57 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x2, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 510.932138][T20172] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 510.932138][T20172] [ 511.007254][T20172] ERROR: (device loop0): remounting filesystem as read-only [ 511.049281][T20179] x_tables: duplicate underflow at hook 1 [ 511.065129][T20172] xtLookup: xtSearch returned -5 22:37:57 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x3, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 511.101525][T20179] x_tables: duplicate underflow at hook 1 [ 511.122621][T20172] read_mapping_page failed! [ 511.142995][T20172] jfs_mount: diMount(ipaimap) failed w/rc = -5 22:37:57 executing program 5: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={0xffffffffffffffff, 0x0, 0x0}, 0x10) [ 511.166236][T20172] Mount JFS Failure: -5 [ 511.198028][T20172] jfs_mount failed w/return code = -5 [ 511.279077][T20172] loop0: detected capacity change from 0 to 178 [ 511.303587][T20172] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 511.303587][T20172] [ 511.340784][T20172] ERROR: (device loop0): remounting filesystem as read-only [ 511.368923][T20172] xtLookup: xtSearch returned -5 [ 511.381967][T20172] read_mapping_page failed! [ 511.403511][T20172] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 511.411110][T20172] Mount JFS Failure: -5 [ 511.416751][T20172] jfs_mount failed w/return code = -5 22:37:58 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x300, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000280)="10c4645f01000000010000000100004e36049b", 0x13, 0xb206}], 0x0, &(0x7f0000000080)={[{@nointegrity}]}) 22:37:58 executing program 3: pipe(0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) 22:37:58 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0x49e8, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:37:58 executing program 4: socketpair(0x21, 0x0, 0x0, &(0x7f0000000740)) 22:37:58 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x4, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:37:58 executing program 5: bpf$BPF_LINK_UPDATE(0x13, 0x0, 0x0) 22:37:58 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@func]}, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xce, &(0x7f0000000140)=""/206, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 22:37:58 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x5, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:37:58 executing program 5: socketpair(0x15, 0x5, 0x7ff, &(0x7f0000000080)) 22:37:58 executing program 4: socketpair(0x22, 0x0, 0x20, &(0x7f0000000080)) [ 511.750017][T20212] loop0: detected capacity change from 0 to 178 [ 511.856171][T20212] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 511.856171][T20212] 22:37:58 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0x4bd3, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:37:58 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x1, &(0x7f00000000c0)=@raw=[@jmp], &(0x7f0000000100)='syzkaller\x00', 0x3, 0x9b, &(0x7f0000000140)=""/155, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 511.953214][T20212] ERROR: (device loop0): remounting filesystem as read-only [ 511.976548][T20212] xtLookup: xtSearch returned -5 [ 511.981696][T20212] read_mapping_page failed! [ 511.988828][T20212] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 512.026084][T20212] Mount JFS Failure: -5 [ 512.048823][T20212] jfs_mount failed w/return code = -5 [ 512.142136][T20212] loop0: detected capacity change from 0 to 178 [ 512.169531][T20212] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 512.169531][T20212] [ 512.249846][T20212] ERROR: (device loop0): remounting filesystem as read-only [ 512.339271][T20212] xtLookup: xtSearch returned -5 [ 512.378220][T20212] read_mapping_page failed! [ 512.451861][T20212] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 512.513789][T20212] Mount JFS Failure: -5 [ 512.555420][T20212] jfs_mount failed w/return code = -5 22:37:59 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x500, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000280)="10c4645f01000000010000000100004e36049b", 0x13, 0xb206}], 0x0, &(0x7f0000000080)={[{@nointegrity}]}) 22:37:59 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x6, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:37:59 executing program 5: socketpair(0x2b, 0x0, 0x0, &(0x7f0000000040)) 22:37:59 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000080)=@mangle={'mangle\x00', 0x1f, 0x6, 0x650, 0x318, 0x0, 0x318, 0xe8, 0x1d8, 0x580, 0x580, 0x580, 0x580, 0x580, 0x6, 0x0, {[{{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [0x0, 0x0, 0xffffffff, 0xffffff00], [], 'team0\x00', 'veth0_to_bridge\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@empty}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @local, [], [], 'wg0\x00', 'wg0\x00', {}, {}, 0x0, 0x7f, 0x1, 0x8}, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private2, @ipv6=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @private1, [0x0, 0x0, 0xff000000], [], 'ip6gre0\x00', 'veth0_to_batadv\x00', {}, {}, 0x0, 0x81, 0x5, 0x22}, 0x0, 0x118, 0x140, 0x0, {}, [@common=@dst={{0x48}, {0x0, 0x0, 0x0, [0x0, 0xfd5, 0x8, 0x8001, 0x2]}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@loopback}}}, {{@ipv6={@mcast1, @private1, [], [], 'team_slave_0\x00', 'bond0\x00'}, 0x0, 0x138, 0x180, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x0, 0x0, 0x0, 0x0, @remote, @ipv4={'\x00', '\xff\xff', @remote}, @private2}}]}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv6=@mcast2, @ipv4=@broadcast}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6b0) 22:37:59 executing program 3: socketpair(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f0000000100), r0) 22:37:59 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0x4da4, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:37:59 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x8, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 512.829405][T20246] x_tables: duplicate underflow at hook 1 22:37:59 executing program 5: r0 = socket$vsock_stream(0x28, 0x1, 0x0) sendmmsg(r0, &(0x7f0000007a40)=[{{&(0x7f0000002a80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random="cf7c99710911"}, 0x80, &(0x7f0000002cc0)=[{0x0}, {0x0}], 0x2, &(0x7f0000002d00)=[{0x10}, {0x18, 0x0, 0x0, "e4"}], 0x28}}], 0x1, 0x0) 22:37:59 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_REQ_SET_REG(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f00000005c0)={0x14, 0x0, 0x409}, 0x14}}, 0x0) [ 512.886516][T20248] loop0: detected capacity change from 0 to 178 [ 512.968179][T20248] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 512.968179][T20248] [ 513.042541][T20248] ERROR: (device loop0): remounting filesystem as read-only 22:37:59 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x9, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 513.153868][T20248] xtLookup: xtSearch returned -5 [ 513.212232][T20248] read_mapping_page failed! [ 513.262967][T20248] jfs_mount: diMount(ipaimap) failed w/rc = -5 22:37:59 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_GET_LIMITS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f0000000280), 0xffffffffffffffff) [ 513.320869][T20248] Mount JFS Failure: -5 [ 513.357926][T20248] jfs_mount failed w/return code = -5 22:38:00 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc) [ 513.462851][T20248] loop0: detected capacity change from 0 to 178 [ 513.505046][T20248] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 513.505046][T20248] [ 513.607594][T20248] ERROR: (device loop0): remounting filesystem as read-only [ 513.654036][T20248] xtLookup: xtSearch returned -5 [ 513.659010][T20248] read_mapping_page failed! [ 513.663543][T20248] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 513.690310][T20248] Mount JFS Failure: -5 [ 513.694896][T20248] jfs_mount failed w/return code = -5 22:38:00 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x600, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000280)="10c4645f01000000010000000100004e36049b", 0x13, 0xb206}], 0x0, &(0x7f0000000080)={[{@nointegrity}]}) 22:38:00 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0xa, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:38:00 executing program 3: bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={0x0}, 0x10) 22:38:00 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r0, &(0x7f00000000c0)="e8", 0x1, 0x0, &(0x7f000052a000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) shutdown(r0, 0x1) getsockopt$bt_hci(r0, 0x84, 0x80, &(0x7f00000010c0)=""/4089, &(0x7f0000000040)=0xff9) 22:38:00 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0x4f8f, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:38:00 executing program 4: ppoll(0x0, 0x0, 0x0, &(0x7f00000000c0)={[0xe32]}, 0x8) 22:38:00 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000008c0)=ANY=[], 0x2c}}, 0x0) 22:38:00 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0xb, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 514.182684][T20294] loop0: detected capacity change from 0 to 178 [ 514.277598][T20294] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 514.277598][T20294] [ 514.347645][T20294] ERROR: (device loop0): remounting filesystem as read-only [ 514.396361][T20294] xtLookup: xtSearch returned -5 22:38:01 executing program 3: syz_open_procfs$namespace(0x0, 0x0) pipe(&(0x7f0000000140)) [ 514.429321][T20294] read_mapping_page failed! [ 514.466688][T20294] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 514.506103][T20294] Mount JFS Failure: -5 [ 514.518782][T20294] jfs_mount failed w/return code = -5 22:38:01 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0x5160, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:38:01 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x10, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 514.596364][T20294] loop0: detected capacity change from 0 to 178 [ 514.643854][T20294] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 514.643854][T20294] 22:38:01 executing program 3: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRESDEC, @ANYRES32, @ANYBLOB="4d99fb1f85fd0ec04d5b2f8c216a4c7f4147024d0ee4aaaa1d8233871bae8f0004"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000000dc0)={'wlan1\x00', 0x0}) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001140), 0xffffffffffffffff) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000000)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="010000010000000000003b00000008000300", @ANYRES32=r5, @ANYBLOB="25003300d0"], 0x44}}, 0x0) sendfile(r3, r2, 0x0, 0x100007000) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) [ 514.742564][T20294] ERROR: (device loop0): remounting filesystem as read-only [ 514.794545][T20294] xtLookup: xtSearch returned -5 [ 514.844573][T20294] read_mapping_page failed! [ 514.884213][T20294] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 514.959840][T20294] Mount JFS Failure: -5 [ 514.990231][T20294] jfs_mount failed w/return code = -5 [ 515.066288][ T25] audit: type=1804 audit(1627943881.679:28): pid=20318 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir071239135/syzkaller.s6uSjh/598/cgroup.controllers" dev="sda1" ino=13893 res=1 errno=0 22:38:01 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x700, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000280)="10c4645f01000000010000000100004e36049b", 0x13, 0xb206}], 0x0, &(0x7f0000000080)={[{@nointegrity}]}) 22:38:01 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x11, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:38:01 executing program 5: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$inet_tcp_int(r0, 0x6, 0x7, 0x0, 0x0) 22:38:01 executing program 4: r0 = socket$pppoe(0x18, 0x1, 0x0) ppoll(&(0x7f0000000040)=[{r0}, {}], 0x2, &(0x7f0000000080)={0x0, 0x3938700}, &(0x7f00000000c0)={[0xe32]}, 0x8) 22:38:01 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0x534b, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:38:01 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$inet_dccp_int(r0, 0x21, 0x0, 0x0, 0x0) 22:38:02 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x17, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 515.407333][ T25] audit: type=1804 audit(1627943882.019:29): pid=20319 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir071239135/syzkaller.s6uSjh/598/cgroup.controllers" dev="sda1" ino=13893 res=1 errno=0 22:38:02 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000580)={'sit0\x00', &(0x7f00000005c0)=ANY=[]}) 22:38:02 executing program 4: recvfrom$rxrpc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) [ 515.533163][T20335] loop0: detected capacity change from 0 to 178 [ 515.625441][T20335] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 515.625441][T20335] [ 515.768180][T20335] ERROR: (device loop0): remounting filesystem as read-only 22:38:02 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1d, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 515.852259][T20335] xtLookup: xtSearch returned -5 22:38:02 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9}, 0x40) [ 515.941468][T20335] read_mapping_page failed! 22:38:02 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000008680)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f00000086c0), 0x10) [ 515.979756][T20335] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 516.012553][T20335] Mount JFS Failure: -5 [ 516.064264][T20335] jfs_mount failed w/return code = -5 [ 516.127586][T20335] loop0: detected capacity change from 0 to 178 [ 516.170828][T20335] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 516.170828][T20335] [ 516.216061][T20335] ERROR: (device loop0): remounting filesystem as read-only [ 516.253945][T20335] xtLookup: xtSearch returned -5 [ 516.289910][T20335] read_mapping_page failed! [ 516.295450][T20335] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 516.301730][T20335] Mount JFS Failure: -5 [ 516.314624][T20335] jfs_mount failed w/return code = -5 22:38:02 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x900, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000280)="10c4645f01000000010000000100004e36049b", 0x13, 0xb206}], 0x0, &(0x7f0000000080)={[{@nointegrity}]}) 22:38:02 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x18, 0x2, &(0x7f0000000400)=@raw=[@btf_id], &(0x7f0000000440)='GPL\x00', 0x1f, 0xfa, &(0x7f0000000480)=""/250, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 22:38:02 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0x551c, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:38:02 executing program 5: bpf$BPF_LINK_UPDATE(0x22, 0x0, 0x0) 22:38:02 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:38:02 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r0, &(0x7f00000001c0)={0x1f, @none}, 0x8) 22:38:03 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, 0xfffffffffffffffd, 0x0) 22:38:03 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x2, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 516.658956][T20375] loop0: detected capacity change from 0 to 178 22:38:03 executing program 4: sendmsg$BATADV_CMD_GET_BLA_BACKBONE(0xffffffffffffffff, 0x0, 0xf94e20fdef324623) 22:38:03 executing program 3: bpf$BPF_LINK_UPDATE(0x1a, 0x0, 0x0) [ 516.753211][T20375] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 516.753211][T20375] [ 516.813480][T20375] ERROR: (device loop0): remounting filesystem as read-only [ 516.874904][T20375] xtLookup: xtSearch returned -5 [ 516.907037][T20375] read_mapping_page failed! [ 516.952798][T20375] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 517.001027][T20375] Mount JFS Failure: -5 22:38:03 executing program 5: socketpair(0x0, 0x0, 0xffff, &(0x7f0000000840)) [ 517.041807][T20375] jfs_mount failed w/return code = -5 22:38:03 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x3, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 517.160843][T20375] loop0: detected capacity change from 0 to 178 [ 517.203371][T20375] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 517.203371][T20375] [ 517.239524][T20375] ERROR: (device loop0): remounting filesystem as read-only [ 517.258799][T20375] xtLookup: xtSearch returned -5 [ 517.265256][T20375] read_mapping_page failed! [ 517.270836][T20375] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 517.280774][T20375] Mount JFS Failure: -5 [ 517.288201][T20375] jfs_mount failed w/return code = -5 22:38:04 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xa00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000280)="10c4645f01000000010000000100004e36049b", 0x13, 0xb206}], 0x0, &(0x7f0000000080)={[{@nointegrity}]}) 22:38:04 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0x5707, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:38:04 executing program 3: bpf$BPF_LINK_UPDATE(0x10, 0x0, 0x0) 22:38:04 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000380)={0x17, 0x0, 0x20, 0x200, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x40) 22:38:04 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x4, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:38:04 executing program 5: bpf$BPF_LINK_UPDATE(0x4, 0x0, 0x0) 22:38:04 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x14) sendmsg$NL80211_CMD_SET_MAC_ACL(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x20, 0x0, 0x4, 0x0, 0x0, {{}, {@void, @val={0xc}}}}, 0x20}}, 0x0) 22:38:04 executing program 4: openat$tun(0xffffffffffffff9c, &(0x7f00000003c0), 0x400, 0x0) [ 517.683293][T20415] loop0: detected capacity change from 0 to 178 22:38:04 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x5, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 517.818009][T20415] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 517.818009][T20415] 22:38:04 executing program 5: r0 = socket(0x2a, 0x2, 0x0) bind$netlink(r0, 0x0, 0x0) [ 517.893092][T20415] ERROR: (device loop0): remounting filesystem as read-only 22:38:04 executing program 3: socketpair(0x25, 0x0, 0x0, &(0x7f0000002000)) [ 517.951591][T20415] xtLookup: xtSearch returned -5 [ 517.958957][T20415] read_mapping_page failed! [ 517.985298][T20415] jfs_mount: diMount(ipaimap) failed w/rc = -5 22:38:04 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0x58d8, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 518.013239][T20415] Mount JFS Failure: -5 [ 518.044688][T20415] jfs_mount failed w/return code = -5 [ 518.117927][T20415] loop0: detected capacity change from 0 to 178 [ 518.156082][T20415] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 518.156082][T20415] [ 518.193128][T20415] ERROR: (device loop0): remounting filesystem as read-only [ 518.230451][T20415] xtLookup: xtSearch returned -5 [ 518.275129][T20415] read_mapping_page failed! [ 518.279705][T20415] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 518.299553][T20415] Mount JFS Failure: -5 [ 518.311075][T20415] jfs_mount failed w/return code = -5 22:38:05 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xc00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000280)="10c4645f01000000010000000100004e36049b", 0x13, 0xb206}], 0x0, &(0x7f0000000080)={[{@nointegrity}]}) 22:38:05 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000000), 0x0) 22:38:05 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x6, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:38:05 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000087c0)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f00000088c0)=[{&(0x7f0000008800)='b', 0x1}], 0x1) recvfrom$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 22:38:05 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_ASSOCIATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) 22:38:05 executing program 4: bpf$BPF_LINK_UPDATE(0x8, 0x0, 0x0) 22:38:05 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x0, 0x0, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 22:38:05 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)) 22:38:05 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x7, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 518.808576][T20455] loop0: detected capacity change from 0 to 178 22:38:05 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0x5ac3, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 518.850647][T20455] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 518.850647][T20455] [ 518.889101][T20455] ERROR: (device loop0): remounting filesystem as read-only [ 518.929311][T20455] xtLookup: xtSearch returned -5 [ 518.961062][T20455] read_mapping_page failed! 22:38:05 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000001c0), 0x10}, 0x78) [ 518.992892][T20455] jfs_mount: diMount(ipaimap) failed w/rc = -5 22:38:05 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_ADD_KEY(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="50000001"], 0x50}}, 0x0) [ 519.040195][T20455] Mount JFS Failure: -5 [ 519.063601][T20455] jfs_mount failed w/return code = -5 [ 519.135136][T20455] loop0: detected capacity change from 0 to 178 [ 519.159383][T20455] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 519.159383][T20455] [ 519.196933][T20455] ERROR: (device loop0): remounting filesystem as read-only [ 519.241793][T20455] xtLookup: xtSearch returned -5 [ 519.268963][T20455] read_mapping_page failed! [ 519.307307][T20455] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 519.338477][T20455] Mount JFS Failure: -5 [ 519.354787][T20455] jfs_mount failed w/return code = -5 22:38:06 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xd00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000280)="10c4645f01000000010000000100004e36049b", 0x13, 0xb206}], 0x0, &(0x7f0000000080)={[{@nointegrity}]}) 22:38:06 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x8, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:38:06 executing program 5: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 22:38:06 executing program 3: pipe(&(0x7f0000000140)={0xffffffffffffffff}) openat$cgroup_subtree(r0, &(0x7f0000000000), 0x2, 0x0) 22:38:06 executing program 4: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x20, &(0x7f0000000080)}, 0x1) 22:38:06 executing program 5: pipe(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)) 22:38:06 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0x5c94, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:38:06 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_WOWLAN(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)={0x1ec4, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void, @void}}, [@NL80211_ATTR_WOWLAN_TRIGGERS={0x1eb0, 0x75, 0x0, 0x1, [@NL80211_WOWLAN_TRIG_PKT_PATTERN={0x132c, 0x4, 0x0, 0x1, [{0x1328, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_PATTERN={0xa1, 0x2, "43f3c4891826a8d19a8c493a542741d4cc7da603f6a0d8ee5e70e646f11810729800adee1b1074c678d602eabe6d43dab80269b8d6c57c5da091ccb0a687b08f8b0de66cdbbebde0979e45b42ec4972df3db88ca86cc8298d4eb6e5993d62f09bcba7360b486387642164bc088167e53b86d18e9cf9f6567a0d38dd2aa59fcec632a747de00a08f41d1b187cbf773409efa76a44c33b041e8514e595b6"}, @NL80211_PKTPAT_OFFSET={0x8}, @NL80211_PKTPAT_PATTERN={0x71, 0x2, "fc3398eb9820f87a3396aa1253274584fe88b17e35166058c1138068747a33bbaf917cc47db5eadbd9a638304d9f01e974682a80ff453857b50b2a89f49151fcb45462833f5914024535c58cc9e360f93e1efa43de06a3bf5d2e0f4a06a27167c4d77897800314ff7a69f1697a"}, @NL80211_PKTPAT_PATTERN={0xd5, 0x2, "fb7e402305ab1c73358a1843b9afd2ed857b3f07710c17347f35f32d2fa9f13288038d9da7d6ac2b63d561adc5d128660cf3528e7e919065fefaf6aadf34859f35f3aee63423b4bd618553d695b949434f4133e033a2d7b1c8aa13a56540b868b78a7ea955ccbaa96f46139eaf890c60d13eda1dd7e10cb1b7748e352a4098273c03f2acf6fd54ade9207f6a555bef30ecd3876c259ca52502ef55601641d0a6bf6c451260522f270debede6b9d30177ad654558b194f4e829d49a4f093fa5ddd72c210c444866115efac9f77e22478ccb"}, @NL80211_PKTPAT_PATTERN={0x41, 0x2, "f676d463cc648e047a1eaa412df3d0afd86b62faad009a5546224682a1afa132cbd715380199e06cdc1a5ad7c2ee70aa6bdfa81bc3c3fd1bad8c0b5f19"}, @NL80211_PKTPAT_MASK={0xd1, 0x1, "4de43b4362784d039c5aa6b63cf613c6861e19cf07d9b9b902744399728fbd0536576bc6a900b7dca7a53a61ff8b4331fe06755a6cb29ab1ddd4fca31bd26b9ac8aecabcdb4fee22fc44169d2a9fadfd63d3849320baf436801b4817490113c44536399bebde2546f9959fec4956ba4263efd7c61b188bbd33c27fed81d48ed8fd2c8af9eca646e821abd51b67183b15e92cbf245f2c852fe2ffb797c8e078c09013cfeddad7d9c339bc9ce90644ec160e8073afcd7f9766d0804c859773df5fad16cfb1dc79d6676083dcfba7"}, @NL80211_PKTPAT_PATTERN={0x1001, 0x2, "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"}, @NL80211_PKTPAT_PATTERN={0x5, 0x2, "f0"}, @NL80211_PKTPAT_OFFSET={0x8}]}]}, @NL80211_WOWLAN_TRIG_GTK_REKEY_FAILURE={0x4}, @NL80211_WOWLAN_TRIG_MAGIC_PKT={0x4}, @NL80211_WOWLAN_TRIG_GTK_REKEY_FAILURE={0x4}, @NL80211_WOWLAN_TRIG_NET_DETECT={0xf8, 0x12, 0x0, 0x1, [@NL80211_ATTR_SCAN_FREQUENCIES={0x24, 0x2c, 0x0, 0x1, [{0x8}, {0x8}, {0x8}, {0x8}]}, @NL80211_ATTR_BG_SCAN_PERIOD={0x6}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_SCHED_SCAN_MATCH={0x74, 0x84, 0x0, 0x1, [@NL80211_SCHED_SCAN_MATCH_ATTR_RSSI={0x8}, @NL80211_SCHED_SCAN_MATCH_ATTR_SSID={0xa, 0x1, @default_ap_ssid}, @NL80211_SCHED_SCAN_MATCH_ATTR_SSID={0xa, 0x1, @default_ap_ssid}, @NL80211_SCHED_SCAN_MATCH_PER_BAND_RSSI={0x3c, 0x6, 0x0, 0x1, [@NL80211_BAND_2GHZ={0x8}, @NL80211_BAND_60GHZ={0x8}, @NL80211_BAND_5GHZ={0x8}, @NL80211_BAND_6GHZ={0x8}, @NL80211_BAND_6GHZ={0x8}, @NL80211_BAND_5GHZ={0x8}, @NL80211_BAND_2GHZ={0x8}]}, @NL80211_SCHED_SCAN_MATCH_ATTR_BSSID={0xa}, @NL80211_SCHED_SCAN_MATCH_ATTR_SSID={0x5, 0x1, @random="f9"}]}, @NL80211_ATTR_SCAN_SSIDS={0x48, 0x2d, 0x0, 0x1, [{0xa, 0x0, @default_ibss_ssid}, {0xa, 0x0, @default_ibss_ssid}, {0x1d, 0x0, @random="3bf7f3eb5e06b215bb64e0934b9f7a9ed4471e674d9a94a8e9"}, {0xa, 0x0, @default_ibss_ssid}]}]}, @NL80211_WOWLAN_TRIG_PKT_PATTERN={0xa7c, 0x4, 0x0, 0x1, [{0x15c, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_PATTERN={0xed, 0x2, "877af183e78309f6a1883e41e5bfda5fe74ab798f03f34b2724a603f28a948e8dfda7298106ba794380390ea27082894b648f87567d7b03614aa057b53bb28556b14f48bb37bd5602e780f34af3becc649feea7fc3be3a78fb8ff7f43d1ef84b38c0b80f8f66a85e853eba320fe2d69213d26beeea323b1e3c317440dc99c0c1b52ac062a353ebf30cd05718d90eec5d21f6a831b20b58583e6c7d9770b80862c7bba42ddbdc44f4671b20004eff70612a46128566e4a444be3a9c37a09c6fad5d197aa884a0e4180ee8f29048b8b3858ef280ce5dbd4dd7da7af7564a51a0180279fafd38634e4525"}, @NL80211_PKTPAT_MASK={0x55, 0x1, "e4fd06b02b48dbfe11c6508ccd2067e01a30c3c0b0f5f71c3f6dcf1c6215f2c77fd953966c6598680417afbff6d7f0e9b6b1e7b73337f8da04399ae5f1236ab2a7d202d8eb56c34de68e0bb2c077002ab6"}, @NL80211_PKTPAT_OFFSET={0x8}, @NL80211_PKTPAT_OFFSET={0x8}]}, {0x25c, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_OFFSET={0x8}, @NL80211_PKTPAT_OFFSET={0x8}, @NL80211_PKTPAT_MASK={0x21, 0x1, "70fa1c8b1c8b10a6cc30be4fd704070cb85abb600c7b3a3519fcb366c5"}, @NL80211_PKTPAT_OFFSET={0x8}, @NL80211_PKTPAT_OFFSET={0x8}, @NL80211_PKTPAT_PATTERN={0xd1, 0x2, "ad2db96cfe9785775ee53c5ab0707b4ded69bbbec8747e0547c22acdbf55998a3e18c4ab06ad6ba22e8720ac00ada6272dfd68264b6a3ce229c1a35f35411a04df1c83082475dff07808b7e8891259f38f97b6425ac08b691cd88c3607b0df034ab74ce528c4ef26a88e83aaf751131d88154681519b813cc19baf88b34c84c14e8624627bfc3f232be1a99d46bde54cb33fe4cce6856cc23ff9c5394f727fffad344db09d2106979ace82db5cef2b5b1100ea7857e0219ccd7763b345ac0d9c56c3678e563d49ac69a7490128"}, @NL80211_PKTPAT_PATTERN={0xe5, 0x2, "afb002ac30dca2b0c3201bfacdd559520520fc7d748f0bf174b681b589d52509d2d99319f7398240ffa33caa92a93792a25f7f23a968dad9eeb4c7a26bd8644ad0452f6e75a3030ff5b9081f799d945b88517136ac5d08de91cafe7ef45d6bc7639562902b7498f4b9767f46d67712a88b328b5b74aeb88d808681778d3c11863c9a94a5e3932c7d7a75138fe6b6b2bbead17ca13e71db4b6e1a9f8257e954d52208a15013248e105ffb10195dff34d72974bd8ff96dd68b26ffb8a4d0750294feb81e291a0deb8ce29a75e0324f2c5cb4c0a63cff7664974e7e117484da7ebe89"}, @NL80211_PKTPAT_PATTERN={0x55, 0x2, "e6479b7fcf06db6cd3e91ba6caf91faa4475a06d7226842d2e33621b8f003560ec100538a3f5b3e24c6158d5ae09c7f9741106aa067f95d05330d6221f0c65a6bb524cee847d7046e5c655c255ada59558"}]}, {0x3e4, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_PATTERN={0x45, 0x2, "18ea2b9079b79cdf1966a83bd9e466a068912e209a065fd54f38ed6c5f8f5d299168be145acc00187aa8c43165f1da203d0b44c322305aed90a1cf733d301834fa"}, @NL80211_PKTPAT_MASK={0xb5, 0x1, "3be38bd397fe9b80d1ff9403a7cb67dfcf4eaf2b31c13293a76ffec674d6ac32632d5d97c0785190c1fd14d135378df8793fa86970b9533660ef2eaff08f061c3badf5ebe28477c0d511a320457f72322c238d0fb7c5d09832730726449a98355d59ad9e6de43275357489959f706f5ce20021a15da99584cb2f7e45a46c92fcc4d0ed23c45159150cb8d6be1bad9f4fea05897a1fa58b5b1e0ffd7c47f92145545aa3a19c68eefe59fe7bfb9002cc5236"}, @NL80211_PKTPAT_MASK={0x79, 0x1, "9a59b332ae438c997cae5544ae59024241de609078bfaba0d84858ecdc90977c0b42f240b5002daba88bf38c5c0dd2b99c5a33cbdb8189ed9fb1960bf90ad15abf4c43665edbec97c73471d3bc54c19dd5ae8f9225cf201348d5a4dd2e0af57403a3f961d487586de30ab3823369400577dc583fd4"}, @NL80211_PKTPAT_MASK={0x59, 0x1, "dbe1bb3595088babb6d3cef05251f5a344afaa0ea8bc2f77107da977bf7c287c191ca4693d209bba930218e3d548fa894172d7a44e52955e3a1a8d47ad82c1768582895a039af49a8088bae135f8cbd166247e3905"}, @NL80211_PKTPAT_MASK={0xd1, 