0040)={0x24, 0x4, 0x8, 0x101, 0x0, 0x0, {}, [@CTA_TIMEOUT_L3PROTO={0x6}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x3a}]}, 0x24}}, 0x0) 17:03:35 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xfffffffffffffe51, &(0x7f0000000080)={&(0x7f0000000040)={0x14}, 0x14}}, 0x0) 17:03:35 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000230c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:03:36 executing program 5: socketpair(0x0, 0x400, 0x0, 0x0) 17:03:36 executing program 3: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vim2m\x00', 0x2, 0x0) ioctl$vim2m_VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000200)={0x0, 0x2, 0x4, 0x0, 0x0, {0x77359400}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "be4719c7"}, 0x0, 0x1, @userptr}) 17:03:36 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DESTROY(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x3, 0x6, 0xedbf609cfdcc44a9, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 17:03:36 executing program 2: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vim2m\x00', 0x2, 0x0) ioctl$vim2m_VIDIOC_DQBUF(r0, 0xc050565d, 0x0) 17:03:36 executing program 3: perf_event_open(&(0x7f0000002200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffe0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:03:36 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f00000000c0)={0x14}, 0xc0}}, 0x0) 17:03:36 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010003f0c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:03:36 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_LIST(r0, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={0x0}}, 0x0) syz_genetlink_get_family_id$nl802154(&(0x7f0000001700)='nl802154\x00', r0) 17:03:36 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000001640)={0x0, 0x0, 0x0, 0xffffff1f}, 0x0) 17:03:36 executing program 0: syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) 17:03:36 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0xfffffffffffffc20, 0x2}, 0x10) listen(r0, 0xe9) r1 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r1, &(0x7f0000000000)={0x10, 0x2}, 0x10) shutdown(r1, 0x1) 17:03:36 executing program 3: mbind(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x0, &(0x7f0000000280)=0x6, 0x9, 0x0) 17:03:36 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) ioctl$BLKRRPART(r0, 0x125f, 0x0) syz_open_dev$ptys(0xc, 0x3, 0x0) 17:03:36 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 17:03:36 executing program 3: syz_open_procfs$namespace(0x0, 0x0) mlock(&(0x7f0000ffb000/0x2000)=nil, 0x2000) 17:03:36 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000400c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:03:36 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000440)=@newqdisc={0x34, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_codel={{0xa, 0x1, 'codel\x00'}, {0x4}}]}, 0x34}}, 0x0) 17:03:36 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f00000000c0)={0x14, 0x0, 0x5, 0x801}, 0x14}}, 0x0) 17:03:36 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x9, 0x0, &(0x7f0000000140)=0x9b) 17:03:36 executing program 2: mlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) 17:03:36 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000040)={0x0, @hci, @nfc, @ipx={0x4, 0x0, 0x0, "1d522220021e", 0x6}}) 17:03:36 executing program 5: syz_genetlink_get_family_id$ieee802154(&(0x7f0000000040)='802.15.4 MAC\x00', 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_GETPARAMS(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000400)='802.15.4 MAC\x00', r0) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(r1, &(0x7f00000004c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14}, 0x14}}, 0x0) 17:03:36 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_TX_POWER(r0, 0x0, 0x0) 17:03:36 executing program 1: socketpair(0x18, 0x0, 0x6cb, &(0x7f0000000000)) 17:03:36 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000480c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:03:36 executing program 3: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/time_for_children\x00') ioctl$NS_GET_PARENT(r0, 0x2, 0x0) 17:03:36 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x2a) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x18) accept4(r1, &(0x7f0000000040)=@tipc=@id, 0x0, 0x0) 17:03:36 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000180)='mptcp_pm\x00', 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x14, r1, 0x1}, 0x14}}, 0x0) 17:03:36 executing program 5: r0 = gettid() ptrace$setregs(0xffffffffffffffff, r0, 0x0, 0x0) 17:03:37 executing program 0: syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000001700)='nl802154\x00', 0xffffffffffffffff) sendmsg$NL802154_CMD_DEL_SEC_KEY(r0, &(0x7f00000017c0)={&(0x7f00000016c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001780)={0x0}}, 0x0) 17:03:37 executing program 1: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vim2m\x00', 0x2, 0x0) ioctl$vim2m_VIDIOC_DQBUF(r0, 0xc0585611, &(0x7f0000000180)={0x0, 0x6, 0x4, 0x0, 0x0, {0x0, 0xea60}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "fd15a5c9"}, 0x0, 0x0, @planes=0x0}) 17:03:37 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x2c, 0x2, 0x9, 0x3, 0x0, 0x0, {}, [@NFCTH_TUPLE={0x18, 0x2, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8}}}]}]}, 0x2c}}, 0x0) 17:03:37 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010004c0c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:03:37 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x2a) 17:03:37 executing program 5: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/time_for_children\x00') ioctl$NS_GET_PARENT(r0, 0xb703, 0x0) [ 1211.944569] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 17:03:37 executing program 3: shmat(0x0, &(0x7f0000ffc000/0x2000)=nil, 0x1000) mmap$usbfs(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000001ac0)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000001b00)={r0, r1+60000000}) r2 = syz_mount_image$minix(&(0x7f0000002940)='minix\x00', &(0x7f0000002980)='./file0\x00', 0x5, 0x6, &(0x7f0000004cc0)=[{&(0x7f00000029c0), 0x0, 0x8}, {&(0x7f0000002a80)="5b94963b293a1dd3a1a2e8fdbfbe7350dab55089aa642774fe2d6bb99e5b3015a1", 0x21, 0xc271}, {&(0x7f0000002b00), 0x0, 0x8}, {&(0x7f0000002c40)="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", 0x385, 0xfffffffffffffffb}, {&(0x7f0000003c40)}, {&(0x7f0000004c40), 0x0, 0x6}], 0x2008041, &(0x7f0000004d80)={[{'\\'}, {'!