0x1, "3ad381227d70832f1aa462a1b52280823931e52fdf4bc85b947494cbc50a95ca2ed9612b831ab8909c8acde2d79e4c213c4248327afe5908b195459d29d31bb6b31eaadc89a7cae90378a1ca7195b163a153ba94ba44b13ea14404b603476006ad4079de23627f2cdf1e42168517ca06075ee6975c60bb607fff55a4c48c69015da36079238cfd6cacc86527462e05e886bc84af8844ce7387a3233effc1a9d6905a4f6a43e05cfaa9c38b36253feca5cf86ca8bec2ffb1fc77a582abb05a46470bfc68f25bc79a97faf861a5c"}, @NL80211_PKTPAT_OFFSET={0x8}, @NL80211_PKTPAT_MASK={0x5, 0x1, "99"}, @NL80211_PKTPAT_MASK={0x4}, @NL80211_PKTPAT_PATTERN={0x2d, 0x2, "41909d48ebde6dfa1206477f9d2b38d28293f9c8634ba6b21f08c614ace8f69873bf60e4c225b50699"}, @NL80211_PKTPAT_PATTERN={0xed, 0x2, "e213e74fa30f49e8aa00787e3b62bbb82f63fb68ee77cd47455df84f2d19312a3d5234804c42dea0f1c7ffca8987f739b1302598eba3d6e2fc369eb383bfc1934e6ac17fb6ed1c725f201563c03c1e8bfdd8499bbba94fdce2cc21bc7da8dbae45e3d74d31e166efc9499a1831fad8b388520818037e0bf9a5277d8e40ae8b29f5a006daa5c0cf15708b18db4b7ec99663f400ee557f1b4edbc750b3159703f65611a7c9da45811cd584f60156df13bdbf8996f23c2ca531994b7a7e167e2d3f18402c4d60a90af034a8cdf25f20dc6745c08af2cf34d2c2893d965ded59b2c303fd6db85fe110d8c3"}]}, {0x4}, {0x2d8, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_MASK={0x45, 0x1, "49f6ceb2d5bc69186da9f068d8a43e4d321fb5e2afd1f3d6a57516ff3378584472ec7250228ab55016697e88af9cfa8ebdcbe081aa31b426c5bedbef62813baa71"}, @NL80211_PKTPAT_MASK={0x91, 0x1, "64ddd667f2d3bf25f85f6cb9cece2722624871ea43b9e8d24b52abe871f734d1e950086d13c9940a7a5ffc85b1580875be86e32ff8897429986ac8a3a3cac74076dc5b6ebecb2128e7834cf26691b84f569b8b516a7cf97b63cfb53d577d8f837f9aab54069c95f9fa713e467d9234da197b6ddcadd1382c1879353f57805635b8824bf2984fdf8c1e552649e7"}, @NL80211_PKTPAT_MASK={0x1f5, 0x1, "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"}]}]}]}]}, 0x1ec4}}, 0x0) [ 519.813246][T20493] loop0: detected capacity change from 0 to 178 22:38:06 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x9, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:38:06 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$GTP_CMD_DELPDP(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x3}, 0x0) [ 519.914933][T20493] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 519.914933][T20493] [ 519.951276][T20493] ERROR: (device loop0): remounting filesystem as read-only [ 519.981159][T20493] xtLookup: xtSearch returned -5 [ 520.002535][T20493] read_mapping_page failed! [ 520.029574][T20493] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 520.057043][T20493] Mount JFS Failure: -5 22:38:06 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSETELEM(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) [ 520.080162][T20493] jfs_mount failed w/return code = -5 22:38:06 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000140)={@local, @broadcast, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev}, @source_quench={0x8, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @multicast2}}}}}}, 0x0) [ 520.190203][T20493] loop0: detected capacity change from 0 to 178 [ 520.267751][T20493] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 520.267751][T20493] [ 520.357653][T20493] ERROR: (device loop0): remounting filesystem as read-only [ 520.428068][T20493] xtLookup: xtSearch returned -5 [ 520.456198][T20493] read_mapping_page failed! [ 520.472088][T20493] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 520.486649][T20493] Mount JFS Failure: -5 [ 520.543660][T20493] jfs_mount failed w/return code = -5 22:38:07 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000280)="10c4645f01000000010000000100004e36049b", 0x13, 0xb206}], 0x0, &(0x7f0000000080)={[{@nointegrity}]}) 22:38:07 executing program 4: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCGIFMTU(r0, 0x8921, &(0x7f00000003c0)={'veth0_to_bridge\x00'}) 22:38:07 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0xa, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:38:07 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0x5e7f, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:38:07 executing program 5: socketpair(0x1a, 0x0, 0x0, &(0x7f0000000480)) 22:38:07 executing program 3: bpf$MAP_CREATE(0x5, &(0x7f00000000c0), 0x40) 22:38:07 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0xb, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:38:07 executing program 3: socket(0x2c, 0x3, 0x1) 22:38:07 executing program 4: r0 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(r0, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x2e) 22:38:07 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x76, 0x4) setsockopt$sock_int(r1, 0x1, 0x7, &(0x7f0000000080), 0x4) bind$inet(r1, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x3) sendto$inet(r1, &(0x7f00000012c0)="11268a927f", 0xad11, 0x11, 0x0, 0x0) [ 521.012721][T20534] loop0: detected capacity change from 0 to 178 22:38:07 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0x6050, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 521.090298][T20534] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 521.090298][T20534] [ 521.159022][T20534] ERROR: (device loop0): remounting filesystem as read-only [ 521.204294][T20534] xtLookup: xtSearch returned -5 22:38:07 executing program 3: r0 = socket$vsock_stream(0x28, 0x1, 0x0) sendmmsg(r0, 0x0, 0x0, 0x0) [ 521.239444][T20534] read_mapping_page failed! [ 521.281693][T20534] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 521.325315][T20534] Mount JFS Failure: -5 [ 521.357391][T20534] jfs_mount failed w/return code = -5 [ 521.445967][T20534] loop0: detected capacity change from 0 to 178 [ 521.483603][T20534] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 521.483603][T20534] [ 521.550730][T20534] ERROR: (device loop0): remounting filesystem as read-only [ 521.578118][T20534] xtLookup: xtSearch returned -5 [ 521.597959][T20534] read_mapping_page failed! [ 521.609771][T20534] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 521.649343][T20534] Mount JFS Failure: -5 [ 521.665278][T20534] jfs_mount failed w/return code = -5 22:38:08 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xffe, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000280)="10c4645f01000000010000000100004e36049b", 0x13, 0xb206}], 0x0, &(0x7f0000000080)={[{@nointegrity}]}) 22:38:08 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0xf, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:38:08 executing program 4: bpf$PROG_LOAD(0x8, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 22:38:08 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f0000000400), r0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) 22:38:08 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'batadv_slave_1\x00'}]}]}]}], {0x14, 0x10}}, 0xa8}}, 0x0) 22:38:08 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0x623b, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:38:08 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x2) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x420000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000c40)=ANY=[], 0x35c}}, 0x0) 22:38:08 executing program 4: pipe(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r0, 0x5452, 0x0) 22:38:08 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x10, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 522.010625][T20571] loop0: detected capacity change from 0 to 178 22:38:08 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'batadv_slave_1\x00'}]}]}]}], {0x14, 0x10}}, 0xa8}}, 0x0) [ 522.088856][T20571] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 522.088856][T20571] [ 522.139090][T20571] ERROR: (device loop0): remounting filesystem as read-only [ 522.186948][T20571] xtLookup: xtSearch returned -5 [ 522.220133][T20571] read_mapping_page failed! 22:38:08 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) read(r0, &(0x7f0000000000)=""/6, 0x6) bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) socket$inet_udp(0x2, 0x2, 0x0) [ 522.249492][T20571] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 522.320201][T20571] Mount JFS Failure: -5 [ 522.363456][T20571] jfs_mount failed w/return code = -5 22:38:09 executing program 4: socketpair(0x0, 0x0, 0x0, &(0x7f0000000840)) [ 522.414928][T20571] loop0: detected capacity change from 0 to 178 [ 522.490801][T20571] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 522.490801][T20571] [ 522.528807][T20571] ERROR: (device loop0): remounting filesystem as read-only [ 522.566202][T20571] xtLookup: xtSearch returned -5 [ 522.586849][T20571] read_mapping_page failed! [ 522.604061][T20571] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 522.627234][T20571] Mount JFS Failure: -5 [ 522.650675][T20571] jfs_mount failed w/return code = -5 22:38:09 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1001, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000280)="10c4645f01000000010000000100004e36049b", 0x13, 0xb206}], 0x0, &(0x7f0000000080)={[{@nointegrity}]}) 22:38:09 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x11, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:38:09 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'batadv_slave_1\x00'}]}]}]}], {0x14, 0x10}}, 0xa8}}, 0x0) 22:38:09 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0x640c, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:38:09 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000087c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bind$unix(r0, &(0x7f0000000380)=@file={0x1, './file0\x00'}, 0x6e) r1 = socket$nl_generic(0x10, 0x3, 0x10) pipe(0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, 0x0) sendmsg$BATADV_CMD_GET_NEIGHBORS(0xffffffffffffffff, 0x0, 0x20008010) sendmsg$BATADV_CMD_TP_METER(r1, 0x0, 0x0) sendmsg$MPTCP_PM_CMD_GET_LIMITS(0xffffffffffffffff, 0x0, 0x0) 22:38:09 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'batadv_slave_1\x00'}]}]}]}], {0x14, 0x10}}, 0xa8}}, 0x0) 22:38:09 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0xf0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 523.174468][T20614] loop0: detected capacity change from 0 to 178 22:38:09 executing program 4: bpf$BPF_LINK_UPDATE(0x1d, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000080)=@mangle={'mangle\x00', 0x1f, 0x6, 0x650, 0x318, 0x0, 0x318, 0xe8, 0x1d8, 0x580, 0x580, 0x580, 0x580, 0x580, 0x6, 0x0, {[{{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'team0\x00', 'veth0_to_bridge\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@empty}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @local, [], [], 'wg0\x00', 'wg0\x00'}, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private2, @ipv6=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @private1, [], [], 'ip6gre0\x00', 'veth0_to_batadv\x00'}, 0x0, 0x118, 0x140, 0x0, {}, [@common=@dst={{0x48}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@loopback}}}, {{@ipv6={@mcast1, @private1, [], [], 'team_slave_0\x00', 'bond0\x00'}, 0x0, 0x138, 0x180, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x0, 0x0, 0x0, 0x0, @remote, @ipv4={'\x00', '\xff\xff', @remote}, @private2}}]}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv6=@mcast2, @ipv4=@broadcast}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6b0) [ 523.262468][T20614] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 523.262468][T20614] [ 523.344117][T20614] ERROR: (device loop0): remounting filesystem as read-only [ 523.408742][T20614] xtLookup: xtSearch returned -5 22:38:10 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'batadv_slave_1\x00'}]}]}]}], {0x14, 0x10}}, 0xa8}}, 0x0) [ 523.450842][T20614] read_mapping_page failed! 22:38:10 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$GTP_CMD_DELPDP(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0xc0}, 0x0) 22:38:10 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x300, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 523.501385][T20614] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 523.527800][T20625] x_tables: duplicate underflow at hook 1 [ 523.578449][T20626] x_tables: duplicate underflow at hook 1 [ 523.579410][T20614] Mount JFS Failure: -5 [ 523.633005][T20614] jfs_mount failed w/return code = -5 22:38:10 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0x65f7, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 523.707129][T20614] loop0: detected capacity change from 0 to 178 [ 523.739832][T20614] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 523.739832][T20614] [ 523.796533][T20614] ERROR: (device loop0): remounting filesystem as read-only [ 523.816524][T20614] xtLookup: xtSearch returned -5 [ 523.838441][T20614] read_mapping_page failed! [ 523.856561][T20614] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 523.876357][T20614] Mount JFS Failure: -5 [ 523.890831][T20614] jfs_mount failed w/return code = -5 22:38:10 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1002, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000280)="10c4645f01000000010000000100004e36049b", 0x13, 0xb206}], 0x0, &(0x7f0000000080)={[{@nointegrity}]}) 22:38:10 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) sendmmsg(r0, &(0x7f0000007a40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 22:38:10 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x4ae, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:38:10 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x15) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[], 0x60}}, 0x0) 22:38:10 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'batadv_slave_1\x00'}]}]}]}], {0x14, 0x10}}, 0xa8}}, 0x0) 22:38:10 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0x67c8, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 524.324364][T20656] loop0: detected capacity change from 0 to 178 22:38:11 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'batadv_slave_1\x00'}]}]}]}], {0x14, 0x10}}, 0xa8}}, 0x0) 22:38:11 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000001c0), 0x10}, 0x78) 22:38:11 executing program 4: pipe(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r0, 0x0, 0x0) [ 524.372057][T20656] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 524.372057][T20656] [ 524.411671][T20656] ERROR: (device loop0): remounting filesystem as read-only 22:38:11 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x500, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 524.450465][T20656] xtLookup: xtSearch returned -5 [ 524.482365][T20656] read_mapping_page failed! [ 524.511034][T20656] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 524.550880][T20656] Mount JFS Failure: -5 [ 524.580292][T20656] jfs_mount failed w/return code = -5 22:38:11 executing program 4: socketpair(0x18, 0x0, 0x2cd, &(0x7f00000002c0)) 22:38:11 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1020, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000280)="10c4645f01000000010000000100004e36049b", 0x13, 0xb206}], 0x0, &(0x7f0000000080)={[{@nointegrity}]}) 22:38:11 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'batadv_slave_1\x00'}]}]}]}], {0x14, 0x10}}, 0xa8}}, 0x0) 22:38:11 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) bind(r0, &(0x7f0000000040)=@can, 0x80) 22:38:11 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x600, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:38:11 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0x69b3, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 525.264634][T20681] loop0: detected capacity change from 0 to 178 22:38:11 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000040)=0x6, 0x4) sendto$inet6(r0, &(0x7f0000000080)='\'', 0xfffffdef, 0xc837000000000000, 0x0, 0xe000000) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) 22:38:11 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x200002, 0x0) [ 525.354038][T20681] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 525.354038][T20681] [ 525.404810][T20681] ERROR: (device loop0): remounting filesystem as read-only 22:38:12 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'batadv_slave_1\x00'}]}]}]}], {0x14, 0x10}}, 0xa8}}, 0x0) [ 525.470182][T20681] xtLookup: xtSearch returned -5 22:38:12 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x700, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 525.497009][T20681] read_mapping_page failed! [ 525.526952][T20681] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 525.588524][T20681] Mount JFS Failure: -5 22:38:12 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f00000003c0)={'sit0\x00', 0x0}) [ 525.631455][T20681] jfs_mount failed w/return code = -5 [ 525.735431][T20681] loop0: detected capacity change from 0 to 178 22:38:12 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'batadv_slave_1\x00'}]}]}]}], {0x14, 0x10}}, 0xa8}}, 0x0) [ 525.812125][T20681] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 525.812125][T20681] [ 525.885636][T20681] ERROR: (device loop0): remounting filesystem as read-only 22:38:12 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x900, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 525.927282][T20681] xtLookup: xtSearch returned -5 [ 525.964721][T20681] read_mapping_page failed! [ 526.008824][T20681] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 526.072353][T20681] Mount JFS Failure: -5 [ 526.089644][T20681] jfs_mount failed w/return code = -5 22:38:13 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1100, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000280)="10c4645f01000000010000000100004e36049b", 0x13, 0xb206}], 0x0, &(0x7f0000000080)={[{@nointegrity}]}) 22:38:13 executing program 3: r0 = socket$vsock_stream(0x28, 0x1, 0x0) sendmmsg(r0, &(0x7f0000007a40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002d00)=[{0x10}], 0x10}}], 0x1, 0x0) 22:38:13 executing program 5: ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'batadv_slave_1\x00'}]}]}]}], {0x14, 0x10}}, 0xa8}}, 0x0) 22:38:13 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0x6b84, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:38:13 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0xa00, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:38:13 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000087c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, 0x0, 0x0) 22:38:13 executing program 3: bpf$BPF_LINK_UPDATE(0x16, 0x0, 0x0) 22:38:13 executing program 5: ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'batadv_slave_1\x00'}]}]}]}], {0x14, 0x10}}, 0xa8}}, 0x0) [ 526.639029][T20726] loop0: detected capacity change from 0 to 178 22:38:13 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$GTP_CMD_DELPDP(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x300}, 0x0) [ 526.747640][T20726] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 526.747640][T20726] 22:38:13 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0xb00, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 526.819103][T20726] ERROR: (device loop0): remounting filesystem as read-only [ 526.886430][T20726] xtLookup: xtSearch returned -5 [ 526.921297][T20726] read_mapping_page failed! [ 526.958687][T20726] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 527.013304][T20726] Mount JFS Failure: -5 22:38:13 executing program 3: bpf$BPF_LINK_UPDATE(0x1b, 0x0, 0x0) 22:38:13 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$F2FS_IOC_RESERVE_COMPRESS_BLOCKS(r0, 0x8008f513, &(0x7f0000000700)) [ 527.048460][T20726] jfs_mount failed w/return code = -5 [ 527.176055][T20726] loop0: detected capacity change from 0 to 178 [ 527.207051][T20726] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 527.207051][T20726] [ 527.252933][T20726] ERROR: (device loop0): remounting filesystem as read-only [ 527.279396][T20726] xtLookup: xtSearch returned -5 [ 527.297494][T20726] read_mapping_page failed! [ 527.313173][T20726] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 527.332260][T20726] Mount JFS Failure: -5 [ 527.341289][T20726] jfs_mount failed w/return code = -5 22:38:14 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0xf00, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:38:14 executing program 5: ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'batadv_slave_1\x00'}]}]}]}], {0x14, 0x10}}, 0xa8}}, 0x0) 22:38:14 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0x6d6f, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:38:14 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 22:38:14 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1f00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000280)="10c4645f01000000010000000100004e36049b", 0x13, 0xb206}], 0x0, &(0x7f0000000080)={[{@nointegrity}]}) 22:38:14 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, 0x0) 22:38:14 executing program 4: bpf$PROG_LOAD(0x15, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 22:38:14 executing program 5: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'batadv_slave_1\x00'}]}]}]}], {0x14, 0x10}}, 0xa8}}, 0x0) 22:38:14 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x1100, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 527.756435][T20766] loop0: detected capacity change from 0 to 178 22:38:14 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001880)={0x0, 0x1, &(0x7f0000000140)=@raw=[@jmp], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 527.852215][T20766] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 527.852215][T20766] [ 527.965508][T20766] ERROR: (device loop0): remounting filesystem as read-only [ 528.029660][T20766] xtLookup: xtSearch returned -5 [ 528.069073][T20766] read_mapping_page failed! 22:38:14 executing program 4: pipe(0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, [@generic, @alu]}, &(0x7f0000000080)='GPL\x00', 0x0, 0x4, &(0x7f00000000c0)=""/4, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 22:38:14 executing program 5: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'batadv_slave_1\x00'}]}]}]}], {0x14, 0x10}}, 0xa8}}, 0x0) [ 528.107928][T20766] jfs_mount: diMount(ipaimap) failed w/rc = -5 22:38:14 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x3f00, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 528.184662][T20766] Mount JFS Failure: -5 22:38:14 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xce, &(0x7f0000000140)=""/206, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 528.228200][T20766] jfs_mount failed w/return code = -5 [ 528.346111][T20766] loop0: detected capacity change from 0 to 178 [ 528.358627][T20766] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 528.358627][T20766] 22:38:15 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0x6f40, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 528.404744][T20766] ERROR: (device loop0): remounting filesystem as read-only 22:38:15 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_WOWLAN(r0, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000040)={&(0x7f0000000380)={0x1ec4, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void, @void}}, [@NL80211_ATTR_WOWLAN_TRIGGERS={0x1eb0, 0x75, 0x0, 0x1, [@NL80211_WOWLAN_TRIG_PKT_PATTERN={0x132c, 0x4, 0x0, 0x1, [{0x1328, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_PATTERN={0xa1, 0x2, "43f3c4891826a8d19a8c493a542741d4cc7da603f6a0d8ee5e70e646f11810729800adee1b1074c678d602eabe6d43dab80269b8d6c57c5da091ccb0a687b08f8b0de66cdbbebde0979e45b42ec4972df3db88ca86cc8298d4eb6e5993d62f09bcba7360b486387642164bc088167e53b86d18e9cf9f6567a0d38dd2aa59fcec632a747de00a08f41d1b187cbf773409efa76a44c33b041e8514e595b6"}, @NL80211_PKTPAT_OFFSET={0x8}, @NL80211_PKTPAT_PATTERN={0x71, 0x2, "fc3398eb9820f87a3396aa1253274584fe88b17e35166058c1138068747a33bbaf917cc47db5eadbd9a638304d9f01e974682a80ff453857b50b2a89f49151fcb45462833f5914024535c58cc9e360f93e1efa43de06a3bf5d2e0f4a06a27167c4d77897800314ff7a69f1697a"}, @NL80211_PKTPAT_PATTERN={0xd5, 0x2, "fb7e402305ab1c73358a1843b9afd2ed857b3f07710c17347f35f32d2fa9f13288038d9da7d6ac2b63d561adc5d128660cf3528e7e919065fefaf6aadf34859f35f3aee63423b4bd618553d695b949434f4133e033a2d7b1c8aa13a56540b868b78a7ea955ccbaa96f46139eaf890c60d13eda1dd7e10cb1b7748e352a4098273c03f2acf6fd54ade9207f6a555bef30ecd3876c259ca52502ef55601641d0a6bf6c451260522f270debede6b9d30177ad654558b194f4e829d49a4f093fa5ddd72c210c444866115efac9f77e22478ccb"}, @NL80211_PKTPAT_PATTERN={0x41, 0x2, "f676d463cc648e047a1eaa412df3d0afd86b62faad009a5546224682a1afa132cbd715380199e06cdc1a5ad7c2ee70aa6bdfa81bc3c3fd1bad8c0b5f19"}, @NL80211_PKTPAT_MASK={0xd1, 0x1, "4de43b4362784d039c5aa6b63cf613c6861e19cf07d9b9b902744399728fbd0536576bc6a900b7dca7a53a61ff8b4331fe06755a6cb29ab1ddd4fca31bd26b9ac8aecabcdb4fee22fc44169d2a9fadfd63d3849320baf436801b4817490113c44536399bebde2546f9959fec4956ba4263efd7c61b188bbd33c27fed81d48ed8fd2c8af9eca646e821abd51b67183b15e92cbf245f2c852fe2ffb797c8e078c09013cfeddad7d9c339bc9ce90644ec160e8073afcd7f9766d0804c859773df5fad16cfb1dc79d6676083dcfba7"}, @NL80211_PKTPAT_PATTERN={0x1001, 0x2, "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"}, @NL80211_PKTPAT_PATTERN={0x5, 0x2, "f0"}, @NL80211_PKTPAT_OFFSET={0x8}]}]}, @NL80211_WOWLAN_TRIG_GTK_REKEY_FAILURE={0x4}, @NL80211_WOWLAN_TRIG_MAGIC_PKT={0x4}, @NL80211_WOWLAN_TRIG_GTK_REKEY_FAILURE={0x4}, @NL80211_WOWLAN_TRIG_NET_DETECT={0xf8, 0x12, 0x0, 0x1, [@NL80211_ATTR_SCAN_FREQUENCIES={0x24, 0x2c, 0x0, 0x1, [{0x8}, {0x8}, {0x8}, {0x8}]}, @NL80211_ATTR_BG_SCAN_PERIOD={0x6}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_SCHED_SCAN_MATCH={0x74, 0x84, 0x0, 0x1, [@NL80211_SCHED_SCAN_MATCH_ATTR_RSSI={0x8}, @NL80211_SCHED_SCAN_MATCH_ATTR_SSID={0xa, 0x1, @default_ap_ssid}, @NL80211_SCHED_SCAN_MATCH_ATTR_SSID={0xa, 0x1, @default_ap_ssid}, @NL80211_SCHED_SCAN_MATCH_PER_BAND_RSSI={0x3c, 0x6, 0x0, 0x1, [@NL80211_BAND_2GHZ={0x8}, @NL80211_BAND_60GHZ={0x8}, @NL80211_BAND_5GHZ={0x8}, @NL80211_BAND_6GHZ={0x8}, @NL80211_BAND_6GHZ={0x8}, @NL80211_BAND_5GHZ={0x8}, @NL80211_BAND_2GHZ={0x8}]}, @NL80211_SCHED_SCAN_MATCH_ATTR_BSSID={0xa}, @NL80211_SCHED_SCAN_MATCH_ATTR_SSID={0x5, 0x1, @random="f9"}]}, @NL80211_ATTR_SCAN_SSIDS={0x48, 0x2d, 0x0, 0x1, [{0xa, 0x0, @default_ibss_ssid}, {0xa, 0x0, @default_ibss_ssid}, {0x1d, 0x0, @random="3bf7f3eb5e06b215bb64e0934b9f7a9ed4471e674d9a94a8e9"}, {0xa, 0x0, @default_ibss_ssid}]}]}, @NL80211_WOWLAN_TRIG_PKT_PATTERN={0xa7c, 0x4, 0x0, 0x1, [{0x15c, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_PATTERN={0xed, 0x2, "877af183e78309f6a1883e41e5bfda5fe74ab798f03f34b2724a603f28a948e8dfda7298106ba794380390ea27082894b648f87567d7b03614aa057b53bb28556b14f48bb37bd5602e780f34af3becc649feea7fc3be3a78fb8ff7f43d1ef84b38c0b80f8f66a85e853eba320fe2d69213d26beeea323b1e3c317440dc99c0c1b52ac062a353ebf30cd05718d90eec5d21f6a831b20b58583e6c7d9770b80862c7bba42ddbdc44f4671b20004eff70612a46128566e4a444be3a9c37a09c6fad5d197aa884a0e4180ee8f29048b8b3858ef280ce5dbd4dd7da7af7564a51a0180279fafd38634e4525"}, @NL80211_PKTPAT_MASK={0x55, 0x1, "e4fd06b02b48dbfe11c6508ccd2067e01a30c3c0b0f5f71c3f6dcf1c6215f2c77fd953966c6598680417afbff6d7f0e9b6b1e7b73337f8da04399ae5f1236ab2a7d202d8eb56c34de68e0bb2c077002ab6"}, @NL80211_PKTPAT_OFFSET={0x8}, @NL80211_PKTPAT_OFFSET={0x8}]}, {0x25c, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_OFFSET={0x8}, @NL80211_PKTPAT_OFFSET={0x8}, @NL80211_PKTPAT_MASK={0x21, 0x1, "70fa1c8b1c8b10a6cc30be4fd704070cb85abb600c7b3a3519fcb366c5"}, @NL80211_PKTPAT_OFFSET={0x8}, @NL80211_PKTPAT_OFFSET={0x8}, @NL80211_PKTPAT_PATTERN={0xd1, 0x2, "ad2db96cfe9785775ee53c5ab0707b4ded69bbbec8747e0547c22acdbf55998a3e18c4ab06ad6ba22e8720ac00ada6272dfd68264b6a3ce229c1a35f35411a04df1c83082475dff07808b7e8891259f38f97b6425ac08b691cd88c3607b0df034ab74ce528c4ef26a88e83aaf751131d88154681519b813cc19baf88b34c84c14e8624627bfc3f232be1a99d46bde54cb33fe4cce6856cc23ff9c5394f727fffad344db09d2106979ace82db5cef2b5b1100ea7857e0219ccd7763b345ac0d9c56c3678e563d49ac69a7490128"}, @NL80211_PKTPAT_PATTERN={0xe5, 0x2, "afb002ac30dca2b0c3201bfacdd559520520fc7d748f0bf174b681b589d52509d2d99319f7398240ffa33caa92a93792a25f7f23a968dad9eeb4c7a26bd8644ad0452f6e75a3030ff5b9081f799d945b88517136ac5d08de91cafe7ef45d6bc7639562902b7498f4b9767f46d67712a88b328b5b74aeb88d808681778d3c11863c9a94a5e3932c7d7a75138fe6b6b2bbead17ca13e71db4b6e1a9f8257e954d52208a15013248e105ffb10195dff34d72974bd8ff96dd68b26ffb8a4d0750294feb81e291a0deb8ce29a75e0324f2c5cb4c0a63cff7664974e7e117484da7ebe89"}, @NL80211_PKTPAT_PATTERN={0x55, 0x2, "e6479b7fcf06db6cd3e91ba6caf91faa4475a06d7226842d2e33621b8f003560ec100538a3f5b3e24c6158d5ae09c7f9741106aa067f95d05330d6221f0c65a6bb524cee847d7046e5c655c255ada59558"}]}, {0x3e4, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_PATTERN={0x45, 0x2, "18ea2b9079b79cdf1966a83bd9e466a068912e209a065fd54f38ed6c5f8f5d299168be145acc00187aa8c43165f1da203d0b44c322305aed90a1cf733d301834fa"}, @NL80211_PKTPAT_MASK={0xb5, 0x1, "3be38bd397fe9b80d1ff9403a7cb67dfcf4eaf2b31c13293a76ffec674d6ac32632d5d97c0785190c1fd14d135378df8793fa86970b9533660ef2eaff08f061c3badf5ebe28477c0d511a320457f72322c238d0fb7c5d09832730726449a98355d59ad9e6de43275357489959f706f5ce20021a15da99584cb2f7e45a46c92fcc4d0ed23c45159150cb8d6be1bad9f4fea05897a1fa58b5b1e0ffd7c47f92145545aa3a19c68eefe59fe7bfb9002cc5236"}, @NL80211_PKTPAT_MASK={0x79, 0x1, "9a59b332ae438c997cae5544ae59024241de609078bfaba0d84858ecdc90977c0b42f240b5002daba88bf38c5c0dd2b99c5a33cbdb8189ed9fb1960bf90ad15abf4c43665edbec97c73471d3bc54c19dd5ae8f9225cf201348d5a4dd2e0af57403a3f961d487586de30ab3823369400577dc583fd4"}, @NL80211_PKTPAT_MASK={0x59, 0x1, "dbe1bb3595088babb6d3cef05251f5a344afaa0ea8bc2f77107da977bf7c287c191ca4693d209bba930218e3d548fa894172d7a44e52955e3a1a8d47ad82c1768582895a039af49a8088bae135f8cbd166247e3905"}, @NL80211_PKTPAT_MASK={0xd1, 0x1, "3ad381227d70832f1aa462a1b52280823931e52fdf4bc85b947494cbc50a95ca2ed9612b831ab8909c8acde2d79e4c213c4248327afe5908b195459d29d31bb6b31eaadc89a7cae90378a1ca7195b163a153ba94ba44b13ea14404b603476006ad4079de23627f2cdf1e42168517ca06075ee6975c60bb607fff55a4c48c69015da36079238cfd6cacc86527462e05e886bc84af8844ce7387a3233effc1a9d6905a4f6a43e05cfaa9c38b36253feca5cf86ca8bec2ffb1fc77a582abb05a46470bfc68f25bc79a97faf861a5c"}, @NL80211_PKTPAT_OFFSET={0x8}, @NL80211_PKTPAT_MASK={0x5, 0x1, "99"}, @NL80211_PKTPAT_MASK={0x4}, @NL80211_PKTPAT_PATTERN={0x2d, 0x2, "41909d48ebde6dfa1206477f9d2b38d28293f9c8634ba6b21f08c614ace8f69873bf60e4c225b50699"}, @NL80211_PKTPAT_PATTERN={0xed, 0x2, "e213e74fa30f49e8aa00787e3b62bbb82f63fb68ee77cd47455df84f2d19312a3d5234804c42dea0f1c7ffca8987f739b1302598eba3d6e2fc369eb383bfc1934e6ac17fb6ed1c725f201563c03c1e8bfdd8499bbba94fdce2cc21bc7da8dbae45e3d74d31e166efc9499a1831fad8b388520818037e0bf9a5277d8e40ae8b29f5a006daa5c0cf15708b18db4b7ec99663f400ee557f1b4edbc750b3159703f65611a7c9da45811cd584f60156df13bdbf8996f23c2ca531994b7a7e167e2d3f18402c4d60a90af034a8cdf25f20dc6745c08af2cf34d2c2893d965ded59b2c303fd6db85fe110d8c3"}]}, {0x4}, {0x2d8, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_MASK={0x45, 0x1, "49f6ceb2d5bc69186da9f068d8a43e4d321fb5e2afd1f3d6a57516ff3378584472ec7250228ab55016697e88af9cfa8ebdcbe081aa31b426c5bedbef62813baa71"}, @NL80211_PKTPAT_MASK={0x91, 0x1, "64ddd667f2d3bf25f85f6cb9cece2722624871ea43b9e8d24b52abe871f734d1e950086d13c9940a7a5ffc85b1580875be86e32ff8897429986ac8a3a3cac74076dc5b6ebecb2128e7834cf26691b84f569b8b516a7cf97b63cfb53d577d8f837f9aab54069c95f9fa713e467d9234da197b6ddcadd1382c1879353f57805635b8824bf2984fdf8c1e552649e7"}, @NL80211_PKTPAT_MASK={0x1f5, 0x1, "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"}]}]}]}]}, 0x1ec4}}, 0x0) [ 528.446499][T20766] xtLookup: xtSearch returned -5 [ 528.471255][T20766] read_mapping_page failed! [ 528.494013][T20766] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 528.521190][T20766] Mount JFS Failure: -5 [ 528.553055][T20766] jfs_mount failed w/return code = -5 22:38:15 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000280)="10c4645f01000000010000000100004e36049b", 0x13, 0xb206}], 0x0, &(0x7f0000000080)={[{@nointegrity}]}) 22:38:15 executing program 5: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'batadv_slave_1\x00'}]}]}]}], {0x14, 0x10}}, 0xa8}}, 0x0) 22:38:15 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0xae04, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:38:15 executing program 3: r0 = socket(0x2a, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 22:38:15 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) accept4(r0, 0x0, 0x0, 0x0) 22:38:15 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'batadv_slave_1\x00'}]}]}]}], {0x14, 0x10}}, 0xa8}}, 0x0) [ 528.962933][T20807] loop0: detected capacity change from 0 to 178 22:38:15 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0xf000, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 529.029246][T20807] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 529.029246][T20807] [ 529.105803][T20807] ERROR: (device loop0): remounting filesystem as read-only 22:38:15 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000087c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000004780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001f00)=[@rights={{0x10}}], 0x10}}], 0x1, 0x0) 22:38:15 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000087c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$unix(r0, &(0x7f0000004780)=[{{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, 0x0, 0x0, &(0x7f0000001f00)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}], 0x1, 0x0) [ 529.168823][T20807] xtLookup: xtSearch returned -5 [ 529.211122][T20807] read_mapping_page failed! 22:38:15 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0x712b, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 529.241431][T20807] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 529.276772][T20807] Mount JFS Failure: -5 22:38:15 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'batadv_slave_1\x00'}]}]}]}], {0x14, 0x10}}, 0xa8}}, 0x0) [ 529.314750][T20807] jfs_mount failed w/return code = -5 22:38:15 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) getsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, 0x0, &(0x7f00000001c0)) [ 529.397275][T20807] loop0: detected capacity change from 0 to 178 [ 529.424725][T20807] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 529.424725][T20807] [ 529.480081][T20807] ERROR: (device loop0): remounting filesystem as read-only [ 529.536461][T20807] xtLookup: xtSearch returned -5 [ 529.572993][T20807] read_mapping_page failed! [ 529.604967][T20807] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 529.654385][T20807] Mount JFS Failure: -5 [ 529.680321][T20807] jfs_mount failed w/return code = -5 22:38:16 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2010, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000280)="10c4645f01000000010000000100004e36049b", 0x13, 0xb206}], 0x0, &(0x7f0000000080)={[{@nointegrity}]}) 22:38:16 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x30000, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:38:16 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x4) syz_genetlink_get_family_id$gtp(&(0x7f0000000040), r0) 22:38:16 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'batadv_slave_1\x00'}]}]}]}], {0x14, 0x10}}, 0xa8}}, 0x0) 22:38:16 executing program 3: r0 = socket(0x23, 0x2, 0x0) ioctl$IMHOLD_L1(r0, 0x80044948, 0x0) 22:38:16 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0x72fc, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:38:16 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x34000, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:38:16 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x40, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'bond0\x00'}]}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}]}], {0x14, 0x10}}, 0xe8}}, 0x0) [ 530.071936][T20849] loop0: detected capacity change from 0 to 178 22:38:16 executing program 3: bpf$PROG_LOAD(0x17, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 22:38:16 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'batadv_slave_1\x00'}]}]}]}], {0x14, 0x10}}, 0xa8}}, 0x0) [ 530.148425][T20849] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 530.148425][T20849] [ 530.198065][T20849] ERROR: (device loop0): remounting filesystem as read-only [ 530.239482][T20849] xtLookup: xtSearch returned -5 [ 530.275627][T20849] read_mapping_page failed! [ 530.303159][T20849] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 530.342742][T20849] Mount JFS Failure: -5 22:38:17 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x400300, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 530.370357][T20849] jfs_mount failed w/return code = -5 22:38:17 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x40, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'bond0\x00'}]}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}]}], {0x14, 0x10}}, 0xe8}}, 0x0) [ 530.485916][T20849] loop0: detected capacity change from 0 to 178 [ 530.532204][T20849] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 530.532204][T20849] [ 530.596751][T20849] ERROR: (device loop0): remounting filesystem as read-only [ 530.645650][T20849] xtLookup: xtSearch returned -5 [ 530.682648][T20849] read_mapping_page failed! [ 530.718907][T20849] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 530.805079][T20849] Mount JFS Failure: -5 [ 530.849769][T20849] jfs_mount failed w/return code = -5 22:38:17 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2300, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000280)="10c4645f01000000010000000100004e36049b", 0x13, 0xb206}], 0x0, &(0x7f0000000080)={[{@nointegrity}]}) 22:38:17 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'batadv_slave_1\x00'}]}]}]}], {0x14, 0x10}}, 0xa8}}, 0x0) 22:38:17 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000087c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000004780)=[{{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, 0x0}}], 0x1, 0x1) 22:38:17 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x40, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'bond0\x00'}]}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}]}], {0x14, 0x10}}, 0xe8}}, 0x0) 22:38:17 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0xf0ffff, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:38:17 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0x74e7, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:38:17 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'batadv_slave_1\x00'}]}]}]}], {0x14, 0x10}}, 0xa8}}, 0x0) 22:38:17 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0xffffff72) syz_emit_ethernet(0x4a, &(0x7f0000000340)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, {[@exp_fastopen={0xfe, 0x4}, @mss={0x3, 0x4}, @mss={0x2, 0x4}, @timestamp={0x8, 0xa}, @mptcp=@add_addr={0x1e, 0x12, 0x0, 0x12, 0x0, @multicast2, 0x0, "6202000000000000"}, @window={0x22, 0x3}, @fastopen={0x22, 0x6, "59416206"}, @mptcp=@mp_fclose={0x1e, 0xc}]}}}}}}}}, 0x0) [ 531.151987][T20890] loop0: detected capacity change from 0 to 178 22:38:17 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x40, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'bond0\x00'}]}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}]}], {0x14, 0x10}}, 0xe8}}, 0x0) [ 531.221941][T20890] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 531.221941][T20890] [ 531.246128][T20890] ERROR: (device loop0): remounting filesystem as read-only [ 531.261605][T20890] xtLookup: xtSearch returned -5 [ 531.297405][T20890] read_mapping_page failed! 22:38:17 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x1000000, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 531.324258][T20890] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 531.359386][T20890] Mount JFS Failure: -5 [ 531.392386][T20890] jfs_mount failed w/return code = -5 [ 531.467776][T20890] loop0: detected capacity change from 0 to 178 [ 531.539936][T20890] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 531.539936][T20890] 22:38:18 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'batadv_slave_1\x00'}]}]}]}], {0x14, 0x10}}, 0xa8}}, 0x0) [ 531.650255][T20890] ERROR: (device loop0): remounting filesystem as read-only 22:38:18 executing program 3: r0 = socket$kcm(0x29, 0x2, 0x0) sendto(r0, 0x0, 0x0, 0xc1, 0x0, 0x0) [ 531.720698][T20890] xtLookup: xtSearch returned -5 [ 531.769816][T20890] read_mapping_page failed! [ 531.805561][T20890] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 531.827360][T20890] Mount JFS Failure: -5 [ 531.847440][T20890] jfs_mount failed w/return code = -5 22:38:18 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3f00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000280)="10c4645f01000000010000000100004e36049b", 0x13, 0xb206}], 0x0, &(0x7f0000000080)={[{@nointegrity}]}) 22:38:18 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x40, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'bond0\x00'}]}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}]}], {0x14, 0x10}}, 0xe8}}, 0x0) 22:38:18 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'batadv_slave_1\x00'}]}]}]}], {0x14, 0x10}}, 0xa8}}, 0x0) 22:38:18 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x2000000, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:38:18 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0x76b8, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:38:18 executing program 3: socketpair(0x18, 0x0, 0x0, &(0x7f00000002c0)) 22:38:18 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x40, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'bond0\x00'}]}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}]}], {0x14, 0x10}}, 0xe8}}, 0x0) 22:38:18 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'batadv_slave_1\x00'}]}]}]}], {0x14, 0x10}}, 0xa8}}, 0x0) 22:38:18 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000008640)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x40) 22:38:18 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x3000000, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 532.258824][T20929] loop0: detected capacity change from 0 to 178 [ 532.356066][T20929] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 532.356066][T20929] [ 532.459735][T20929] ERROR: (device loop0): remounting filesystem as read-only [ 532.555607][T20929] xtLookup: xtSearch returned -5 [ 532.585084][T20929] read_mapping_page failed! [ 532.612692][T20929] jfs_mount: diMount(ipaimap) failed w/rc = -5 22:38:19 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x40, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'bond0\x00'}]}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}]}], {0x14, 0x10}}, 0xe8}}, 0x0) [ 532.659877][T20929] Mount JFS Failure: -5 [ 532.687480][T20929] jfs_mount failed w/return code = -5 22:38:19 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'batadv_slave_1\x00'}]}]}]}], {0x14, 0x10}}, 0xa8}}, 0x0) [ 532.801268][T20929] loop0: detected capacity change from 0 to 178 [ 532.872465][T20929] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 532.872465][T20929] [ 532.891875][T20929] ERROR: (device loop0): remounting filesystem as read-only [ 532.916610][T20929] xtLookup: xtSearch returned -5 [ 532.933724][T20929] read_mapping_page failed! [ 532.945697][T20929] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 532.962679][T20929] Mount JFS Failure: -5 [ 532.971564][T20929] jfs_mount failed w/return code = -5 22:38:19 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000280)="10c4645f01000000010000000100004e36049b", 0x13, 0xb206}], 0x0, &(0x7f0000000080)={[{@nointegrity}]}) 22:38:19 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000000)='GPL\x00', 0x34a, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 22:38:19 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x4000000, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:38:19 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0x78a3, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:38:19 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'batadv_slave_1\x00'}]}]}]}], {0x14, 0x10}}, 0xa8}}, 0x0) 22:38:19 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x40, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'bond0\x00'}]}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}]}], {0x14, 0x10}}, 0xe8}}, 0x0) 22:38:19 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x5000000, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 533.272422][T20966] loop0: detected capacity change from 0 to 178 22:38:19 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'batadv_slave_1\x00'}]}]}]}], {0x14, 0x10}}, 0xa8}}, 0x0) 22:38:19 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 22:38:20 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x40, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'bond0\x00'}]}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}]}], {0x14, 0x10}}, 0xe8}}, 0x0) [ 533.348584][T20966] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 533.348584][T20966] [ 533.416844][T20966] ERROR: (device loop0): remounting filesystem as read-only [ 533.469951][T20966] xtLookup: xtSearch returned -5 [ 533.520599][T20966] read_mapping_page failed! [ 533.565268][T20966] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 533.634774][T20966] Mount JFS Failure: -5 [ 533.679846][T20966] jfs_mount failed w/return code = -5 22:38:20 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x6000000, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:38:20 executing program 3: r0 = socket(0x10, 0x80003, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=@RTM_GETMDB={0x18, 0x56, 0x652f408dcbab8399}, 0x18}}, 0x0) 22:38:20 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4800, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000280)="10c4645f01000000010000000100004e36049b", 0x13, 0xb206}], 0x0, &(0x7f0000000080)={[{@nointegrity}]}) 22:38:20 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, 0x0, 0x0) 22:38:20 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x40, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'bond0\x00'}]}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}]}], {0x14, 0x10}}, 0xe8}}, 0x0) 22:38:20 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0x7a74, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:38:20 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x200002, 0x0) 22:38:20 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x7000000, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:38:20 executing program 4: ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x40, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'bond0\x00'}]}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}]}], {0x14, 0x10}}, 0xe8}}, 0x0) [ 534.060379][T20995] loop0: detected capacity change from 0 to 178 [ 534.115271][T20995] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 534.115271][T20995] [ 534.160297][T20995] ERROR: (device loop0): remounting filesystem as read-only 22:38:20 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, 0x0, 0x0) [ 534.208910][T20995] xtLookup: xtSearch returned -5 [ 534.242432][T20995] read_mapping_page failed! 22:38:20 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f00000023c0)={&(0x7f0000000040), 0x2, &(0x7f0000002380)={0x0}}, 0x0) [ 534.280055][T20995] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 534.335219][T20995] Mount JFS Failure: -5 22:38:21 executing program 4: ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x40, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'bond0\x00'}]}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}]}], {0x14, 0x10}}, 0xe8}}, 0x0) [ 534.367237][T20995] jfs_mount failed w/return code = -5 22:38:21 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x8000000, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 534.482944][T20995] loop0: detected capacity change from 0 to 178 [ 534.518960][T20995] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 534.518960][T20995] 22:38:21 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, 0x0, 0x0) [ 534.596734][T20995] ERROR: (device loop0): remounting filesystem as read-only [ 534.677879][T20995] xtLookup: xtSearch returned -5 [ 534.715275][T20995] read_mapping_page failed! [ 534.757942][T20995] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 534.793256][T20995] Mount JFS Failure: -5 [ 534.797680][T20995] jfs_mount failed w/return code = -5 22:38:21 executing program 4: ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x40, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'bond0\x00'}]}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}]}], {0x14, 0x10}}, 0xe8}}, 0x0) 22:38:21 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x0, 0xa54}, 0x40) 22:38:21 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0x7c5f, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:38:21 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) 22:38:21 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4c00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000280)="10c4645f01000000010000000100004e36049b", 0x13, 0xb206}], 0x0, &(0x7f0000000080)={[{@nointegrity}]}) 22:38:21 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x9000000, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:38:21 executing program 4: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x40, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'bond0\x00'}]}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}]}], {0x14, 0x10}}, 0xe8}}, 0x0) 22:38:21 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000080)=@mangle={'mangle\x00', 0x1f, 0x6, 0x550, 0x318, 0x0, 0x318, 0xe8, 0x1d8, 0x580, 0x580, 0x580, 0x580, 0x580, 0x6, 0x0, {[{{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'team0\x00', 'veth0_to_bridge\x00'}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@empty}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @local, [], [], 'wg0\x00', 'wg0\x00'}, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private2, @ipv6=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @private1, [], [], 'ip6gre0\x00', 'veth0_to_batadv\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@loopback}}}, {{@ipv6={@mcast1, @private1, [], [], 'team_slave_0\x00', 'bond0\x00'}, 0x0, 0xa8, 0xf0}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv6=@mcast2, @ipv4=@broadcast}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5b0) 22:38:21 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0xa000000, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 535.055255][T21037] loop0: detected capacity change from 0 to 178 22:38:21 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) [ 535.139247][T21037] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 535.139247][T21037] [ 535.216440][T21037] ERROR: (device loop0): remounting filesystem as read-only [ 535.280333][T21037] xtLookup: xtSearch returned -5 [ 535.319507][T21037] read_mapping_page failed! 22:38:22 executing program 4: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x40, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'bond0\x00'}]}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}]}], {0x14, 0x10}}, 0xe8}}, 0x0) [ 535.365017][T21037] jfs_mount: diMount(ipaimap) failed w/rc = -5 22:38:22 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FIDEDUPERANGE(r0, 0xc0189436, 0x0) [ 535.458585][T21037] Mount JFS Failure: -5 [ 535.474515][T21037] jfs_mount failed w/return code = -5 22:38:22 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0xb000000, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:38:22 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) [ 535.565433][T21037] loop0: detected capacity change from 0 to 178 [ 535.597298][T21037] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 535.597298][T21037] [ 535.649858][T21037] ERROR: (device loop0): remounting filesystem as read-only [ 535.704698][T21037] xtLookup: xtSearch returned -5 [ 535.750183][T21037] read_mapping_page failed! 22:38:22 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0x7e30, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:38:22 executing program 4: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x40, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'bond0\x00'}]}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}]}], {0x14, 0x10}}, 0xe8}}, 0x0) [ 535.787811][T21037] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 535.801075][T21037] Mount JFS Failure: -5 [ 535.805667][T21037] jfs_mount failed w/return code = -5 22:38:22 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x6000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000280)="10c4645f01000000010000000100004e36049b", 0x13, 0xb206}], 0x0, &(0x7f0000000080)={[{@nointegrity}]}) 22:38:22 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_UPDATE_OWE_INFO(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={0xfffffffffffffffc}}, 0x0) 22:38:22 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0xf000000, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:38:22 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) 22:38:22 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x40, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'bond0\x00'}]}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}]}], {0x14, 0x10}}, 0xe8}}, 0x0) 22:38:22 executing program 3: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, 0x0) [ 536.178843][T21082] loop0: detected capacity change from 0 to 178 22:38:22 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) 22:38:22 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x10000000, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 536.275622][T21082] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 536.275622][T21082] 22:38:22 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x40, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'bond0\x00'}]}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}]}], {0x14, 0x10}}, 0xe8}}, 0x0) [ 536.338581][T21082] ERROR: (device loop0): remounting filesystem as read-only [ 536.414129][T21082] xtLookup: xtSearch returned -5 [ 536.454500][T21082] read_mapping_page failed! 22:38:23 executing program 3: pipe(&(0x7f0000000800)={0xffffffffffffffff}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000100)) [ 536.492833][T21082] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 536.604881][T21082] Mount JFS Failure: -5 [ 536.625662][T21082] jfs_mount failed w/return code = -5 22:38:23 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0x801b, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:38:23 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) [ 536.704233][T21082] loop0: detected capacity change from 0 to 178 [ 536.743681][T21082] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 536.743681][T21082] [ 536.767416][T21082] ERROR: (device loop0): remounting filesystem as read-only [ 536.785464][T21082] xtLookup: xtSearch returned -5 [ 536.797474][T21082] read_mapping_page failed! [ 536.818867][T21082] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 536.865217][T21082] Mount JFS Failure: -5 [ 536.942507][T21082] jfs_mount failed w/return code = -5 22:38:23 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x6800, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000280)="10c4645f01000000010000000100004e36049b", 0x13, 0xb206}], 0x0, &(0x7f0000000080)={[{@nointegrity}]}) 22:38:23 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x11000000, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:38:23 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x40, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'bond0\x00'}]}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}]}], {0x14, 0x10}}, 0xe8}}, 0x0) 22:38:23 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_ASSOCIATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={0x44, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}, [@NL80211_ATTR_DISABLE_HT={0x4}, @NL80211_ATTR_VHT_CAPABILITY={0x10}, @NL80211_ATTR_USE_MFP={0x8}]}, 0x44}}, 0x0) 22:38:23 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0x48}}, 0x0) [ 537.335308][T21122] loop0: detected capacity change from 0 to 178 [ 537.349563][T21122] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 537.349563][T21122] 22:38:24 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x3f000000, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 537.376636][T21122] ERROR: (device loop0): remounting filesystem as read-only [ 537.412592][T21122] xtLookup: xtSearch returned -5 22:38:24 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x8916, &(0x7f0000000000)={'rose0\x00', @ifru_settings={0x0, 0x0, @te1=0x0}}) 22:38:24 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0x48}}, 0x0) 22:38:24 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x40, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'bond0\x00'}]}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}]}], {0x14, 0x10}}, 0xe8}}, 0x0) [ 537.436530][T21122] read_mapping_page failed! 22:38:24 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0x81ec, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 537.475471][T21122] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 537.489852][T21122] Mount JFS Failure: -5 [ 537.507817][T21122] jfs_mount failed w/return code = -5 22:38:24 executing program 3: clock_gettime(0x0, &(0x7f0000002940)={0x0, 0x0}) clock_settime(0x0, &(0x7f0000000040)={r0, r1+60000000}) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000028c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) openat$cgroup_devices(0xffffffffffffffff, 0x0, 0x2, 0x0) [ 537.588785][T21122] loop0: detected capacity change from 0 to 178 22:38:24 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x9effffff, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 537.634795][T21122] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 537.634795][T21122] [ 537.690928][T21122] ERROR: (device loop0): remounting filesystem as read-only [ 537.732211][T21122] xtLookup: xtSearch returned -5 [ 537.767955][T21122] read_mapping_page failed! [ 537.791729][T21122] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 537.818137][T21122] Mount JFS Failure: -5 [ 537.838766][T21122] jfs_mount failed w/return code = -5 22:38:24 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x6c00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000280)="10c4645f01000000010000000100004e36049b", 0x13, 0xb206}], 0x0, &(0x7f0000000080)={[{@nointegrity}]}) 22:38:24 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x40, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'bond0\x00'}]}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}]}], {0x14, 0x10}}, 0xe8}}, 0x0) 22:38:24 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0x48}}, 0x0) 22:38:24 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_int(r0, 0x1, 0x8, 0x0, &(0x7f0000000040)=0xfdc9) 22:38:24 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0x83d7, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:38:24 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0xae040000, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:38:24 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x0, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'batadv_slave_1\x00'}]}]}]}], {0x14, 0x10}}, 0xa8}}, 0x0) 22:38:24 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x40, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'bond0\x00'}]}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}]}], {0x14, 0x10}}, 0xe8}}, 0x0) [ 538.123684][T21165] loop0: detected capacity change from 0 to 178 22:38:24 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_int(r0, 0x1, 0xd, 0x0, &(0x7f0000000040)) [ 538.206493][T21165] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 538.206493][T21165] 22:38:25 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0xb72b4afa, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 538.287006][T21165] ERROR: (device loop0): remounting filesystem as read-only [ 538.385511][T21165] xtLookup: xtSearch returned -5 [ 538.444220][T21165] read_mapping_page failed! [ 538.483470][T21165] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 538.522597][T21165] Mount JFS Failure: -5 [ 538.526918][T21165] jfs_mount failed w/return code = -5 22:38:25 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[], 0x78) 22:38:25 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x40, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'bond0\x00'}]}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}]}], {0x14, 0x10}}, 0xe8}}, 0x0) [ 538.597877][T21165] loop0: detected capacity change from 0 to 178 [ 538.609750][T21165] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 538.609750][T21165] [ 538.660694][T21165] ERROR: (device loop0): remounting filesystem as read-only [ 538.683693][T21165] xtLookup: xtSearch returned -5 [ 538.698873][T21165] read_mapping_page failed! 22:38:25 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x7400, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000280)="10c4645f01000000010000000100004e36049b", 0x13, 0xb206}], 0x0, &(0x7f0000000080)={[{@nointegrity}]}) 22:38:25 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x0, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'batadv_slave_1\x00'}]}]}]}], {0x14, 0x10}}, 0xa8}}, 0x0) 22:38:25 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0x85a8, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:38:25 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0xf0ffffff, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 538.709444][T21165] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 538.709554][T21165] Mount JFS Failure: -5 [ 538.709565][T21165] jfs_mount failed w/return code = -5 22:38:25 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x40, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'bond0\x00'}]}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}]}], {0x14, 0x10}}, 0xe8}}, 0x0) 22:38:25 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x0, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'batadv_slave_1\x00'}]}]}]}], {0x14, 0x10}}, 0xa8}}, 0x0) 22:38:25 executing program 3: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f0000001480)={0x7, 0x2, 0x1}) syz_open_procfs(0xffffffffffffffff, 0x0) mmap(&(0x7f000015c000/0x4000)=nil, 0x4002, 0x3fffffff, 0x11, r0, 0x0) 22:38:25 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0xfa4a2bb7, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 539.072144][T21203] loop0: detected capacity change from 0 to 178 [ 539.153932][T21203] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 539.153932][T21203] [ 539.173853][T21203] ERROR: (device loop0): remounting filesystem as read-only 22:38:25 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x40, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'bond0\x00'}]}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}]}], {0x14, 0x10}}, 0xe8}}, 0x0) [ 539.223615][T21203] xtLookup: xtSearch returned -5 22:38:25 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'batadv_slave_1\x00'}]}]}]}], {0x14, 0x10}}, 0xa8}}, 0x0) [ 539.252225][T21203] read_mapping_page failed! [ 539.276208][T21203] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 539.320404][T21203] Mount JFS Failure: -5 [ 539.336285][T21203] jfs_mount failed w/return code = -5 [ 539.421019][T21203] loop0: detected capacity change from 0 to 178 [ 539.475801][T21203] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 539.475801][T21203] 22:38:26 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0xfffff000, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 539.557981][T21203] ERROR: (device loop0): remounting filesystem as read-only 22:38:26 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x40, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'bond0\x00'}]}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}]}], {0x14, 0x10}}, 0xe8}}, 0x0) [ 539.674342][T21203] xtLookup: xtSearch returned -5 [ 539.706274][T21203] read_mapping_page failed! [ 539.735074][T21203] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 539.763504][T21203] Mount JFS Failure: -5 [ 539.776401][T21203] jfs_mount failed w/return code = -5 22:38:26 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x7a00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000280)="10c4645f01000000010000000100004e36049b", 0x13, 0xb206}], 0x0, &(0x7f0000000080)={[{@nointegrity}]}) 22:38:26 executing program 3: sendmsg$NLBL_MGMT_C_ADD(0xffffffffffffffff, 0x0, 0x79889fea8e2f795f) 22:38:26 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'batadv_slave_1\x00'}]}]}]}], {0x14, 0x10}}, 0xa8}}, 0x0) 22:38:26 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0x8793, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:38:26 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0xffffff7f, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:38:26 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x40, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'bond0\x00'}]}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}]}], {0x14, 0x10}}, 0xe8}}, 0x0) 22:38:26 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0xffffff9e, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:38:26 executing program 3: modify_ldt$write2(0x11, &(0x7f0000000080), 0x10) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) mlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) [ 540.002925][T21242] loop0: detected capacity change from 0 to 178 [ 540.078648][T21242] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 540.078648][T21242] 22:38:26 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'batadv_slave_1\x00'}]}]}]}], {0x14, 0x10}}, 0xa8}}, 0x0) 22:38:26 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x40, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'bond0\x00'}]}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}]}], {0x14, 0x10}}, 0xe8}}, 0x0) [ 540.153819][T21242] ERROR: (device loop0): remounting filesystem as read-only [ 540.192755][T21242] xtLookup: xtSearch returned -5 [ 540.216593][T21242] read_mapping_page failed! [ 540.272949][T21242] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 540.357391][T21242] Mount JFS Failure: -5 22:38:27 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0xfffffff0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 540.412221][T21242] jfs_mount failed w/return code = -5 22:38:27 executing program 3: mlock(&(0x7f0000ff4000/0x9000)=nil, 0x9000) mlock2(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x1) mlockall(0x4) 22:38:27 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x9b00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000280)="10c4645f01000000010000000100004e36049b", 0x13, 0xb206}], 0x0, &(0x7f0000000080)={[{@nointegrity}]}) 22:38:27 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_DELFLOWTABLE={0x34, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}]}], {0x14, 0x10}}, 0x7c}}, 0x0) 22:38:27 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, 0x0, 0x0) 22:38:27 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0x8964, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:38:27 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0xffffffff, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:38:27 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_DELFLOWTABLE={0x34, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}]}], {0x14, 0x10}}, 0x7c}}, 0x0) 22:38:27 executing program 3: syz_mount_image$squashfs(&(0x7f0000001480), &(0x7f00000014c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000015c0)) [ 540.870261][T21275] loop0: detected capacity change from 0 to 178 22:38:27 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, 0x0, 0x0) [ 540.953972][T21275] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 540.953972][T21275] 22:38:27 executing program 3: r0 = socket(0x11, 0x3, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) [ 541.002494][T21275] ERROR: (device loop0): remounting filesystem as read-only 22:38:27 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:38:27 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_DELFLOWTABLE={0x34, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}]}], {0x14, 0x10}}, 0x7c}}, 0x0) [ 541.043564][T21275] xtLookup: xtSearch returned -5 [ 541.091816][T21275] read_mapping_page failed! [ 541.128519][T21275] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 541.166819][T21275] Mount JFS Failure: -5 22:38:27 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, 0x0, 0x0) [ 541.197367][T21275] jfs_mount failed w/return code = -5 [ 541.292204][T21275] loop0: detected capacity change from 0 to 178 [ 541.323752][T21275] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 541.323752][T21275] [ 541.355324][T21275] ERROR: (device loop0): remounting filesystem as read-only [ 541.374180][T21275] xtLookup: xtSearch returned -5 [ 541.379756][T21275] read_mapping_page failed! [ 541.425181][T21275] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 541.449723][T21275] Mount JFS Failure: -5 [ 541.461870][T21275] jfs_mount failed w/return code = -5 22:38:28 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xedc0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000280)="10c4645f01000000010000000100004e36049b", 0x13, 0xb206}], 0x0, &(0x7f0000000080)={[{@nointegrity}]}) 22:38:28 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0x8b4f, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:38:28 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000140), 0x14) 22:38:28 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_DELFLOWTABLE={0x48, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}]}]}], {0x14, 0x10}}, 0x90}}, 0x0) 22:38:28 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x2, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:38:28 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) 22:38:28 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_DELFLOWTABLE={0x48, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}]}]}], {0x14, 0x10}}, 0x90}}, 0x0) 22:38:28 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$cgroup_devices(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)={[{@mode={'mode', 0x3d, 0x8a0}}], [{@euid_eq={'euid', 0x3d, 0xee01}}]}) syz_genetlink_get_family_id$nbd(0x0, 0xffffffffffffffff) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x91) 22:38:28 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) 22:38:28 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x3, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 541.842661][T21321] loop0: detected capacity change from 0 to 178 22:38:28 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0x8d20, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 541.890394][T21327] tmpfs: Unknown parameter 'euid' [ 541.907787][T21321] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 541.907787][T21321] [ 541.935713][T21327] tmpfs: Unknown parameter 'euid' 22:38:28 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_DELFLOWTABLE={0x48, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}]}]}], {0x14, 0x10}}, 0x90}}, 0x0) [ 541.971647][T21321] ERROR: (device loop0): remounting filesystem as read-only [ 542.023999][T21321] xtLookup: xtSearch returned -5 [ 542.048670][T21321] read_mapping_page failed! [ 542.095960][T21321] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 542.112229][T21321] Mount JFS Failure: -5 [ 542.123380][T21321] jfs_mount failed w/return code = -5 [ 542.200302][T21321] loop0: detected capacity change from 0 to 178 [ 542.222380][T21321] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 542.222380][T21321] [ 542.269256][T21321] ERROR: (device loop0): remounting filesystem as read-only [ 542.308454][T21321] xtLookup: xtSearch returned -5 [ 542.333360][T21321] read_mapping_page failed! [ 542.367501][T21321] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 542.395578][T21321] Mount JFS Failure: -5 [ 542.414146][T21321] jfs_mount failed w/return code = -5 22:38:29 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfe0f, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000280)="10c4645f01000000010000000100004e36049b", 0x13, 0xb206}], 0x0, &(0x7f0000000080)={[{@nointegrity}]}) 22:38:29 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) 22:38:29 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) recvmsg(r0, &(0x7f0000003140)={0x0, 0x0, &(0x7f0000003040)=[{0xfffffffffffffffe}], 0x1}, 0x0) 22:38:29 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x4, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:38:29 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_DELFLOWTABLE={0x4c, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_HOOK={0x18, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x4}]}]}], {0x14, 0x10}}, 0x94}}, 0x0) 22:38:29 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0x8f0b, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:38:29 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x7afdc7f69a635cb4, 0x0) 22:38:29 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) 22:38:29 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x5, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 542.823127][T21360] loop0: detected capacity change from 0 to 178 22:38:29 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x8, &(0x7f00000013c0)) [ 542.833435][T21360] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 542.833435][T21360] 22:38:29 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_DELFLOWTABLE={0x4c, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_HOOK={0x18, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x4}]}]}], {0x14, 0x10}}, 0x94}}, 0x0) [ 542.833476][T21360] ERROR: (device loop0): remounting filesystem as read-only [ 542.833488][T21360] xtLookup: xtSearch returned -5 [ 542.833501][T21360] read_mapping_page failed! 22:38:29 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) [ 542.833531][T21360] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 542.833646][T21360] Mount JFS Failure: -5 [ 542.833658][T21360] jfs_mount failed w/return code = -5 [ 543.289983][T21360] loop0: detected capacity change from 0 to 178 [ 543.340113][T21360] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 543.340113][T21360] [ 543.449410][T21360] ERROR: (device loop0): remounting filesystem as read-only [ 543.498166][T21360] xtLookup: xtSearch returned -5 [ 543.532191][T21360] read_mapping_page failed! [ 543.560722][T21360] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 543.567436][T21360] Mount JFS Failure: -5 [ 543.573678][T21360] jfs_mount failed w/return code = -5 22:38:30 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfeff, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000280)="10c4645f01000000010000000100004e36049b", 0x13, 0xb206}], 0x0, &(0x7f0000000080)={[{@nointegrity}]}) 22:38:30 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x6, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:38:30 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, 0x0) 22:38:30 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_DELFLOWTABLE={0x4c, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_HOOK={0x18, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x4}]}]}], {0x14, 0x10}}, 0x94}}, 0x0) 22:38:30 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) 22:38:30 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0x90dc, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:38:30 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x40, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}], {0x14, 0x10}}, 0x88}}, 0x0) 22:38:30 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_DELFLOWTABLE={0x58, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_HOOK={0x24, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'batadv_slave_1\x00'}]}]}]}], {0x14, 0x10}}, 0xa0}}, 0x0) [ 543.831038][T21398] loop0: detected capacity change from 0 to 178 22:38:30 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001640), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$sock_SIOCSPGRP(r1, 0x8902, 0x0) 22:38:30 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x7, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 543.900817][T21398] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 543.900817][T21398] [ 543.972546][T21398] ERROR: (device loop0): remounting filesystem as read-only [ 544.018624][T21398] xtLookup: xtSearch returned -5 [ 544.057413][T21398] read_mapping_page failed! [ 544.094733][T21398] jfs_mount: diMount(ipaimap) failed w/rc = -5 22:38:30 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x40, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}], {0x14, 0x10}}, 0x88}}, 0x0) [ 544.143525][T21398] Mount JFS Failure: -5 [ 544.206983][T21398] jfs_mount failed w/return code = -5 [ 544.302708][T21398] loop0: detected capacity change from 0 to 178 22:38:31 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_DELFLOWTABLE={0x58, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_HOOK={0x24, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'batadv_slave_1\x00'}]}]}]}], {0x14, 0x10}}, 0xa0}}, 0x0) [ 544.370882][T21398] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 544.370882][T21398] [ 544.479778][T21398] ERROR: (device loop0): remounting filesystem as read-only [ 544.487753][T21398] xtLookup: xtSearch returned -5 [ 544.497782][T21398] read_mapping_page failed! [ 544.506208][T21398] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 544.512574][T21398] Mount JFS Failure: -5 [ 544.524778][T21398] jfs_mount failed w/return code = -5 22:38:31 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xff00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000280)="10c4645f01000000010000000100004e36049b", 0x13, 0xb206}], 0x0, &(0x7f0000000080)={[{@nointegrity}]}) 22:38:31 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x8, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:38:31 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) mlock(&(0x7f0000ffa000/0x4000)=nil, 0x4000) mlock2(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1) mlock2(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1) 22:38:31 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0x92c7, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:38:31 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x40, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}], {0x14, 0x10}}, 0x88}}, 0x0) 22:38:31 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_DELFLOWTABLE={0x58, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_HOOK={0x24, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'batadv_slave_1\x00'}]}]}]}], {0x14, 0x10}}, 0xa0}}, 0x0) 22:38:31 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x9, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:38:31 executing program 3: fchownat(0xffffffffffffffff, 0x0, 0xee00, 0x0, 0x1000) 22:38:31 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x40, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x0, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'bond0\x00'}]}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}]}], {0x14, 0x10}}, 0xe8}}, 0x0) [ 544.921024][T21441] loop0: detected capacity change from 0 to 178 22:38:31 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_DELFLOWTABLE={0x58, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_HOOK={0x24, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'batadv_slave_1\x00'}]}]}]}], {0x14, 0x10}}, 0xa0}}, 0x0) [ 545.034426][T21441] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 545.034426][T21441] [ 545.128283][T21441] ERROR: (device loop0): remounting filesystem as read-only [ 545.192923][T21441] xtLookup: xtSearch returned -5 22:38:31 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0xa, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 545.246448][T21441] read_mapping_page failed! 22:38:31 executing program 3: syz_open_dev$usbmon(&(0x7f0000000000), 0x2fcc, 0x125242) [ 545.288994][T21441] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 545.352969][T21441] Mount JFS Failure: -5 [ 545.373924][T21441] jfs_mount failed w/return code = -5 [ 545.436172][T21441] loop0: detected capacity change from 0 to 178 [ 545.491573][T21441] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 545.491573][T21441] [ 545.525944][T21441] ERROR: (device loop0): remounting filesystem as read-only [ 545.566131][T21441] xtLookup: xtSearch returned -5 [ 545.597942][T21441] read_mapping_page failed! [ 545.610339][T21441] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 545.623393][T21441] Mount JFS Failure: -5 [ 545.633559][T21441] jfs_mount failed w/return code = -5 22:38:32 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xff0f, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000280)="10c4645f01000000010000000100004e36049b", 0x13, 0xb206}], 0x0, &(0x7f0000000080)={[{@nointegrity}]}) 22:38:32 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x40, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x0, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'bond0\x00'}]}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}]}], {0x14, 0x10}}, 0xe8}}, 0x0) 22:38:32 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_DELFLOWTABLE={0x58, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_HOOK={0x24, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'batadv_slave_1\x00'}]}]}]}], {0x14, 0x10}}, 0xa0}}, 0x0) 22:38:32 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0x9498, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:38:32 executing program 3: mlockall(0xa) 22:38:32 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0xb, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:38:32 executing program 3: shmat(0x0, &(0x7f0000ff3000/0x1000)=nil, 0x0) 22:38:32 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_DELFLOWTABLE={0x58, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_HOOK={0x24, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'batadv_slave_1\x00'}]}]}]}], {0x14, 0x10}}, 0xa0}}, 0x0) 22:38:32 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0xf, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 545.909970][T21481] loop0: detected capacity change from 0 to 178 [ 546.027168][T21481] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 546.027168][T21481] 22:38:32 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x40, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x0, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'bond0\x00'}]}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}]}], {0x14, 0x10}}, 0xe8}}, 0x0) [ 546.121144][T21481] ERROR: (device loop0): remounting filesystem as read-only [ 546.191785][T21481] xtLookup: xtSearch returned -5 [ 546.241007][T21481] read_mapping_page failed! 22:38:33 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000500)={0x18}, 0x14}}, 0x0) [ 546.293238][T21481] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 546.349079][T21481] Mount JFS Failure: -5 [ 546.382274][T21481] jfs_mount failed w/return code = -5 22:38:33 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_DELFLOWTABLE={0x58, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'batadv_slave_1\x00'}]}]}]}], {0x14, 0x10}}, 0xa0}}, 0x0) [ 546.482642][T21481] loop0: detected capacity change from 0 to 178 [ 546.519369][T21481] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 546.519369][T21481] [ 546.588351][T21481] ERROR: (device loop0): remounting filesystem as read-only [ 546.618395][T21481] xtLookup: xtSearch returned -5 [ 546.630595][T21481] read_mapping_page failed! [ 546.635281][T21481] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 546.650314][T21481] Mount JFS Failure: -5 [ 546.660720][T21481] jfs_mount failed w/return code = -5 22:38:33 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0x9683, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:38:33 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x10, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:38:33 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x40, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'bond0\x00'}]}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}]}], {0x14, 0x10}}, 0xe8}}, 0x0) 22:38:33 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_DELFLOWTABLE={0x58, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'batadv_slave_1\x00'}]}]}]}], {0x14, 0x10}}, 0xa0}}, 0x0) 22:38:33 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffe, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000280)="10c4645f01000000010000000100004e36049b", 0x13, 0xb206}], 0x0, &(0x7f0000000080)={[{@nointegrity}]}) 22:38:33 executing program 3: syz_mount_image$squashfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000480)='>', 0x1}], 0x0, 0x0) 22:38:33 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x11, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 546.941462][T21521] loop0: detected capacity change from 0 to 178 22:38:33 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x40, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'bond0\x00'}]}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}]}], {0x14, 0x10}}, 0xe8}}, 0x0) 22:38:33 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_DELFLOWTABLE={0x58, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'batadv_slave_1\x00'}]}]}]}], {0x14, 0x10}}, 0xa0}}, 0x0) [ 547.004669][T21521] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 547.004669][T21521] 22:38:33 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f0000000080)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x33}}, 0x80) [ 547.113341][T21521] ERROR: (device loop0): remounting filesystem as read-only [ 547.196062][T21521] xtLookup: xtSearch returned -5 [ 547.231835][T21521] read_mapping_page failed! 22:38:33 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0xf0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 547.271150][T21521] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 547.328589][T21521] Mount JFS Failure: -5 [ 547.369733][T21521] jfs_mount failed w/return code = -5 22:38:34 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x40, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'bond0\x00'}]}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}]}], {0x14, 0x10}}, 0xe8}}, 0x0) [ 547.466861][T21521] loop0: detected capacity change from 0 to 178 [ 547.520400][T21521] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 547.520400][T21521] [ 547.582535][T21521] ERROR: (device loop0): remounting filesystem as read-only [ 547.664630][T21521] xtLookup: xtSearch returned -5 [ 547.683962][T21521] read_mapping_page failed! 22:38:34 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0x9854, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:38:34 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'batadv_slave_1\x00'}]}]}]}], {0x14, 0x10}}, 0xa8}}, 0x0) 22:38:34 executing program 3: syz_mount_image$squashfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xc808, &(0x7f0000000380)=ANY=[]) 22:38:34 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x300, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 547.709509][T21521] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 547.736593][T21521] Mount JFS Failure: -5 [ 547.741287][T21521] jfs_mount failed w/return code = -5 22:38:34 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000280)="10c4645f01000000010000000100004e36049b", 0x13, 0xb206}], 0x0, &(0x7f0000000080)={[{@nointegrity}]}) 22:38:34 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x40, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}, @NFT_MSG_DELFLOWTABLE={0x58, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'bond0\x00'}]}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}]}], {0x14, 0x10}}, 0xe0}}, 0x0) 22:38:34 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'batadv_slave_1\x00'}]}]}]}], {0x14, 0x10}}, 0xa8}}, 0x0) 22:38:34 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x4ae, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:38:34 executing program 3: clock_gettime(0x5, &(0x7f0000000480)) 22:38:34 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x40, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}, @NFT_MSG_DELFLOWTABLE={0x58, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'bond0\x00'}]}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}]}], {0x14, 0x10}}, 0xe0}}, 0x0) [ 548.104547][T21569] loop0: detected capacity change from 0 to 2048 [ 548.222805][T21569] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 548.222805][T21569] [ 548.320634][T21569] ERROR: (device loop0): remounting filesystem as read-only [ 548.394842][T21569] xtLookup: xtSearch returned -5 22:38:35 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x500, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 548.441782][T21569] read_mapping_page failed! 22:38:35 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'batadv_slave_1\x00'}]}]}]}], {0x14, 0x10}}, 0xa8}}, 0x0) [ 548.506276][T21569] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 548.579629][T21569] Mount JFS Failure: -5 [ 548.613870][T21569] jfs_mount failed w/return code = -5 22:38:35 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0x9a3f, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:38:35 executing program 3: syz_mount_image$squashfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001580)=[{0x0}], 0x0, 0x0) 22:38:35 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x40, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}, @NFT_MSG_DELFLOWTABLE={0x58, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'bond0\x00'}]}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}]}], {0x14, 0x10}}, 0xe0}}, 0x0) 22:38:35 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x600, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 548.731248][T21569] loop0: detected capacity change from 0 to 2048 [ 548.763388][T21569] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 548.763388][T21569] [ 548.811771][T21569] ERROR: (device loop0): remounting filesystem as read-only [ 548.861942][T21569] xtLookup: xtSearch returned -5 [ 548.921260][T21569] read_mapping_page failed! [ 548.957716][T21569] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 549.011676][T21569] Mount JFS Failure: -5 [ 549.034618][T21569] jfs_mount failed w/return code = -5 22:38:35 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000280)="10c4645f01000000010000000100004e36049b", 0x13, 0xb206}], 0x0, &(0x7f0000000080)={[{@nointegrity}]}) 22:38:35 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_DELFLOWTABLE={0x54, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'batadv_slave_1\x00'}]}]}]}], {0x14, 0x10}}, 0x9c}}, 0x0) 22:38:35 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x40, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'bond0\x00'}]}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8}]}], {0x14, 0x10}}, 0xe8}}, 0x0) 22:38:35 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x700, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:38:35 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000003740), 0x2, 0x0) read$FUSE(r0, 0x0, 0x0) 22:38:36 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x900, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:38:36 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_DELFLOWTABLE={0x54, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'batadv_slave_1\x00'}]}]}]}], {0x14, 0x10}}, 0x9c}}, 0x0) 22:38:36 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x40, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'bond0\x00'}]}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8}]}], {0x14, 0x10}}, 0xe8}}, 0x0) [ 549.540893][T21619] loop0: detected capacity change from 0 to 4096 [ 549.627508][T21619] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 549.627508][T21619] 22:38:36 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0x9c10, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:38:36 executing program 3: socketpair(0x0, 0x81c113a8c3c532b1, 0x0, 0x0) [ 549.669695][T21619] ERROR: (device loop0): remounting filesystem as read-only [ 549.692485][T21619] xtLookup: xtSearch returned -5 22:38:36 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0xa00, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:38:36 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_DELFLOWTABLE={0x54, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'batadv_slave_1\x00'}]}]}]}], {0x14, 0x10}}, 0x9c}}, 0x0) [ 549.716444][T21619] read_mapping_page failed! [ 549.734164][T21619] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 549.781567][T21619] Mount JFS Failure: -5 [ 549.804939][T21619] jfs_mount failed w/return code = -5 [ 549.890813][T21619] loop0: detected capacity change from 0 to 4096 [ 549.937677][T21619] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 549.937677][T21619] [ 549.977656][T21619] ERROR: (device loop0): remounting filesystem as read-only [ 550.020899][T21619] xtLookup: xtSearch returned -5 [ 550.048456][T21619] read_mapping_page failed! [ 550.074465][T21619] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 550.117661][T21619] Mount JFS Failure: -5 [ 550.136885][T21619] jfs_mount failed w/return code = -5 22:38:36 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x400000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000280)="10c4645f01000000010000000100004e36049b", 0x13, 0xb206}], 0x0, &(0x7f0000000080)={[{@nointegrity}]}) 22:38:36 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x40, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'bond0\x00'}]}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8}]}], {0x14, 0x10}}, 0xe8}}, 0x0) 22:38:36 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001640), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000080)=[@text32={0x20, 0x0}], 0x1, 0x0, 0x0, 0x0) 22:38:36 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0xb00, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:38:36 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_DELFLOWTABLE={0x54, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'batadv_slave_1\x00'}]}]}]}], {0x14, 0x10}}, 0x9c}}, 0x0) 22:38:37 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0x9dfb, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:38:37 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_DELFLOWTABLE={0x54, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'batadv_slave_1\x00'}]}]}]}], {0x14, 0x10}}, 0x9c}}, 0x0) 22:38:37 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x40, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}, @NFT_MSG_DELFLOWTABLE={0x54, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'bond0\x00'}]}]}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}]}], {0x14, 0x10}}, 0xdc}}, 0x0) [ 550.548166][T21661] loop0: detected capacity change from 0 to 8192 22:38:37 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0xf00, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 550.641685][T21661] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 550.641685][T21661] [ 550.719768][T21661] ERROR: (device loop0): remounting filesystem as read-only [ 550.772106][T21661] xtLookup: xtSearch returned -5 22:38:37 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_DELFLOWTABLE={0x54, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'batadv_slave_1\x00'}]}]}]}], {0x14, 0x10}}, 0x9c}}, 0x0) [ 550.806437][T21661] read_mapping_page failed! [ 550.844594][T21661] jfs_mount: diMount(ipaimap) failed w/rc = -5 22:38:37 executing program 3: syz_open_dev$usbmon(&(0x7f0000000000), 0xfffffffffffffff5, 0x0) [ 550.886549][T21661] Mount JFS Failure: -5 [ 550.931288][T21661] jfs_mount failed w/return code = -5 [ 551.028744][T21661] loop0: detected capacity change from 0 to 8192 22:38:37 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x40, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}, @NFT_MSG_DELFLOWTABLE={0x54, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'bond0\x00'}]}]}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}]}], {0x14, 0x10}}, 0xdc}}, 0x0) [ 551.072504][T21661] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 551.072504][T21661] [ 551.174053][T21661] ERROR: (device loop0): remounting filesystem as read-only [ 551.221354][T21661] xtLookup: xtSearch returned -5 [ 551.254360][T21661] read_mapping_page failed! [ 551.293673][T21661] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 551.316225][T21661] Mount JFS Failure: -5 [ 551.321465][T21661] jfs_mount failed w/return code = -5 22:38:38 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x80ffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000280)="10c4645f01000000010000000100004e36049b", 0x13, 0xb206}], 0x0, &(0x7f0000000080)={[{@nointegrity}]}) 22:38:38 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x1100, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:38:38 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'batadv_slave_1\x00'}]}]}]}], {0x14, 0x10}}, 0x88}}, 0x0) 22:38:38 executing program 3: prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000140)) 22:38:38 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0x9fcc, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:38:38 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x40, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}, @NFT_MSG_DELFLOWTABLE={0x54, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'bond0\x00'}]}]}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}]}], {0x14, 0x10}}, 0xdc}}, 0x0) 22:38:38 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'batadv_slave_1\x00'}]}]}]}], {0x14, 0x10}}, 0x88}}, 0x0) 22:38:38 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x3f00, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 551.621370][T21701] loop0: detected capacity change from 0 to 16511 [ 551.687126][T21701] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 551.687126][T21701] 22:38:38 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) [ 551.729068][T21701] ERROR: (device loop0): remounting filesystem as read-only [ 551.765092][T21701] xtLookup: xtSearch returned -5 [ 551.798928][T21701] read_mapping_page failed! [ 551.837020][T21701] jfs_mount: diMount(ipaimap) failed w/rc = -5 22:38:38 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'batadv_slave_1\x00'}]}]}]}], {0x14, 0x10}}, 0x88}}, 0x0) [ 551.883545][T21701] Mount JFS Failure: -5 22:38:38 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x40, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}, @NFT_MSG_DELFLOWTABLE={0x34, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}]}], {0x14, 0x10}}, 0xbc}}, 0x0) [ 551.921375][T21701] jfs_mount failed w/return code = -5 [ 552.014741][T21701] loop0: detected capacity change from 0 to 16511 [ 552.055041][T21701] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 552.055041][T21701] 22:38:38 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0xae04, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 552.158221][T21701] ERROR: (device loop0): remounting filesystem as read-only [ 552.224745][T21701] xtLookup: xtSearch returned -5 [ 552.290807][T21701] read_mapping_page failed! [ 552.323117][T21701] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 552.377835][T21701] Mount JFS Failure: -5 [ 552.432121][T21701] jfs_mount failed w/return code = -5 22:38:39 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xe0ffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000280)="10c4645f01000000010000000100004e36049b", 0x13, 0xb206}], 0x0, &(0x7f0000000080)={[{@nointegrity}]}) 22:38:39 executing program 3: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000140)) mlock(&(0x7f0000ffa000/0x4000)=nil, 0x4000) mlock2(&(0x7f00003fd000/0xc00000)=nil, 0xc00000, 0x1) 22:38:39 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x0, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'batadv_slave_1\x00'}]}]}]}], {0x14, 0x10}}, 0xa8}}, 0x0) 22:38:39 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0xa1b7, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:38:39 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x40, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}, @NFT_MSG_DELFLOWTABLE={0x34, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}]}], {0x14, 0x10}}, 0xbc}}, 0x0) 22:38:39 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0xf000, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:38:39 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x40, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}, @NFT_MSG_DELFLOWTABLE={0x34, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}]}], {0x14, 0x10}}, 0xbc}}, 0x0) 22:38:39 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x0, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'batadv_slave_1\x00'}]}]}]}], {0x14, 0x10}}, 0xa8}}, 0x0) 22:38:39 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x10001}, 0x14) [ 552.875372][T21743] loop0: detected capacity change from 0 to 28799 22:38:39 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x30000, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 552.979703][T21743] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 552.979703][T21743] [ 553.078122][T21743] ERROR: (device loop0): remounting filesystem as read-only [ 553.161179][T21743] xtLookup: xtSearch returned -5 [ 553.199346][T21743] read_mapping_page failed! 22:38:39 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x40, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}, @NFT_MSG_DELFLOWTABLE={0x48, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}]}], {0x14, 0x10}}, 0xd0}}, 0x0) [ 553.232025][T21743] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 553.261913][T21743] Mount JFS Failure: -5 [ 553.273675][T21743] jfs_mount failed w/return code = -5 22:38:39 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x0, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'batadv_slave_1\x00'}]}]}]}], {0x14, 0x10}}, 0xa8}}, 0x0) [ 553.387551][T21743] loop0: detected capacity change from 0 to 28799 [ 553.430113][T21743] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 553.430113][T21743] [ 553.480098][T21743] ERROR: (device loop0): remounting filesystem as read-only [ 553.515023][T21743] xtLookup: xtSearch returned -5 [ 553.535013][T21743] read_mapping_page failed! [ 553.544955][T21743] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 553.562201][T21743] Mount JFS Failure: -5 [ 553.577856][T21743] jfs_mount failed w/return code = -5 22:38:40 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000280)="10c4645f01000000010000000100004e36049b", 0x13, 0xb206}], 0x0, &(0x7f0000000080)={[{@nointegrity}]}) 22:38:40 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0xa388, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:38:40 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1004404, &(0x7f00000014c0)={[{@nr_blocks={'nr_blocks', 0x3d, [0x6d]}}]}) 22:38:40 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x34000, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:38:40 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x40, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}, @NFT_MSG_DELFLOWTABLE={0x48, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}]}], {0x14, 0x10}}, 0xd0}}, 0x0) 22:38:40 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'batadv_slave_1\x00'}]}]}]}], {0x14, 0x10}}, 0xa8}}, 0x0) 22:38:40 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x40, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}, @NFT_MSG_DELFLOWTABLE={0x48, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}]}], {0x14, 0x10}}, 0xd0}}, 0x0) [ 553.951455][T21784] loop0: detected capacity change from 0 to 32768 22:38:40 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x400300, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:38:40 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x15, 0x0, &(0x7f0000000180)) 22:38:40 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'batadv_slave_1\x00'}]}]}]}], {0x14, 0x10}}, 0xa8}}, 0x0) [ 554.126410][T21784] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 554.126410][T21784] 22:38:40 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0xa573, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 554.166950][T21784] ERROR: (device loop0): remounting filesystem as read-only [ 554.203361][T21784] xtLookup: xtSearch returned -5 [ 554.228002][T21784] read_mapping_page failed! 22:38:40 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890c, 0xffffffffffffffff) [ 554.250691][T21784] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 554.286653][T21784] Mount JFS Failure: -5 [ 554.344016][T21784] jfs_mount failed w/return code = -5 [ 554.452645][T21784] loop0: detected capacity change from 0 to 32768 [ 554.492397][T21784] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 554.492397][T21784] [ 554.539071][T21784] ERROR: (device loop0): remounting filesystem as read-only [ 554.587017][T21784] xtLookup: xtSearch returned -5 [ 554.591999][T21784] read_mapping_page failed! [ 554.625581][T21784] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 554.631874][T21784] Mount JFS Failure: -5 [ 554.665726][T21784] jfs_mount failed w/return code = -5 22:38:41 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000280)="10c4645f01000000010000000100004e36049b", 0x13, 0xb206}], 0x0, &(0x7f0000000080)={[{@nointegrity}]}) 22:38:41 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0xf0ffff, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:38:41 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x40, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}, @NFT_MSG_DELFLOWTABLE={0x4c, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x18, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x4}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}]}], {0x14, 0x10}}, 0xd4}}, 0x0) 22:38:41 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'batadv_slave_1\x00'}]}]}]}], {0x14, 0x10}}, 0xa8}}, 0x0) 22:38:41 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f0000000080)=@un=@abs, 0x80) 22:38:41 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0xa744, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:38:41 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x14, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'batadv_slave_1\x00'}]}]}]}], {0x14, 0x10}}, 0x9c}}, 0x0) 22:38:41 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x40, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}, @NFT_MSG_DELFLOWTABLE={0x4c, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x18, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x4}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}]}], {0x14, 0x10}}, 0xd4}}, 0x0) 22:38:41 executing program 3: read$alg(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$squashfs(&(0x7f0000001480), &(0x7f00000014c0)='./file0\x00', 0x0, 0x1, &(0x7f0000001580)=[{0x0}], 0x0, &(0x7f00000015c0)={[], [{@uid_gt={'uid>', 0xee01}}]}) 22:38:41 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x1000000, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 555.134966][T21821] loop0: detected capacity change from 0 to 34816 [ 555.154368][T21821] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 555.154368][T21821] [ 555.201800][T21821] ERROR: (device loop0): remounting filesystem as read-only [ 555.235905][T21821] xtLookup: xtSearch returned -5 [ 555.262406][T21821] read_mapping_page failed! [ 555.296088][T21821] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 555.319564][T21830] squashfs: Unknown parameter 'uid>00000000000000060929' [ 555.360693][T21821] Mount JFS Failure: -5 22:38:42 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x14, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'batadv_slave_1\x00'}]}]}]}], {0x14, 0x10}}, 0x9c}}, 0x0) [ 555.405214][T21821] jfs_mount failed w/return code = -5 22:38:42 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x2000000, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 555.508896][T21821] loop0: detected capacity change from 0 to 34816 [ 555.577618][T21821] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 555.577618][T21821] [ 555.613846][T21821] ERROR: (device loop0): remounting filesystem as read-only [ 555.651419][T21821] xtLookup: xtSearch returned -5 [ 555.680525][T21821] read_mapping_page failed! [ 555.706021][T21821] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 555.753019][T21821] Mount JFS Failure: -5 [ 555.783140][T21821] jfs_mount failed w/return code = -5 22:38:42 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000280)="10c4645f01000000010000000100004e36049b", 0x13, 0xb206}], 0x0, &(0x7f0000000080)={[{@nointegrity}]}) 22:38:42 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x40, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}, @NFT_MSG_DELFLOWTABLE={0x4c, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x18, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x4}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}]}], {0x14, 0x10}}, 0xd4}}, 0x0) 22:38:42 executing program 3: syz_open_dev$usbmon(&(0x7f0000000000), 0x2fcc, 0x121042) 22:38:42 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x14, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'batadv_slave_1\x00'}]}]}]}], {0x14, 0x10}}, 0x9c}}, 0x0) 22:38:42 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x3000000, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:38:42 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0x34000, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:38:42 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x40, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}, @NFT_MSG_DELFLOWTABLE={0x58, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x24, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'bond0\x00'}]}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}]}], {0x14, 0x10}}, 0xe0}}, 0x0) 22:38:42 executing program 3: mlock(&(0x7f0000ff4000/0x9000)=nil, 0x9000) mlockall(0x4) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)) 22:38:42 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x4000000, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:38:42 executing program 5: openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x160543, 0x0) [ 556.330144][T21861] loop0: detected capacity change from 0 to 65536 [ 556.370961][T21861] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 556.370961][T21861] [ 556.403296][T21861] ERROR: (device loop0): remounting filesystem as read-only [ 556.437526][T21861] xtLookup: xtSearch returned -5 [ 556.465265][T21861] read_mapping_page failed! [ 556.493182][T21861] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 556.527922][T21861] Mount JFS Failure: -5 [ 556.548735][T21861] jfs_mount failed w/return code = -5 22:38:43 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x40, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}, @NFT_MSG_DELFLOWTABLE={0x58, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x24, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'bond0\x00'}]}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}]}], {0x14, 0x10}}, 0xe0}}, 0x0) 22:38:43 executing program 3: mlock(&(0x7f0000ffd000/0x1000)=nil, 0x1000) mlock(&(0x7f0000ff0000/0x1000)=nil, 0x1000) mlockall(0x3) [ 556.641357][T21861] loop0: detected capacity change from 0 to 65536 [ 556.698473][T21861] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 556.698473][T21861] [ 556.764532][T21861] ERROR: (device loop0): remounting filesystem as read-only [ 556.808219][T21861] xtLookup: xtSearch returned -5 [ 556.829897][T21861] read_mapping_page failed! [ 556.849057][T21861] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 556.884994][T21861] Mount JFS Failure: -5 [ 556.915996][T21861] jfs_mount failed w/return code = -5 22:38:43 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000280)="10c4645f01000000010000000100004e36049b", 0x13, 0xb206}], 0x0, &(0x7f0000000080)={[{@nointegrity}]}) 22:38:43 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x5000000, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:38:43 executing program 5: syz_mount_image$squashfs(0x0, 0x0, 0x0, 0x1, &(0x7f00000012c0)=[{&(0x7f00000000c0)="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", 0x1000}], 0x0, 0x0) 22:38:43 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x40, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}, @NFT_MSG_DELFLOWTABLE={0x58, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x24, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'bond0\x00'}]}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}]}], {0x14, 0x10}}, 0xe0}}, 0x0) [ 557.401593][T21900] loop5: detected capacity change from 0 to 8 [ 557.409765][T21901] loop0: detected capacity change from 0 to 67584 22:38:44 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x40, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}, @NFT_MSG_DELFLOWTABLE={0x58, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x24, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'bond0\x00'}]}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}]}], {0x14, 0x10}}, 0xe0}}, 0x0) [ 557.485203][T21901] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 557.485203][T21901] [ 557.526976][T21901] ERROR: (device loop0): remounting filesystem as read-only [ 557.540127][T21900] loop5: detected capacity change from 0 to 8 [ 557.582534][T21901] xtLookup: xtSearch returned -5 22:38:44 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0x20852866, 0x3f00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:38:44 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x6000000, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:38:44 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f00000002c0), 0x0, &(0x7f0000000340)={0x8}, &(0x7f0000000380), 0x0) [ 557.604382][T21901] read_mapping_page failed! [ 557.619972][T21901] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 557.637357][T21901] Mount JFS Failure: -5 [ 557.673944][T21901] jfs_mount failed w/return code = -5 [ 557.741797][T21901] loop0: detected capacity change from 0 to 67584 [ 557.773225][T21901] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 557.773225][T21901] 22:38:44 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x40, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}, @NFT_MSG_DELFLOWTABLE={0x58, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x24, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'bond0\x00'}]}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}]}], {0x14, 0x10}}, 0xe0}}, 0x0) [ 557.837711][T21901] ERROR: (device loop0): remounting filesystem as read-only [ 557.901861][T21901] xtLookup: xtSearch returned -5 [ 557.929520][T21901] read_mapping_page failed! 22:38:44 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x7000000, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:38:44 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt(r0, 0x1, 0x2, &(0x7f0000000000)="89b81ce0", 0x4) [ 557.951654][T21901] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 557.983138][T21901] Mount JFS Failure: -5 [ 558.006051][T21901] jfs_mount failed w/return code = -5 22:38:45 executing program 3: openat$fuse(0xffffffffffffff9c, &(0x7f0000003740), 0x2, 0x0) 22:38:45 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0xa867, 0x100000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:38:45 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x40, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}, @NFT_MSG_DELFLOWTABLE={0x58, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x24, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'bond0\x00'}]}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}]}], {0x14, 0x10}}, 0xe0}}, 0x0) 22:38:45 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x8000000, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:38:45 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000280)="10c4645f01000000010000000100004e36049b", 0x13, 0xb206}], 0x0, &(0x7f0000000080)={[{@nointegrity}]}) 22:38:45 executing program 5: process_vm_writev(0x0, &(0x7f00000014c0)=[{&(0x7f0000000180)=""/185, 0xb9}, {&(0x7f0000000240)=""/126, 0x7e}, {&(0x7f00000002c0)=""/104, 0x68}, {&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/238, 0xee}, {&(0x7f00000004c0)=""/4096, 0x1000}], 0x6, &(0x7f00000015c0)=[{&(0x7f0000001540)=""/118, 0x76}], 0xc2, 0x0) [ 558.768457][T21952] loop0: detected capacity change from 0 to 98304 22:38:45 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x9000000, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:38:45 executing program 5: r0 = shmget(0x2, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) [ 558.835672][T21952] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 558.835672][T21952] [ 558.902995][T21952] ERROR: (device loop0): remounting filesystem as read-only 22:38:45 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x40, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}, @NFT_MSG_DELFLOWTABLE={0x54, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'bond0\x00'}]}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}]}], {0x14, 0x10}}, 0xdc}}, 0x0) [ 558.951813][T21952] xtLookup: xtSearch returned -5 22:38:45 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000540), 0x2000, &(0x7f00000005c0)) [ 558.995924][T21952] read_mapping_page failed! [ 559.034864][T21952] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 559.088031][T21952] Mount JFS Failure: -5 [ 559.119768][T21952] jfs_mount failed w/return code = -5 22:38:45 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt(r0, 0x6, 0x9, &(0x7f0000000000)="627f433a", 0x4) [ 559.234941][T21952] loop0: detected capacity change from 0 to 98304 22:38:45 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0xa000000, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 559.312909][T21952] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 559.312909][T21952] 22:38:46 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x40, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}, @NFT_MSG_DELFLOWTABLE={0x54, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'bond0\x00'}]}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}]}], {0x14, 0x10}}, 0xdc}}, 0x0) [ 559.395110][T21952] ERROR: (device loop0): remounting filesystem as read-only [ 559.441250][T21952] xtLookup: xtSearch returned -5 [ 559.471545][T21952] read_mapping_page failed! [ 559.503927][T21952] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 559.543229][T21952] Mount JFS Failure: -5 22:38:46 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0xa867, 0x200000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:38:46 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000180)='/sys/class/power_supply', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) 22:38:46 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, 0x0, 0xfffffebc) [ 559.575022][T21952] jfs_mount failed w/return code = -5 22:38:46 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000280)="10c4645f01000000010000000100004e36049b", 0x13, 0xb206}], 0x0, &(0x7f0000000080)={[{@nointegrity}]}) 22:38:46 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0xb000000, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:38:46 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x40, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}, @NFT_MSG_DELFLOWTABLE={0x54, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'bond0\x00'}]}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}]}], {0x14, 0x10}}, 0xdc}}, 0x0) 22:38:46 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, 0x0, 0xa) 22:38:46 executing program 3: mlock(&(0x7f0000ffb000/0x2000)=nil, 0x2000) 22:38:46 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'bond0\x00'}]}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}]}], {0x14, 0x10}}, 0xa8}}, 0x0) 22:38:46 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0xf000000, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 559.950391][T22006] loop0: detected capacity change from 0 to 131072 [ 560.046120][T22006] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 560.046120][T22006] 22:38:46 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000180)='/sys/class/power_supply', 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, 0x0, 0x0) 22:38:46 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x444c0, 0x0) [ 560.121430][T22006] ERROR: (device loop0): remounting filesystem as read-only [ 560.168077][T22006] xtLookup: xtSearch returned -5 [ 560.205691][T22006] read_mapping_page failed! [ 560.233389][T22006] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 560.280242][T22006] Mount JFS Failure: -5 [ 560.323389][T22006] jfs_mount failed w/return code = -5 [ 560.426372][T22006] loop0: detected capacity change from 0 to 131072 [ 560.456602][T22006] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 560.456602][T22006] 22:38:47 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0xa867, 0x300000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:38:47 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'bond0\x00'}]}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}]}], {0x14, 0x10}}, 0xa8}}, 0x0) 22:38:47 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x10000000, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 560.524162][T22006] ERROR: (device loop0): remounting filesystem as read-only [ 560.560521][T22006] xtLookup: xtSearch returned -5 [ 560.576428][T22006] read_mapping_page failed! [ 560.601567][T22006] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 560.624215][T22006] Mount JFS Failure: -5 [ 560.639996][T22006] jfs_mount failed w/return code = -5 22:38:47 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x5000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000280)="10c4645f01000000010000000100004e36049b", 0x13, 0xb206}], 0x0, &(0x7f0000000080)={[{@nointegrity}]}) 22:38:47 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f0000000300), 0x4) 22:38:47 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) recvmmsg(r0, &(0x7f000000ab80)=[{{&(0x7f0000000a40)=@alg, 0x80, &(0x7f00000010c0)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}}], 0x1, 0x40010002, &(0x7f000000ad40)) 22:38:47 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'bond0\x00'}]}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}]}], {0x14, 0x10}}, 0xa8}}, 0x0) 22:38:47 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x11000000, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:38:47 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x3f000000, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:38:47 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_EEE_SET(r0, &(0x7f0000003340)={0x0, 0x0, &(0x7f0000003300)={&(0x7f0000001d00)={0xec4, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_EEE_TX_LPI_TIMER={0x8}, @ETHTOOL_A_EEE_MODES_OURS={0x130, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x51, 0x5, "998fe64a880bab98c6d47bd898d53b5fa07b5abfe97c4709c617dd3dc9cab8d4964bb018a2d2f83e72b6aad0246394ac5a8e3a297b3993650e29f694da718531222b357e15a62ba522b98fa645"}, @ETHTOOL_A_BITSET_VALUE={0xbd, 0x4, "79910ba113e71882e35126d2ebb96b2f5eea75eff42e9ff436dc130b4e119fd051ed78b4546038dbb1c37fe0a6e9a32c69b622c5399e498607fed3e33870cfcf94c24ed7b383a74900e7057b13815fc5a0d3964d8545627f45b4bd063358b334072088bddc7e0a25a3765408a5895ea1d6d996590dfe314b0de5c1863527e52817835f718cf8450eeed57ad63d14c9b904da079c7cc6e32d3810576521b6514c9023d8f18853abeea819dc30b0f15293021df3ae0c7212e2e7"}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_SIZE={0x8}]}, @ETHTOOL_A_EEE_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @ETHTOOL_A_EEE_ENABLED={0x5}, @ETHTOOL_A_EEE_MODES_OURS={0xd50, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x15, 0x5, "5e9ca1b3e77108d82ce291c3cf1f9f463c"}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_BITS={0xc, 0x3, 0x0, 0x1, [{0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_BITS={0x11c, 0x3, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, './)-\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '^&\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '{&}::\\(\x1c+\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'nl80211\x00'}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'nl80211\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x11, 0x2, '@%^.%]/**^/\'\x00'}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'nl80211\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '(\xd2\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, 'gtp\x00'}]}]}, @ETHTOOL_A_BITSET_MASK={0xbf1, 0x5, "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"}]}]}, 0xec4}}, 0x0) 22:38:47 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x40, 0x16, 0xa, 0x0, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'bond0\x00'}]}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}]}], {0x14, 0x10}}, 0xe8}}, 0x0) [ 561.158940][T22045] loop0: detected capacity change from 0 to 163840 [ 561.238063][T22045] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 561.238063][T22045] [ 561.293545][T22045] ERROR: (device loop0): remounting filesystem as read-only 22:38:47 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0xa867, 0x400000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 561.340140][T22045] xtLookup: xtSearch returned -5 22:38:48 executing program 3: rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)) sched_getattr(0x0, &(0x7f0000003380)={0x38}, 0x38, 0x0) 22:38:48 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x40, 0x16, 0xa, 0x0, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'bond0\x00'}]}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}]}], {0x14, 0x10}}, 0xe8}}, 0x0) 22:38:48 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x9effffff, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 561.370892][T22045] read_mapping_page failed! [ 561.382400][T22045] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 561.397603][T22045] Mount JFS Failure: -5 [ 561.413064][T22045] jfs_mount failed w/return code = -5 [ 561.472566][T22045] loop0: detected capacity change from 0 to 163840 [ 561.532698][T22045] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 561.532698][T22045] [ 561.585438][T22045] ERROR: (device loop0): remounting filesystem as read-only [ 561.632276][T22045] xtLookup: xtSearch returned -5 [ 561.687449][T22045] read_mapping_page failed! [ 561.705759][T22045] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 561.731443][T22045] Mount JFS Failure: -5 [ 561.746224][T22045] jfs_mount failed w/return code = -5 22:38:48 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x6000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000280)="10c4645f01000000010000000100004e36049b", 0x13, 0xb206}], 0x0, &(0x7f0000000080)={[{@nointegrity}]}) 22:38:48 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_PROBE_MESH_LINK(r0, &(0x7f0000000740)={&(0x7f0000000640), 0xc, &(0x7f0000000700)={&(0x7f00000006c0)={0x14, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) 22:38:48 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0xae040000, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:38:48 executing program 5: fanotify_mark(0xffffffffffffffff, 0x1, 0x8000000, 0xffffffffffffffff, 0x0) 22:38:48 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x40, 0x16, 0xa, 0x0, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'bond0\x00'}]}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}]}], {0x14, 0x10}}, 0xe8}}, 0x0) 22:38:48 executing program 5: bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x38) 22:38:48 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x40, 0x16, 0xa, 0x1, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'bond0\x00'}]}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}]}], {0x14, 0x10}}, 0xe8}}, 0x0) 22:38:48 executing program 3: socket(0x3c, 0x0, 0x0) [ 562.133003][T22084] loop0: detected capacity change from 0 to 196608 [ 562.224735][T22084] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 562.224735][T22084] [ 562.247580][T22084] ERROR: (device loop0): remounting filesystem as read-only [ 562.270714][T22084] xtLookup: xtSearch returned -5 22:38:49 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0xa867, 0x500000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:38:49 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0xb72b4afa, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:38:49 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000000000)={@local, @private=0xa010101}, 0xc) [ 562.306319][T22084] read_mapping_page failed! [ 562.320306][T22084] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 562.339393][T22084] Mount JFS Failure: -5 [ 562.350404][T22084] jfs_mount failed w/return code = -5 22:38:49 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x40, 0x16, 0xa, 0x1, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'bond0\x00'}]}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}]}], {0x14, 0x10}}, 0xe8}}, 0x0) [ 562.433384][T22084] loop0: detected capacity change from 0 to 196608 [ 562.468675][T22084] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 562.468675][T22084] [ 562.504570][T22084] ERROR: (device loop0): remounting filesystem as read-only [ 562.525651][T22084] xtLookup: xtSearch returned -5 [ 562.550239][T22084] read_mapping_page failed! [ 562.565387][T22084] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 562.590080][T22084] Mount JFS Failure: -5 [ 562.606741][T22084] jfs_mount failed w/return code = -5 [ 562.698846][ T1372] ieee802154 phy0 wpan0: encryption failed: -22 [ 562.705293][ T1372] ieee802154 phy1 wpan1: encryption failed: -22 22:38:49 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x7000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000280)="10c4645f01000000010000000100004e36049b", 0x13, 0xb206}], 0x0, &(0x7f0000000080)={[{@nointegrity}]}) 22:38:49 executing program 3: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x951d48456b69e1af, 0x0) 22:38:49 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000034c0)={'wlan0\x00'}) 22:38:49 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0xf0ffffff, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:38:49 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x40, 0x16, 0xa, 0x1, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'bond0\x00'}]}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}]}], {0x14, 0x10}}, 0xe8}}, 0x0) 22:38:49 executing program 3: openat$bsg(0xffffffffffffff9c, 0x0, 0x410000, 0x0) 22:38:49 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f0000000200), r0) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x2c}}, 0x0) 22:38:49 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x2c, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'bond0\x00'}]}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}]}], {0x14, 0x10}}, 0xd4}}, 0x0) [ 563.032701][T22121] loop0: detected capacity change from 0 to 229376 [ 563.119463][T22121] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 563.119463][T22121] [ 563.139203][T22121] ERROR: (device loop0): remounting filesystem as read-only 22:38:49 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0xa867, 0x600000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:38:49 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0xfa4a2bb7, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 563.178092][T22121] xtLookup: xtSearch returned -5 [ 563.183076][T22121] read_mapping_page failed! [ 563.187620][T22121] jfs_mount: diMount(ipaimap) failed w/rc = -5 22:38:49 executing program 3: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000680), 0x103000, 0x0) [ 563.243230][T22121] Mount JFS Failure: -5 [ 563.263008][T22121] jfs_mount failed w/return code = -5 22:38:49 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_EEE_SET(r0, &(0x7f0000003340)={0x0, 0x0, &(0x7f0000003300)={0x0}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000003480), r0) [ 563.367242][T22121] loop0: detected capacity change from 0 to 229376 [ 563.429816][T22121] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 563.429816][T22121] [ 563.489426][T22121] ERROR: (device loop0): remounting filesystem as read-only [ 563.535416][T22121] xtLookup: xtSearch returned -5 [ 563.567475][T22121] read_mapping_page failed! [ 563.595935][T22121] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 563.638238][T22121] Mount JFS Failure: -5 [ 563.668301][T22121] jfs_mount failed w/return code = -5 22:38:50 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000280)="10c4645f01000000010000000100004e36049b", 0x13, 0xb206}], 0x0, &(0x7f0000000080)={[{@nointegrity}]}) 22:38:50 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x2c, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'bond0\x00'}]}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}]}], {0x14, 0x10}}, 0xd4}}, 0x0) 22:38:50 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0xfffff000, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:38:50 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f0000003380)={&(0x7f0000003140)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000003340)={&(0x7f00000031c0)={0x20, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @val={0x8}, @void}}, [@NL80211_ATTR_VENDOR_DATA={0x4}]}, 0x20}}, 0x0) 22:38:50 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f00000001c0)=[{0x1ff}]}) 22:38:50 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x2c, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'bond0\x00'}]}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}]}], {0x14, 0x10}}, 0xd4}}, 0x0) 22:38:50 executing program 3: openat$bsg(0xffffffffffffff9c, &(0x7f0000001b40), 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) 22:38:50 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0xa867, 0x700000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:38:50 executing program 5: r0 = socket$inet(0x2, 0x3, 0x3) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000240)={@loopback, @broadcast}, 0xc) 22:38:50 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0xffffff7f, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 564.029092][T22161] loop0: detected capacity change from 0 to 262144 [ 564.096249][T22161] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 564.096249][T22161] [ 564.139009][T22161] ERROR: (device loop0): remounting filesystem as read-only [ 564.174996][T22161] xtLookup: xtSearch returned -5 [ 564.201962][T22161] read_mapping_page failed! 22:38:50 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x38, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0xc, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}]}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'bond0\x00'}]}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}]}], {0x14, 0x10}}, 0xe0}}, 0x0) 22:38:50 executing program 3: rt_sigaction(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x8, &(0x7f00000001c0)) [ 564.225645][T22161] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 564.256632][T22161] Mount JFS Failure: -5 [ 564.294562][T22161] jfs_mount failed w/return code = -5 [ 564.402484][T22161] loop0: detected capacity change from 0 to 262144 [ 564.434410][T22161] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 564.434410][T22161] [ 564.487453][T22161] ERROR: (device loop0): remounting filesystem as read-only [ 564.513130][T22161] xtLookup: xtSearch returned -5 [ 564.524859][T22161] read_mapping_page failed! [ 564.536581][T22161] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 564.551183][T22161] Mount JFS Failure: -5 [ 564.574637][T22161] jfs_mount failed w/return code = -5 22:38:51 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x9000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000280)="10c4645f01000000010000000100004e36049b", 0x13, 0xb206}], 0x0, &(0x7f0000000080)={[{@nointegrity}]}) 22:38:51 executing program 5: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x101240, 0x0) 22:38:51 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0xffffff9e, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:38:51 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x38, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0xc, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}]}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'bond0\x00'}]}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}]}], {0x14, 0x10}}, 0xe0}}, 0x0) 22:38:51 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0xa867, 0x800000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:38:51 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) recvmsg(r0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) 22:38:51 executing program 3: rt_sigaction(0xd, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f00000001c0)) 22:38:51 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0xfffffff0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:38:51 executing program 5: r0 = socket(0x2, 0x3, 0x5) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, ["", "", "", "", ""]}, 0xfffffffffffffef8}}, 0x0) 22:38:51 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x38, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0xc, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}]}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'bond0\x00'}]}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}]}], {0x14, 0x10}}, 0xe0}}, 0x0) [ 564.938141][T22201] loop0: detected capacity change from 0 to 264192 [ 564.983393][T22201] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 564.983393][T22201] [ 565.055514][T22201] ERROR: (device loop0): remounting filesystem as read-only [ 565.115702][T22201] xtLookup: xtSearch returned -5 22:38:51 executing program 5: open$dir(&(0x7f0000000300)='./file0\x00', 0x463c0, 0x0) 22:38:51 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0xffffffff, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 565.152442][T22201] read_mapping_page failed! [ 565.197467][T22201] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 565.239409][T22201] Mount JFS Failure: -5 [ 565.266163][T22201] jfs_mount failed w/return code = -5 [ 565.325057][ T25] audit: type=1800 audit(1627943931.938:30): pid=22216 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=14467 res=0 errno=0 [ 565.360507][T22201] loop0: detected capacity change from 0 to 264192 [ 565.396113][T22201] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 565.396113][T22201] [ 565.451389][T22201] ERROR: (device loop0): remounting filesystem as read-only [ 565.491538][T22201] xtLookup: xtSearch returned -5 [ 565.508316][T22201] read_mapping_page failed! [ 565.525384][T22201] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 565.540802][T22201] Mount JFS Failure: -5 [ 565.545266][T22201] jfs_mount failed w/return code = -5 22:38:52 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xa000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000280)="10c4645f01000000010000000100004e36049b", 0x13, 0xb206}], 0x0, &(0x7f0000000080)={[{@nointegrity}]}) 22:38:52 executing program 3: accept$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), 0xffffffffffffffff) openat$bsg(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) socket(0x0, 0x0, 0x3) syz_genetlink_get_family_id$nl80211(&(0x7f0000003180), 0xffffffffffffffff) 22:38:52 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x38, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0xc, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'bond0\x00'}]}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}]}], {0x14, 0x10}}, 0xe0}}, 0x0) 22:38:52 executing program 5: openat$hwrng(0xffffffffffffff9c, &(0x7f0000003400), 0x0, 0x0) 22:38:52 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {0x5}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:38:52 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0xa867, 0x900000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:38:52 executing program 5: clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) clock_nanosleep(0x2, 0x1, &(0x7f00000001c0)={0x0, r0+10000000}, 0x0) [ 565.855355][T22244] loop0: detected capacity change from 0 to 264192 22:38:52 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockname$inet6(r0, &(0x7f0000000100), &(0x7f0000000140)=0x1c) 22:38:52 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x38, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0xc, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'bond0\x00'}]}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}]}], {0x14, 0x10}}, 0xe0}}, 0x0) 22:38:52 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {0x7}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 565.937379][T22244] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 565.937379][T22244] [ 566.009348][T22244] ERROR: (device loop0): remounting filesystem as read-only [ 566.058801][T22244] xtLookup: xtSearch returned -5 [ 566.090577][T22244] read_mapping_page failed! [ 566.131116][T22244] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 566.182923][T22244] Mount JFS Failure: -5 22:38:52 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 566.220445][T22244] jfs_mount failed w/return code = -5 22:38:52 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x38, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0xc, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'bond0\x00'}]}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}]}], {0x14, 0x10}}, 0xe0}}, 0x0) [ 566.331985][T22244] loop0: detected capacity change from 0 to 264192 [ 566.385899][T22244] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 566.385899][T22244] [ 566.457781][T22244] ERROR: (device loop0): remounting filesystem as read-only [ 566.475812][T22244] xtLookup: xtSearch returned -5 [ 566.480796][T22244] read_mapping_page failed! [ 566.501888][T22244] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 566.508174][T22244] Mount JFS Failure: -5 [ 566.524478][T22244] jfs_mount failed w/return code = -5 22:38:53 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xc000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000280)="10c4645f01000000010000000100004e36049b", 0x13, 0xb206}], 0x0, &(0x7f0000000080)={[{@nointegrity}]}) 22:38:53 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {0x8}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:38:53 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x34, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'bond0\x00'}]}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}]}], {0x14, 0x10}}, 0xdc}}, 0x0) 22:38:53 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000080)={0x0, {{0x2, 0x0, @private}}, {{0x2, 0x0, @multicast2}}}, 0x108) 22:38:53 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0xa867, 0xa00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 566.780183][T22279] loop0: detected capacity change from 0 to 264192 [ 566.882200][T22279] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 566.882200][T22279] 22:38:53 executing program 5: r0 = socket$inet6_icmp(0xa, 0x2, 0x3a) sendmmsg$inet6(r0, &(0x7f0000002d40), 0x0, 0x4000) [ 566.982022][T22279] ERROR: (device loop0): remounting filesystem as read-only [ 567.032840][T22279] xtLookup: xtSearch returned -5 [ 567.073995][T22279] read_mapping_page failed! [ 567.101801][T22279] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 567.146294][T22279] Mount JFS Failure: -5 [ 567.174385][T22279] jfs_mount failed w/return code = -5 22:38:53 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_buf(r0, 0x0, 0x27, &(0x7f0000000080)="fb", 0x1) [ 567.329212][T22279] loop0: detected capacity change from 0 to 264192 [ 567.402708][T22279] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 567.402708][T22279] [ 567.431658][T22279] ERROR: (device loop0): remounting filesystem as read-only [ 567.439476][T22279] xtLookup: xtSearch returned -5 [ 567.446722][T22279] read_mapping_page failed! [ 567.452369][T22279] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 567.458944][T22279] Mount JFS Failure: -5 [ 567.463595][T22279] jfs_mount failed w/return code = -5 22:38:54 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xd000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000280)="10c4645f01000000010000000100004e36049b", 0x13, 0xb206}], 0x0, &(0x7f0000000080)={[{@nointegrity}]}) 22:38:54 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0xa867, 0xb00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:38:54 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000240), 0x10) 22:38:54 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x34, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'bond0\x00'}]}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}]}], {0x14, 0x10}}, 0xdc}}, 0x0) 22:38:54 executing program 3: r0 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000000)) ioctl$NS_GET_NSTYPE(r0, 0xb703, 0x0) 22:38:54 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {0x9}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 567.842845][T22311] loop0: detected capacity change from 0 to 264192 22:38:54 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x34, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'bond0\x00'}]}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}]}], {0x14, 0x10}}, 0xdc}}, 0x0) 22:38:54 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCDARP(r0, 0x8953, 0x0) [ 567.940086][T22311] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 567.940086][T22311] [ 568.043695][T22311] ERROR: (device loop0): remounting filesystem as read-only 22:38:54 executing program 3: pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x0) setsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, 0x0) [ 568.110831][T22311] xtLookup: xtSearch returned -5 [ 568.156602][T22311] read_mapping_page failed! 22:38:54 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {0xa}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 568.199880][T22311] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 568.257747][T22311] Mount JFS Failure: -5 [ 568.295757][T22311] jfs_mount failed w/return code = -5 22:38:54 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x34, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'bond0\x00'}]}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}]}], {0x14, 0x10}}, 0xdc}}, 0x0) 22:38:55 executing program 5: openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x8400, 0x0) [ 568.416431][T22311] loop0: detected capacity change from 0 to 264192 [ 568.446475][T22311] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 568.446475][T22311] [ 568.474418][T22311] ERROR: (device loop0): remounting filesystem as read-only [ 568.509043][T22311] xtLookup: xtSearch returned -5 [ 568.531060][T22311] read_mapping_page failed! [ 568.555561][T22311] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 568.572495][T22311] Mount JFS Failure: -5 [ 568.582914][T22311] jfs_mount failed w/return code = -5 22:38:55 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000280)="10c4645f01000000010000000100004e36049b", 0x13, 0xb206}], 0x0, &(0x7f0000000080)={[{@nointegrity}]}) 22:38:55 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0xa867, 0xc00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:38:55 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {0xb}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:38:55 executing program 3: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0) 22:38:55 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x34, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'bond0\x00'}]}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}]}], {0x14, 0x10}}, 0xdc}}, 0x0) 22:38:55 executing program 5: r0 = socket$inet_icmp(0x2, 0x2, 0x1) connect(r0, &(0x7f0000000000)=@in={0x2, 0x0, @multicast1}, 0x80) 22:38:55 executing program 5: r0 = socket$inet6_icmp(0xa, 0x2, 0x3a) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000640)={'TPROXY\x00'}, &(0x7f0000000680)=0x1e) 22:38:55 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x34, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'bond0\x00'}]}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}]}], {0x14, 0x10}}, 0xdc}}, 0x0) 22:38:55 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_mreqn(r0, 0x0, 0x0, 0x0, &(0x7f0000003d00)) 22:38:55 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {0xc}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 568.943412][T22353] loop0: detected capacity change from 0 to 264192 [ 569.007644][T22353] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 569.007644][T22353] [ 569.074635][T22353] ERROR: (device loop0): remounting filesystem as read-only [ 569.125760][T22353] xtLookup: xtSearch returned -5 [ 569.172433][T22353] read_mapping_page failed! [ 569.202000][T22353] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 569.274358][T22353] Mount JFS Failure: -5 22:38:55 executing program 5: r0 = socket$inet6_icmp(0xa, 0x2, 0x3a) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @private0}, 0x1c) [ 569.321938][T22353] jfs_mount failed w/return code = -5 22:38:56 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWFLOWTABLE={0x40, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'bond0\x00'}]}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}]}], {0x14, 0x10}}, 0xc8}}, 0x0) [ 569.458895][T22353] loop0: detected capacity change from 0 to 264192 [ 569.489964][T22353] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 569.489964][T22353] [ 569.525322][T22353] ERROR: (device loop0): remounting filesystem as read-only [ 569.532643][T22353] xtLookup: xtSearch returned -5 [ 569.552871][T22353] read_mapping_page failed! [ 569.559018][T22353] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 569.565425][T22353] Mount JFS Failure: -5 [ 569.569672][T22353] jfs_mount failed w/return code = -5 22:38:56 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x10000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000280)="10c4645f01000000010000000100004e36049b", 0x13, 0xb206}], 0x0, &(0x7f0000000080)={[{@nointegrity}]}) 22:38:56 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, 0x0, &(0x7f0000000380)) 22:38:56 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {0xd}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:38:56 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWFLOWTABLE={0x40, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'bond0\x00'}]}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}]}], {0x14, 0x10}}, 0xc8}}, 0x0) 22:38:56 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0xa867, 0xd00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:38:56 executing program 5: shmget$private(0x0, 0x1000, 0x78000000, &(0x7f0000ffc000/0x1000)=nil) 22:38:56 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {0xe}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:38:56 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWFLOWTABLE={0x40, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'bond0\x00'}]}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}]}], {0x14, 0x10}}, 0xc8}}, 0x0) 22:38:56 executing program 5: pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x0) 22:38:56 executing program 3: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getpeername$inet6(r0, 0x0, 0x0) [ 569.957047][T22392] loop0: detected capacity change from 0 to 264192 [ 570.032726][T22392] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 570.032726][T22392] [ 570.114466][T22392] ERROR: (device loop0): remounting filesystem as read-only [ 570.176730][T22392] xtLookup: xtSearch returned -5 [ 570.236043][T22392] read_mapping_page failed! [ 570.278962][T22392] jfs_mount: diMount(ipaimap) failed w/rc = -5 22:38:56 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x0, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x40, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'bond0\x00'}]}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}]}], {0x14, 0x10}}, 0xe8}}, 0x0) [ 570.330706][T22392] Mount JFS Failure: -5 22:38:57 executing program 3: r0 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmat(r0, &(0x7f0000ffc000/0x4000)=nil, 0x2000) [ 570.361592][T22392] jfs_mount failed w/return code = -5 [ 570.488551][T22392] loop0: detected capacity change from 0 to 264192 [ 570.517835][T22392] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 570.517835][T22392] [ 570.556679][T22392] ERROR: (device loop0): remounting filesystem as read-only [ 570.596015][T22392] xtLookup: xtSearch returned -5 [ 570.608213][T22392] read_mapping_page failed! [ 570.624076][T22392] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 570.634047][T22392] Mount JFS Failure: -5 [ 570.641403][T22392] jfs_mount failed w/return code = -5 22:38:57 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x11000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000280)="10c4645f01000000010000000100004e36049b", 0x13, 0xb206}], 0x0, &(0x7f0000000080)={[{@nointegrity}]}) 22:38:57 executing program 5: r0 = socket$inet6_icmp(0xa, 0x2, 0x3a) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000040)={'raw\x00'}, &(0x7f00000000c0)=0x54) 22:38:57 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {0xf}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:38:57 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0xa867, 0xe00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:38:57 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x0, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x40, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'bond0\x00'}]}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}]}], {0x14, 0x10}}, 0xe8}}, 0x0) 22:38:57 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000140)={@broadcast, @broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) 22:38:57 executing program 3: r0 = socket$inet6_icmp(0xa, 0x2, 0x3a) getsockname(r0, 0x0, &(0x7f0000002240)) 22:38:57 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {0x10}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:38:57 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) 22:38:57 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x0, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x40, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'bond0\x00'}]}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}]}], {0x14, 0x10}}, 0xe8}}, 0x0) [ 570.999151][T22430] loop0: detected capacity change from 0 to 264192 [ 571.072082][T22430] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 571.072082][T22430] [ 571.140029][T22430] ERROR: (device loop0): remounting filesystem as read-only 22:38:57 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_buf(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)) [ 571.182945][T22430] xtLookup: xtSearch returned -5 [ 571.223116][T22430] read_mapping_page failed! 22:38:57 executing program 3: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, 0x0, 0x0) [ 571.276835][T22430] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 571.375936][T22430] Mount JFS Failure: -5 [ 571.421355][T22430] jfs_mount failed w/return code = -5 22:38:58 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1f000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000280)="10c4645f01000000010000000100004e36049b", 0x13, 0xb206}], 0x0, &(0x7f0000000080)={[{@nointegrity}]}) 22:38:58 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x40, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'bond0\x00'}]}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}]}], {0x14, 0x10}}, 0xe8}}, 0x0) 22:38:58 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {0x11}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:38:58 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0xa867, 0xf00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:38:58 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {0x12}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:38:58 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x40, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'bond0\x00'}]}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}]}], {0x14, 0x10}}, 0xe8}}, 0x0) 22:38:58 executing program 5: r0 = eventfd(0x0) write$eventfd(r0, &(0x7f000000a2c0), 0x8) 22:38:58 executing program 3: r0 = epoll_create(0x400) fstat(r0, &(0x7f0000000000)) [ 571.791393][T22457] loop0: detected capacity change from 0 to 264192 [ 571.865133][T22457] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 571.865133][T22457] [ 571.917893][T22457] ERROR: (device loop0): remounting filesystem as read-only [ 571.954715][T22457] xtLookup: xtSearch returned -5 22:38:58 executing program 5: r0 = shmget(0x0, 0x4000, 0x0, &(0x7f0000ff8000/0x4000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) 22:38:58 executing program 3: clock_gettime(0x6, &(0x7f0000000300)) [ 571.981079][T22457] read_mapping_page failed! 22:38:58 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x40, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'bond0\x00'}]}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}]}], {0x14, 0x10}}, 0xe8}}, 0x0) 22:38:58 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {0x13}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 572.030330][T22457] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 572.051714][T22457] Mount JFS Failure: -5 [ 572.083696][T22457] jfs_mount failed w/return code = -5 [ 572.191033][T22457] loop0: detected capacity change from 0 to 264192 [ 572.231268][T22457] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 572.231268][T22457] [ 572.302908][T22457] ERROR: (device loop0): remounting filesystem as read-only [ 572.358705][T22457] xtLookup: xtSearch returned -5 [ 572.394488][T22457] read_mapping_page failed! [ 572.419971][T22457] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 572.464723][T22457] Mount JFS Failure: -5 [ 572.483174][T22457] jfs_mount failed w/return code = -5 22:38:59 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x20000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000280)="10c4645f01000000010000000100004e36049b", 0x13, 0xb206}], 0x0, &(0x7f0000000080)={[{@nointegrity}]}) 22:38:59 executing program 3: get_mempolicy(0x0, &(0x7f0000000040), 0x1, &(0x7f0000ffb000/0x2000)=nil, 0x3) 22:38:59 executing program 5: mbind(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x0) 22:38:59 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0xa867, 0x1000000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:38:59 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {0x14}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:38:59 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x14, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}}, @NFT_MSG_NEWFLOWTABLE={0x40, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'bond0\x00'}]}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}]}], {0x14, 0x10}}, 0xdc}}, 0x0) 22:38:59 executing program 5: perf_event_open$cgroup(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:38:59 executing program 3: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={0x0, 0x0, 0x28}, 0xc) [ 572.810357][T22499] loop0: detected capacity change from 0 to 264192 22:38:59 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {0x15}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 572.868483][T22499] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 572.868483][T22499] 22:38:59 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x14, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}}, @NFT_MSG_NEWFLOWTABLE={0x40, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'bond0\x00'}]}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}]}], {0x14, 0x10}}, 0xdc}}, 0x0) [ 572.937396][T22499] ERROR: (device loop0): remounting filesystem as read-only [ 572.984862][T22499] xtLookup: xtSearch returned -5 [ 573.012107][T22499] read_mapping_page failed! [ 573.043605][T22499] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 573.095593][T22499] Mount JFS Failure: -5 22:38:59 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x17, 0x0, 0xfffff800, 0x3, 0x0, 0x1}, 0x40) 22:38:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000440)=ANY=[@ANYBLOB="367215065a"], &(0x7f0000000480)=""/228, 0x1d, 0xe4, 0x1}, 0x20) [ 573.128011][T22499] jfs_mount failed w/return code = -5 [ 573.207748][T22499] loop0: detected capacity change from 0 to 264192 [ 573.248700][T22499] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 573.248700][T22499] [ 573.330684][T22499] ERROR: (device loop0): remounting filesystem as read-only [ 573.380510][T22499] xtLookup: xtSearch returned -5 [ 573.409325][T22499] read_mapping_page failed! [ 573.432900][T22499] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 573.471974][T22499] Mount JFS Failure: -5 [ 573.501779][T22499] jfs_mount failed w/return code = -5 22:39:00 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x20100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000280)="10c4645f01000000010000000100004e36049b", 0x13, 0xb206}], 0x0, &(0x7f0000000080)={[{@nointegrity}]}) 22:39:00 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x14, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}}, @NFT_MSG_NEWFLOWTABLE={0x40, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}, @NFT_MSG_DELFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'bond0\x00'}]}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}]}], {0x14, 0x10}}, 0xdc}}, 0x0) 22:39:00 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {0x16}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:39:00 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000003ac0)={&(0x7f0000003940)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@volatile={0x0, 0x0, 0x0, 0x9, 0x1}]}}, &(0x7f0000003a00)=""/149, 0x26, 0x95, 0x1}, 0x20) 22:39:00 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)={0x17, 0x0, 0xa725, 0x3, 0x0, 0x1}, 0x40) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) 22:39:00 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0xa867, 0x1100000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:39:00 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x7, 0xac, &(0x7f0000000080)=""/172, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x0, 0x0, 0x0, 0xffffffff}, 0x10}, 0x78) 22:39:00 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:39:00 executing program 4: bpf$ITER_CREATE(0x21, &(0x7f0000005c00), 0x8) 22:39:00 executing program 5: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x810, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 573.914627][T22541] loop0: detected capacity change from 0 to 264192 22:39:00 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x15, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x40) [ 574.049937][T22541] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 574.049937][T22541] [ 574.173753][T22541] ERROR: (device loop0): remounting filesystem as read-only [ 574.248121][T22541] xtLookup: xtSearch returned -5 [ 574.299069][T22541] read_mapping_page failed! 22:39:00 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {0x17, 0x2}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 574.349713][T22541] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 574.403629][T22541] Mount JFS Failure: -5 [ 574.431193][T22541] jfs_mount failed w/return code = -5 [ 574.544593][T22541] loop0: detected capacity change from 0 to 264192 [ 574.586156][T22541] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 574.586156][T22541] [ 574.627131][T22541] ERROR: (device loop0): remounting filesystem as read-only [ 574.635004][T22541] xtLookup: xtSearch returned -5 [ 574.652278][T22541] read_mapping_page failed! [ 574.656878][T22541] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 574.672604][T22541] Mount JFS Failure: -5 [ 574.679745][T22541] jfs_mount failed w/return code = -5 22:39:01 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x23000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000280)="10c4645f01000000010000000100004e36049b", 0x13, 0xb206}], 0x0, &(0x7f0000000080)={[{@nointegrity}]}) 22:39:01 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)={0x17, 0x0, 0xa725, 0x3, 0x0, 0x1}, 0x40) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, r0}, 0x38) 22:39:01 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r0) 22:39:01 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000003ac0)={&(0x7f0000003940)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct]}}, &(0x7f0000003a00)=""/149, 0x32, 0x95, 0x1}, 0x20) 22:39:01 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {0x17, 0x3}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:39:01 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0xa867, 0x1200000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:39:01 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = getpid() sendmsg$unix(r1, &(0x7f0000002c80)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002c40)=[@cred={{0x1c, 0x1, 0x2, {r2}}}], 0x20}, 0x0) recvmsg$unix(r0, &(0x7f0000001e40)={0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f0000001b00)=""/177, 0xb1}], 0x1, &(0x7f0000001d00)}, 0x40) 22:39:01 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000003ac0)={&(0x7f0000003940)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@volatile]}}, &(0x7f0000003a00)=""/149, 0x26, 0x95, 0x1}, 0x20) [ 574.976688][T22581] loop0: detected capacity change from 0 to 264192 22:39:01 executing program 5: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000009a40)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_netprio_ifpriomap(r0, 0x0, 0x0) 22:39:01 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {0x17, 0x4}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 575.058457][T22581] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 575.058457][T22581] [ 575.146306][T22581] ERROR: (device loop0): remounting filesystem as read-only [ 575.200477][T22581] xtLookup: xtSearch returned -5 [ 575.256431][T22581] read_mapping_page failed! 22:39:01 executing program 3: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000019c0)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000003580)={0x0, 0x0, 0x0}, 0x0) 22:39:01 executing program 4: bpf$BPF_MAP_GET_NEXT_ID(0xc, 0x0, 0x700) [ 575.299278][T22581] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 575.337859][T22581] Mount JFS Failure: -5 [ 575.412495][T22581] jfs_mount failed w/return code = -5 [ 575.535232][T22581] loop0: detected capacity change from 0 to 264192 [ 575.637218][T22581] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 575.637218][T22581] [ 575.674717][T22581] ERROR: (device loop0): remounting filesystem as read-only [ 575.690971][T22581] xtLookup: xtSearch returned -5 [ 575.703310][T22581] read_mapping_page failed! [ 575.708216][T22581] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 575.742087][T22581] Mount JFS Failure: -5 [ 575.747658][T22581] jfs_mount failed w/return code = -5 22:39:02 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3f000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000280)="10c4645f01000000010000000100004e36049b", 0x13, 0xb206}], 0x0, &(0x7f0000000080)={[{@nointegrity}]}) 22:39:02 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000009cc0)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000000)=@raw=[@alu], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:39:02 executing program 4: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$sock(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=[@timestamping={{0x14}}], 0x18}, 0x0) 22:39:02 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)) 22:39:02 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {0x17, 0x5}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:39:02 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0xa867, 0x1300000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:39:02 executing program 5: openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x80200, 0x0) 22:39:02 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000003ac0)={&(0x7f0000003940)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000003a00)=""/149, 0x26, 0x95, 0x1}, 0x20) 22:39:02 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000540)={0x16, 0x0, 0xa725, 0xffffffff, 0x0, 0x1}, 0x40) 22:39:02 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {0x17, 0x6}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 576.169144][T22624] loop0: detected capacity change from 0 to 264192 22:39:02 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r0, r1) setsockopt$inet_sctp_SCTP_INITMSG(r2, 0x84, 0x3, &(0x7f0000000000), 0x8) [ 576.290335][T22624] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 576.290335][T22624] 22:39:03 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000140)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0, 0x0, &(0x7f0000000180)=[@authinfo={0x10}], 0x10}, 0x0) [ 576.374594][T22624] ERROR: (device loop0): remounting filesystem as read-only [ 576.449599][T22624] xtLookup: xtSearch returned -5 [ 576.501439][T22624] read_mapping_page failed! [ 576.526744][T22624] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 576.564507][T22624] Mount JFS Failure: -5 [ 576.598224][T22624] jfs_mount failed w/return code = -5 [ 576.684588][T22624] loop0: detected capacity change from 0 to 264192 [ 576.734137][T22624] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 576.734137][T22624] [ 576.762798][T22624] ERROR: (device loop0): remounting filesystem as read-only [ 576.771450][T22624] xtLookup: xtSearch returned -5 [ 576.778684][T22624] read_mapping_page failed! [ 576.785950][T22624] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 576.826185][T22624] Mount JFS Failure: -5 22:39:03 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000280)="10c4645f01000000010000000100004e36049b", 0x13, 0xb206}], 0x0, &(0x7f0000000080)={[{@nointegrity}]}) 22:39:03 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r0, r1) setsockopt$inet_sctp_SCTP_INITMSG(r2, 0x84, 0x3, &(0x7f0000000000)={0x81, 0x2bd, 0x1f}, 0x8) 22:39:03 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {0x17, 0x7}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:39:03 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r0, r1) setsockopt$inet_sctp_SCTP_INITMSG(r2, 0x84, 0x3, &(0x7f0000000000)={0x0, 0x2bd}, 0x8) 22:39:03 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0xa867, 0x1400000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:39:03 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000000)={0x0, @in, 0x0, 0x0, 0x284}, 0x98) [ 576.853310][T22624] jfs_mount failed w/return code = -5 22:39:03 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x23, &(0x7f00000000c0), 0x90) 22:39:03 executing program 4: r0 = socket$unix(0x1, 0x5, 0x0) bind(r0, 0x0, 0x0) 22:39:03 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {0x17, 0x8}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 577.208187][T22667] loop0: detected capacity change from 0 to 264192 22:39:03 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$inet(r0, &(0x7f0000000b40)={&(0x7f00000008c0)={0x2, 0x0, @loopback}, 0x10, 0x0}, 0x0) [ 577.317035][T22667] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 577.317035][T22667] [ 577.386331][T22667] ERROR: (device loop0): remounting filesystem as read-only [ 577.445032][T22667] xtLookup: xtSearch returned -5 [ 577.485237][T22667] read_mapping_page failed! [ 577.530730][T22667] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 577.616245][T22667] Mount JFS Failure: -5 [ 577.658127][T22667] jfs_mount failed w/return code = -5 22:39:04 executing program 5: setxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, 0x0, 0x0) 22:39:04 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$incfs_metadata(&(0x7f0000000640)='./file0\x00', &(0x7f0000001740), 0x0, 0x0, 0x0) [ 577.784076][T22667] loop0: detected capacity change from 0 to 264192 [ 577.813512][T22667] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 577.813512][T22667] [ 577.856521][T22667] ERROR: (device loop0): remounting filesystem as read-only [ 577.875607][T22667] xtLookup: xtSearch returned -5 [ 577.888766][T22667] read_mapping_page failed! [ 577.899720][T22667] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 577.918593][T22667] Mount JFS Failure: -5 [ 577.933204][T22667] jfs_mount failed w/return code = -5 22:39:04 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x48000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000280)="10c4645f01000000010000000100004e36049b", 0x13, 0xb206}], 0x0, &(0x7f0000000080)={[{@nointegrity}]}) 22:39:04 executing program 3: msgget(0x2, 0x600) 22:39:04 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {0x17, 0x9}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:39:04 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0xa867, 0x1500000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:39:04 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff}) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, 0x0, 0x0) 22:39:04 executing program 5: socket(0x26, 0x5, 0x400) 22:39:04 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, 0x0) 22:39:04 executing program 4: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x88301, 0x0) 22:39:04 executing program 3: r0 = eventfd(0xb8) read$eventfd(r0, &(0x7f0000000080), 0x8) [ 578.288453][T22706] loop0: detected capacity change from 0 to 264192 22:39:04 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {0x17, 0xa}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 578.393562][T22706] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 578.393562][T22706] [ 578.482635][T22706] ERROR: (device loop0): remounting filesystem as read-only [ 578.538196][T22706] xtLookup: xtSearch returned -5 [ 578.578872][T22706] read_mapping_page failed! [ 578.625450][T22706] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 578.686969][T22706] Mount JFS Failure: -5 [ 578.728504][T22706] jfs_mount failed w/return code = -5 22:39:05 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {0x17, 0xb}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:39:05 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) write$FUSE_CREATE_OPEN(r0, 0x0, 0x0) [ 578.867089][T22706] loop0: detected capacity change from 0 to 264192 [ 578.905632][T22706] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 578.905632][T22706] [ 578.956382][T22706] ERROR: (device loop0): remounting filesystem as read-only [ 578.977737][T22706] xtLookup: xtSearch returned -5 [ 579.015801][T22706] read_mapping_page failed! [ 579.027920][T22706] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 579.050333][T22706] Mount JFS Failure: -5 [ 579.060688][T22706] jfs_mount failed w/return code = -5 22:39:05 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4c000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000280)="10c4645f01000000010000000100004e36049b", 0x13, 0xb206}], 0x0, &(0x7f0000000080)={[{@nointegrity}]}) 22:39:05 executing program 3: mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x4000851, 0xffffffffffffffff, 0x0) 22:39:05 executing program 4: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x100, 0x0) 22:39:05 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0xa867, 0x1600000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:39:05 executing program 5: newfstatat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) 22:39:05 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {0x17, 0xf}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:39:05 executing program 4: newfstatat(0xffffffffffffff9c, 0x0, 0x0, 0x6000) 22:39:06 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) fsetxattr(r0, &(0x7f0000000040)=@random={'trusted.', '*(]X]/\x11-@\\\x00'}, 0x0, 0x0, 0x0) 22:39:06 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {0x17, 0x10}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 579.424908][T22741] loop0: detected capacity change from 0 to 264192 22:39:06 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x2020) [ 579.487545][T22741] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 579.487545][T22741] [ 579.577364][T22741] ERROR: (device loop0): remounting filesystem as read-only [ 579.649707][T22741] xtLookup: xtSearch returned -5 [ 579.686589][T22741] read_mapping_page failed! [ 579.749218][T22741] jfs_mount: diMount(ipaimap) failed w/rc = -5 22:39:06 executing program 4: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x0) [ 579.839815][T22741] Mount JFS Failure: -5 22:39:06 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {0x17, 0x11}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 579.880060][T22741] jfs_mount failed w/return code = -5 [ 579.962785][T22741] loop0: detected capacity change from 0 to 264192 [ 579.991946][T22741] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 579.991946][T22741] [ 580.027189][T22741] ERROR: (device loop0): remounting filesystem as read-only [ 580.053015][T22741] xtLookup: xtSearch returned -5 [ 580.063561][T22741] read_mapping_page failed! [ 580.068270][T22741] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 580.084819][T22741] Mount JFS Failure: -5 [ 580.090206][T22741] jfs_mount failed w/return code = -5 22:39:06 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x60000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000280)="10c4645f01000000010000000100004e36049b", 0x13, 0xb206}], 0x0, &(0x7f0000000080)={[{@nointegrity}]}) 22:39:06 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000001800)={0xc, 0x1, &(0x7f0000001600)=@raw=[@func], &(0x7f0000001680)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 22:39:06 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0xa867, 0x1700000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:39:06 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:39:06 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10003) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) accept$inet6(r0, 0x0, 0x0) 22:39:07 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000091fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-sse2\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000001580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) write$binfmt_script(r1, &(0x7f00000003c0)={'#! ', './file0/../file0', [], 0xa, "0b07151af9c4dd9dfa8f8fcef988f6480509c8be1c0f356e3ea5c63de7366dfb52433a4e0da80adc54166204d004d2ee25fe914975a093cf85169fb8126b062da958b8ec7b890ff2892be72e45aa1b2b7f3b61a3eea7e16e3605a4d61a058e5120348520ae628433dc3bca85"}, 0x80) 22:39:07 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {0x17, 0x0, 0x2}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 580.622343][T22793] loop0: detected capacity change from 0 to 264192 [ 580.640783][T22793] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 580.640783][T22793] [ 580.664904][T22793] ERROR: (device loop0): remounting filesystem as read-only [ 580.679184][T22793] xtLookup: xtSearch returned -5 [ 580.702703][T22793] read_mapping_page failed! [ 580.736843][T22793] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 580.787200][T22793] Mount JFS Failure: -5 22:39:07 executing program 5: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000bc0)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xee01}}, {{@in6=@local}, 0xa, @in=@local}}, 0xe8) [ 580.827507][T22793] jfs_mount failed w/return code = -5 [ 580.934900][T22793] loop0: detected capacity change from 0 to 264192 22:39:07 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {0x17, 0x0, 0x3}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 580.975960][T22793] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 580.975960][T22793] [ 581.058517][T22793] ERROR: (device loop0): remounting filesystem as read-only [ 581.110277][T22793] xtLookup: xtSearch returned -5 22:39:07 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0xa867, 0x1800000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:39:07 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_IPV6_RTHDR(r0, 0x29, 0x39, &(0x7f0000000100)={0x0, 0x2, 0x2, 0x0, 0x0, [@empty]}, 0x18) [ 581.148708][T22793] read_mapping_page failed! [ 581.153919][T22793] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 581.160403][T22793] Mount JFS Failure: -5 [ 581.176879][T22793] jfs_mount failed w/return code = -5 22:39:07 executing program 5: syz_genetlink_get_family_id$netlbl_cipso(0x0, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 22:39:07 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x68000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000280)="10c4645f01000000010000000100004e36049b", 0x13, 0xb206}], 0x0, &(0x7f0000000080)={[{@nointegrity}]}) 22:39:07 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {0x17, 0x0, 0x4}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:39:08 executing program 3: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000001580)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sys_exit\x00', r1}, 0x10) r2 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) getsockopt$bt_hci(r2, 0x0, 0x0, 0x0, 0x0) 22:39:08 executing program 4: bpf$MAP_UPDATE_ELEM(0x1c, 0x0, 0x0) [ 581.617182][T22832] loop0: detected capacity change from 0 to 264192 22:39:08 executing program 5: sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, 0x0, 0x0) [ 581.725480][T22832] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 581.725480][T22832] 22:39:08 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {0x17, 0x0, 0x5}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 581.817967][T22832] ERROR: (device loop0): remounting filesystem as read-only [ 581.881436][T22832] xtLookup: xtSearch returned -5 [ 581.947410][T22832] read_mapping_page failed! [ 581.992629][T22832] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 582.026394][T22832] Mount JFS Failure: -5 [ 582.030855][T22832] jfs_mount failed w/return code = -5 22:39:08 executing program 4: r0 = socket$l2tp6(0xa, 0x2, 0x73) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000580)) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, 0x0, 0x0) [ 582.114936][T22832] loop0: detected capacity change from 0 to 264192 [ 582.145474][T22832] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 582.145474][T22832] 22:39:08 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0xa867, 0x1900000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:39:08 executing program 5: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000040)={0x0, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @private}}}}, 0x88) 22:39:08 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {0x17, 0x0, 0x6}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 582.218291][T22832] ERROR: (device loop0): remounting filesystem as read-only [ 582.255848][T22832] xtLookup: xtSearch returned -5 [ 582.275710][T22832] read_mapping_page failed! [ 582.294852][T22832] jfs_mount: diMount(ipaimap) failed w/rc = -5 22:39:08 executing program 3: bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x100000) [ 582.341690][T22832] Mount JFS Failure: -5 [ 582.358608][T22832] jfs_mount failed w/return code = -5 22:39:09 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xf}, 0x3}, 0x1c) 22:39:09 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x6c000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000280)="10c4645f01000000010000000100004e36049b", 0x13, 0xb206}], 0x0, &(0x7f0000000080)={[{@nointegrity}]}) 22:39:09 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000900), 0x200002, 0x0) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, 0x0) 22:39:09 executing program 5: sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000500), 0x0) socket$l2tp6(0xa, 0x2, 0x73) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f0000000780), 0xffffffffffffffff) 22:39:09 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {0x17, 0x0, 0x7}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:39:09 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$TIPC_MCAST_BROADCAST(r0, 0x10f, 0x85) [ 582.905205][T22875] loop0: detected capacity change from 0 to 264192 22:39:09 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {0x17, 0x0, 0x8}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:39:09 executing program 3: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$inet(r0, &(0x7f0000002b40)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000002640)=[{&(0x7f0000002c80)="ee223582eefa3b6089f13c1b4be12a49b0350a7ce20031b5d1241a466ae84a84bdaba44dd2a849c45a840c3912bae6562d7208275df38e359ac0ff2a05fda520245abbec35ff23af0b19d900616b0752e820ee01c5fc8c6e5ef1aadcf3d06b390b617976c0f1c4cb36640b5f185e9efeac2248dc93abeaeec5cbd55967a18d03", 0x80}], 0x1}}], 0x2, 0x0) [ 583.056095][T22875] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 583.056095][T22875] 22:39:09 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0xa867, 0x1a00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:39:09 executing program 5: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_IPV6_RTHDR(r0, 0x29, 0x39, &(0x7f0000000100), 0x8) [ 583.115707][T22875] ERROR: (device loop0): remounting filesystem as read-only [ 583.166606][T22875] xtLookup: xtSearch returned -5 [ 583.193054][T22875] read_mapping_page failed! 22:39:09 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$mptcp(&(0x7f00000074c0), r0) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r0, &(0x7f00000075c0)={0x0, 0x0, &(0x7f0000007580)={0x0}}, 0x0) [ 583.216930][T22875] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 583.255196][T22891] ieee802154 phy0 wpan0: encryption failed: -22 [ 583.258000][T22875] Mount JFS Failure: -5 [ 583.281812][T22875] jfs_mount failed w/return code = -5 22:39:09 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {0x17, 0x0, 0x9}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 583.376645][T22875] loop0: detected capacity change from 0 to 264192 [ 583.410607][T22875] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 583.410607][T22875] 22:39:10 executing program 5: r0 = socket$l2tp6(0xa, 0x2, 0x73) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$mptcp(&(0x7f0000000780), 0xffffffffffffffff) syz_genetlink_get_family_id$batadv(&(0x7f0000000880), r1) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r2, &(0x7f0000000dc0)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000d80)={&(0x7f0000000d00)={0x14}, 0x14}}, 0x0) [ 583.473183][T22875] ERROR: (device loop0): remounting filesystem as read-only [ 583.536976][T22875] xtLookup: xtSearch returned -5 [ 583.569517][T22875] read_mapping_page failed! [ 583.605606][T22875] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 583.659494][T22875] Mount JFS Failure: -5 [ 583.693063][T22875] jfs_mount failed w/return code = -5 22:39:10 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x74000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000280)="10c4645f01000000010000000100004e36049b", 0x13, 0xb206}], 0x0, &(0x7f0000000080)={[{@nointegrity}]}) 22:39:10 executing program 3: syz_emit_ethernet(0x9a, &(0x7f0000000040)={@multicast, @multicast, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, "1369e8", 0x3, 0x2f, 0x0, @local, @local, {[], {0x0, 0x0, 0x64, 0x0, @wg=@response={0x2, 0x0, 0x0, "03a7e8af0153797d7a61c55cfc7fb4ac04880f12ab898cabf34c4f7361725a26", "ff096f1646094cc92af4a342ddeb771d", {"3f4b347e0f90afd693c19d998d8e45b3", "8446d89269e93c07057b83fb9487f53f"}}}}}}}}, 0x0) 22:39:10 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {0x17, 0x0, 0xa}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:39:10 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, 0x0, 0x0) 22:39:10 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000002ec0), r0) 22:39:10 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0xa867, 0x1b00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:39:10 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_buf(r0, 0x29, 0x14, 0x0, 0x0) 22:39:10 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x0, 0x0, &(0x7f0000000300)) 22:39:10 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {0x17, 0x0, 0xb}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 584.144759][T22921] loop0: detected capacity change from 0 to 264192 22:39:10 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_PMKSA(r0, &(0x7f0000000780)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000740)={0x0}}, 0x0) [ 584.219670][T22921] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 584.219670][T22921] [ 584.301610][T22921] ERROR: (device loop0): remounting filesystem as read-only [ 584.328837][T22921] xtLookup: xtSearch returned -5 [ 584.349700][T22921] read_mapping_page failed! [ 584.365119][T22921] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 584.394405][T22921] Mount JFS Failure: -5 22:39:11 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000ac0)={0x1b, 0x0, 0x0, 0x0, 0x1400}, 0x40) [ 584.415850][T22921] jfs_mount failed w/return code = -5 22:39:11 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {0x17, 0x0, 0xf}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 584.529300][T22921] loop0: detected capacity change from 0 to 264192 [ 584.565323][T22921] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 584.565323][T22921] [ 584.633025][T22921] ERROR: (device loop0): remounting filesystem as read-only [ 584.702753][T22921] xtLookup: xtSearch returned -5 [ 584.756074][T22921] read_mapping_page failed! [ 584.808452][T22921] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 584.860435][T22921] Mount JFS Failure: -5 [ 584.898079][T22921] jfs_mount failed w/return code = -5 22:39:11 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x7a000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000280)="10c4645f01000000010000000100004e36049b", 0x13, 0xb206}], 0x0, &(0x7f0000000080)={[{@nointegrity}]}) 22:39:11 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r0, 0x29, 0x37, &(0x7f00000006c0), 0x8) 22:39:11 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_PMKSA(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={0x0}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000800), r0) 22:39:11 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f00000002c0)={'wpan4\x00'}) 22:39:11 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {0x17, 0x0, 0x10}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:39:11 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0xa867, 0x1c00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:39:11 executing program 5: sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x50, 0x0, 0x2, 0x70bd29, 0x25dfdbfd, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x3}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e24}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x7f}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x5}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e20}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x20044800}, 0x40001) r0 = socket(0x1, 0x2, 0x81) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x34, 0x0, 0x2, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x5d}, @L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x54}, 0x40) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x400, 0x70bd25, 0x25dfdbfe, {}, [@L2TP_ATTR_MTU={0x6, 0x1c, 0x1}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x3}, @L2TP_ATTR_FD={0x8, 0x17, @udp=r0}]}, 0x4c}, 0x1, 0x0, 0x0, 0x48010}, 0x80) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x28, 0x0, 0x1, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IP6_DADDR={0x14, 0x20, @loopback}]}, 0x28}, 0x1, 0x0, 0x0, 0x40040}, 0x4001) r1 = socket$can_j1939(0x1d, 0x2, 0x7) r2 = accept4(r1, &(0x7f0000000480)=@ethernet={0x0, @random}, &(0x7f0000000500)=0x80, 0x80000) sendto$llc(r0, &(0x7f0000000540)="f1b98cd0d321956900ea73c20a0d13788ba9519e1237a5c911ad3107af", 0x1d, 0x10, 0x0, 0x0) r3 = socket$l2tp6(0xa, 0x2, 0x73) ioctl$BTRFS_IOC_START_SYNC(r3, 0x80089418, &(0x7f0000000580)) syz_genetlink_get_family_id$mptcp(&(0x7f0000000780), r2) 22:39:11 executing program 3: openat$tun(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 22:39:11 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {0x17, 0x0, 0x11}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 585.353534][T22965] loop0: detected capacity change from 0 to 264192 22:39:12 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, 0x0) [ 585.479360][T22965] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 585.479360][T22965] [ 585.546576][T22965] ERROR: (device loop0): remounting filesystem as read-only [ 585.621785][T22965] xtLookup: xtSearch returned -5 [ 585.667892][T22965] read_mapping_page failed! [ 585.710286][T22965] jfs_mount: diMount(ipaimap) failed w/rc = -5 22:39:12 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8912, &(0x7f0000000000)={'wlan1\x00'}) [ 585.771123][T22965] Mount JFS Failure: -5 22:39:12 executing program 5: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r0, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r1, {0x2, 0x0, @broadcast}, 0x2}}, 0x2e) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}], 0x400000000000085, 0x0) [ 585.844701][T22965] jfs_mount failed w/return code = -5 [ 585.954328][T22965] loop0: detected capacity change from 0 to 264192 [ 585.989305][T22965] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 585.989305][T22965] [ 586.038863][T22965] ERROR: (device loop0): remounting filesystem as read-only [ 586.087311][T22965] xtLookup: xtSearch returned -5 [ 586.099847][T22965] read_mapping_page failed! [ 586.109150][T22965] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 586.125694][T22965] Mount JFS Failure: -5 [ 586.129891][T22965] jfs_mount failed w/return code = -5 22:39:12 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8cffffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000280)="10c4645f01000000010000000100004e36049b", 0x13, 0xb206}], 0x0, &(0x7f0000000080)={[{@nointegrity}]}) 22:39:12 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {0x17, 0x0, 0xf0}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) 22:39:12 executing program 4: pipe(&(0x7f0000001540)) 22:39:12 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=@newpolicy={0xb8, 0x26, 0x1, 0x0, 0x0, {{@in6=@remote, @in6=@private1}}}, 0xb8}}, 0x0) 22:39:12 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0xa867, 0x1d00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:39:12 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCSETS2(r0, 0x5412, &(0x7f00000000c0)={0x12, 0x0, 0x0, 0x0, 0x0, "62000000000000e66aec4f00"}) [ 586.359734][T22998] netlink: 164 bytes leftover after parsing attributes in process `syz-executor.3'. 22:39:13 executing program 4: r0 = epoll_create1(0x0) epoll_wait(r0, &(0x7f0000000100)=[{}], 0x1, 0xeb0c) r1 = io_uring_setup(0x3a0b, &(0x7f0000000040)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)={0x90000014}) [ 586.419746][T22998] ================================================================================ 22:39:13 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {0x17, 0x0, 0x300}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 586.502783][T22998] UBSAN: shift-out-of-bounds in net/xfrm/xfrm_user.c:1969:18 [ 586.528985][T23009] loop0: detected capacity change from 0 to 264192 [ 586.560636][T22998] shift exponent 254 is too large for 32-bit type 'int' [ 586.602606][T22998] CPU: 0 PID: 22998 Comm: syz-executor.3 Not tainted 5.14.0-rc3-next-20210730-syzkaller #0 [ 586.612804][T22998] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 586.622881][T22998] Call Trace: [ 586.626518][T22998] dump_stack_lvl+0xcd/0x134 [ 586.631142][T22998] ubsan_epilogue+0xb/0x5a [ 586.635577][T22998] __ubsan_handle_shift_out_of_bounds.cold+0xb1/0x181 [ 586.642371][T22998] ? audit_update_watch+0x4b1/0x1280 [ 586.647687][T22998] ? security_capable+0x8f/0xc0 [ 586.652761][T22998] xfrm_set_default.cold+0x21/0x102 [ 586.658111][T22998] ? xfrm_netlink_rcv+0x90/0x90 [ 586.663045][T22998] xfrm_user_rcv_msg+0x430/0xa20 [ 586.668012][T22998] ? xfrm_do_migrate+0x7f0/0x7f0 [ 586.672978][T22998] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 586.678976][T22998] ? find_held_lock+0x2d/0x110 [ 586.684154][T22998] ? __mutex_lock+0x21c/0x1300 [ 586.689050][T22998] netlink_rcv_skb+0x153/0x420 [ 586.694078][T22998] ? xfrm_do_migrate+0x7f0/0x7f0 [ 586.699040][T22998] ? netlink_ack+0xa60/0xa60 [ 586.703931][T22998] xfrm_netlink_rcv+0x6b/0x90 [ 586.708625][T22998] netlink_unicast+0x533/0x7d0 [ 586.714061][T22998] ? netlink_attachskb+0x890/0x890 [ 586.719299][T22998] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 586.725753][T22998] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 586.733326][T22998] ? __phys_addr_symbol+0x2c/0x70 [ 586.738478][T22998] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 586.744218][T22998] ? __check_object_size+0x16e/0x3f0 [ 586.749539][T22998] netlink_sendmsg+0x86d/0xdb0 [ 586.754422][T22998] ? netlink_unicast+0x7d0/0x7d0 [ 586.759435][T22998] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 586.765703][T22998] ? netlink_unicast+0x7d0/0x7d0 [ 586.770668][T22998] sock_sendmsg+0xcf/0x120 [ 586.775108][T22998] ____sys_sendmsg+0x6e8/0x810 [ 586.779898][T22998] ? kernel_sendmsg+0x50/0x50 [ 586.785027][T22998] ? do_recvmmsg+0x6d0/0x6d0 [ 586.789648][T22998] ? lock_chain_count+0x20/0x20 [ 586.794611][T22998] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 586.800759][T22998] ___sys_sendmsg+0xf3/0x170 [ 586.805469][T22998] ? sendmsg_copy_msghdr+0x160/0x160 [ 586.810782][T22998] ? __fget_files+0x21b/0x3e0 [ 586.815485][T22998] ? lock_downgrade+0x6e0/0x6e0 [ 586.820370][T22998] ? __fget_files+0x23d/0x3e0 [ 586.825088][T22998] ? __fget_light+0xea/0x280 [ 586.829698][T22998] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 586.835961][T22998] __sys_sendmsg+0xe5/0x1b0 [ 586.840485][T22998] ? __sys_sendmsg_sock+0x30/0x30 [ 586.845573][T22998] ? syscall_enter_from_user_mode+0x21/0x70 [ 586.851514][T22998] do_syscall_64+0x35/0xb0 [ 586.855955][T22998] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 586.861964][T22998] RIP: 0033:0x4665e9 [ 586.865897][T22998] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 586.885524][T22998] RSP: 002b:00007fa34bfc5188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 586.893962][T22998] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 586.901994][T22998] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 586.909984][T22998] RBP: 00000000004bfcc4 R08: 0000000000000000 R09: 0000000000000000 [ 586.918058][T22998] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf80 [ 586.926101][T22998] R13: 00007ffc9e494d9f R14: 00007fa34bfc5300 R15: 0000000000022000 22:39:13 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_tcp_buf(r0, 0x11, 0x0, 0x0, 0x0) [ 586.991828][T23009] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 586.991828][T23009] [ 587.038864][T23009] ERROR: (device loop0): remounting filesystem as read-only 22:39:13 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=@newpolicy={0xb8, 0x2, 0x0, 0x0, 0x0, {{@in6=@remote, @in6=@private1}}}, 0xc0}}, 0x0) [ 587.084121][T23009] xtLookup: xtSearch returned -5 [ 587.103469][T23009] read_mapping_page failed! 22:39:13 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {0x17, 0x0, 0x4ae}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 587.128696][T23009] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 587.161314][T23009] Mount JFS Failure: -5 [ 587.196466][T23009] jfs_mount failed w/return code = -5 22:39:13 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=@newpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0x1}}}, 0xb8}}, 0x0) [ 587.285328][T23009] loop0: detected capacity change from 0 to 264192 [ 587.337847][T23009] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 587.337847][T23009] [ 587.355227][T23009] ERROR: (device loop0): remounting filesystem as read-only [ 587.364949][T23009] xtLookup: xtSearch returned -5 [ 587.378739][T23009] read_mapping_page failed! [ 587.398527][T23009] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 587.440559][T23009] Mount JFS Failure: -5 [ 587.468647][T23009] jfs_mount failed w/return code = -5 22:39:14 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x9b000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000280)="10c4645f01000000010000000100004e36049b", 0x13, 0xb206}], 0x0, &(0x7f0000000080)={[{@nointegrity}]}) 22:39:14 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0xa867, 0x1e00000000000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:39:14 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {0x17, 0x0, 0x500}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x34, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x14, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "23aae5ed08cdf5081c8afab45763817b"}]}]}, 0x54}}, 0x0) [ 587.512953][T23036] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. [ 587.858775][T23047] loop0: detected capacity change from 0 to 264192 [ 587.913501][T23047] ERROR: (device loop0): xtSearch: XT_GETPAGE: xtree page corrupt [ 587.913501][T23047] [ 587.931287][T22998] ================================================================================ [ 587.940873][T22998] Kernel panic - not syncing: panic_on_warn set ... [ 587.947475][T22998] CPU: 1 PID: 22998 Comm: syz-executor.3 Not tainted 5.14.0-rc3-next-20210730-syzkaller #0 [ 587.957469][T22998] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 587.967541][T22998] Call Trace: [ 587.970835][T22998] dump_stack_lvl+0xcd/0x134 [ 587.975455][T22998] panic+0x2b0/0x6dd [ 587.979411][T22998] ? __warn_printk+0xf3/0xf3 [ 587.984031][T22998] ? dump_stack_lvl+0x120/0x134 [ 587.988909][T22998] ? ubsan_epilogue+0x3e/0x5a [ 587.993614][T22998] ubsan_epilogue+0x54/0x5a [ 587.995852][T23047] ERROR: (device loop0): remounting filesystem as read-only [ 587.998133][T22998] __ubsan_handle_shift_out_of_bounds.cold+0xb1/0x181 [ 588.012223][T22998] ? audit_update_watch+0x4b1/0x1280 [ 588.017916][T22998] ? security_capable+0x8f/0xc0 [ 588.022896][T22998] xfrm_set_default.cold+0x21/0x102 [ 588.028245][T22998] ? xfrm_netlink_rcv+0x90/0x90 [ 588.033214][T22998] xfrm_user_rcv_msg+0x430/0xa20 [ 588.039198][T22998] ? xfrm_do_migrate+0x7f0/0x7f0 [ 588.044552][T22998] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 588.050574][T22998] ? find_held_lock+0x2d/0x110 [ 588.055842][T22998] ? __mutex_lock+0x21c/0x1300 [ 588.060642][T22998] netlink_rcv_skb+0x153/0x420 [ 588.065536][T22998] ? xfrm_do_migrate+0x7f0/0x7f0 [ 588.070498][T22998] ? netlink_ack+0xa60/0xa60 [ 588.075131][T22998] xfrm_netlink_rcv+0x6b/0x90 [ 588.079948][T22998] netlink_unicast+0x533/0x7d0 [ 588.084749][T22998] ? netlink_attachskb+0x890/0x890 [ 588.085301][T23047] xtLookup: xtSearch returned -5 [ 588.089880][T22998] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 588.089917][T22998] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 588.089945][T22998] ? __phys_addr_symbol+0x2c/0x70 [ 588.112460][T22998] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 588.118290][T22998] ? __check_object_size+0x16e/0x3f0 [ 588.123784][T22998] netlink_sendmsg+0x86d/0xdb0 [ 588.128933][T22998] ? netlink_unicast+0x7d0/0x7d0 [ 588.134035][T22998] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 588.141271][T22998] ? netlink_unicast+0x7d0/0x7d0 [ 588.146582][T22998] sock_sendmsg+0xcf/0x120 [ 588.151130][T22998] ____sys_sendmsg+0x6e8/0x810 [ 588.155936][T22998] ? kernel_sendmsg+0x50/0x50 [ 588.160909][T22998] ? do_recvmmsg+0x6d0/0x6d0 [ 588.165789][T22998] ? lock_chain_count+0x20/0x20 [ 588.171029][T22998] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 588.177319][T22998] ___sys_sendmsg+0xf3/0x170 [ 588.182117][T22998] ? sendmsg_copy_msghdr+0x160/0x160 [ 588.187738][T22998] ? __fget_files+0x21b/0x3e0 [ 588.191368][T23047] read_mapping_page failed! [ 588.192618][T22998] ? lock_downgrade+0x6e0/0x6e0 [ 588.192666][T22998] ? __fget_files+0x23d/0x3e0 [ 588.207124][T22998] ? __fget_light+0xea/0x280 [ 588.211777][T22998] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 588.214057][T23047] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 588.218365][T22998] __sys_sendmsg+0xe5/0x1b0 [ 588.218402][T22998] ? __sys_sendmsg_sock+0x30/0x30 [ 588.218446][T22998] ? syscall_enter_from_user_mode+0x21/0x70 [ 588.240851][T22998] do_syscall_64+0x35/0xb0 [ 588.245300][T22998] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 588.251944][T22998] RIP: 0033:0x4665e9 [ 588.256151][T22998] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 588.275872][T22998] RSP: 002b:00007fa34bfc5188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 588.276854][T23047] Mount JFS Failure: -5 [ 588.284415][T22998] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 588.284435][T22998] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 588.284452][T22998] RBP: 00000000004bfcc4 R08: 0000000000000000 R09: 0000000000000000 [ 588.284468][T22998] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf80 [ 588.284483][T22998] R13: 00007ffc9e494d9f R14: 00007fa34bfc5300 R15: 0000000000022000 [ 588.290114][T22998] Kernel Offset: disabled [ 588.334666][T22998] Rebooting in 86400 seconds..