+\x05'}, {'smackfshat'}, {'\'-'}], [{@dont_appraise='dont_appraise'}, {@fsmagic={'fsmagic', 0x3d, 0xfcd}}, {@obj_role={'obj_role', 0x3d, ',{){}'}}, {@func={'func', 0x3d, 'MMAP_CHECK'}}, {@dont_appraise='dont_appraise'}]}) linkat(0xffffffffffffffff, 0x0, r2, &(0x7f0000004e00)='./file0\x00', 0x200) 17:03:37 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000001500)='/dev/usbmon#\x00', 0x0, 0x20001) read$usbmon(r0, 0x0, 0x0) 17:03:37 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x2a) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) 17:03:37 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000600c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:03:37 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@local, @in6=@mcast2}, {@in6=@empty, 0x0, 0x32}, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 17:03:37 executing program 2: renameat2(0xffffffffffffff9c, 0x0, 0xffffffffffffffff, &(0x7f0000000940)='./file0\x00', 0x0) 17:03:37 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0x0, 0x1}, 0x6) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r1, r0) 17:03:37 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x7c, 0x0, &(0x7f0000000a80)) 17:03:37 executing program 3: clock_gettime(0x0, &(0x7f0000001ac0)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000001b00)={0x0, r0+60000000}) get_mempolicy(&(0x7f00000022c0), 0x0, 0x0, &(0x7f0000ffc000/0x1000)=nil, 0x2) syz_open_dev$usbfs(0x0, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) 17:03:37 executing program 5: r0 = syz_open_dev$vim2m(&(0x7f0000000040)='/dev/video#\x00', 0x1000000, 0x2) ioctl$vim2m_VIDIOC_DQBUF(r0, 0xc0585611, &(0x7f0000000080)={0x0, 0x1, 0x4, 0x0, 0x0, {0x0, 0xea60}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "5be1c44a"}}) 17:03:37 executing program 3: move_pages(0x0, 0x2, &(0x7f0000000000)=[&(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ff9000/0x1000)=nil], 0x0, &(0x7f0000000080), 0x0) 17:03:37 executing program 2: r0 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00', 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_GET(r1, &(0x7f0000000040)={0x0, 0x77, &(0x7f0000000380)={&(0x7f0000000100)={0x11, r0, 0x31e57e4b66112e23, 0x0, 0x0, {}, [@TIPC_NLA_SOCK={0x0, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_ADDR, @TIPC_NLA_SOCK_ADDR, @TIPC_NLA_SOCK_HAS_PUBL, @TIPC_NLA_SOCK_REF, @TIPC_NLA_SOCK_REF, @TIPC_NLA_SOCK_ADDR, @TIPC_NLA_SOCK_REF]}, @TIPC_NLA_NET={0x0, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1]}]}, 0x14}}, 0x0) 17:03:37 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000680c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:03:37 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) bind$packet(r0, 0x0, 0x0) 17:03:37 executing program 1: r0 = gettid() rt_sigqueueinfo(r0, 0x11, &(0x7f0000002440)={0x0, 0x0, 0xb3}) 17:03:37 executing program 0: socketpair(0x2b, 0x0, 0x0, &(0x7f00000000c0)) 17:03:37 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffffe}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x700, 0xe, 0x0, &(0x7f0000000380)="e460cdfbef2408000008019305dd", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 17:03:37 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000002700)={0x0, 0x0, &(0x7f00000026c0)={&(0x7f0000002080)={0x18, 0x10, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x4}, [@generic='L']}, 0x18}}, 0x0) 17:03:37 executing program 2: setgroups(0x0, 0x0) getgroups(0x1, &(0x7f0000000000)=[0x0]) 17:03:37 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f00000000c0)={0x14, 0x0, 0x1, 0x801}, 0x14}}, 0x0) 17:03:38 executing program 3: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/time_for_children\x00') ioctl$NS_GET_OWNER_UID(r0, 0xb704, 0x0) 17:03:38 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x20, 0x1, 0x8, 0x101, 0x0, 0x0, {}, [@CTA_TIMEOUT_DATA={0xc, 0x4, 0x0, 0x1, @tcp=[@CTA_TIMEOUT_TCP_FIN_WAIT={0x8}]}]}, 0x20}}, 0x0) [ 1212.795283] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 17:03:38 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010006c0c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:03:38 executing program 2: socketpair(0x2b, 0x1, 0x0, &(0x7f0000000080)) 17:03:38 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000001700)={0x0, 0x0, &(0x7f00000016c0)={&(0x7f0000001740)=ANY=[@ANYBLOB], 0x164c}}, 0x0) 17:03:38 executing program 5: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vim2m\x00', 0x2, 0x0) ioctl$vim2m_VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000040)={0x0, 0x1, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "1414b9dd"}, 0x0, 0x0, @fd}) 17:03:38 executing program 3: sigaltstack(&(0x7f0000ffd000/0x1000)=nil, 0x0) keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f00000001c0)=""/48, 0x30) 17:03:38 executing program 1: r0 = gettid() rt_sigqueueinfo(r0, 0x41, &(0x7f0000000000)) 17:03:38 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000780)={0x0, 0x0, 0x0}, 0x0) 17:03:38 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000880)={0x26, 'aead\x00', 0x0, 0x0, 'ccm(serpent)\x00'}, 0x58) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx\x00'}, 0x58) 17:03:38 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCDELRT(r0, 0x890c, 0x0) 17:03:38 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={0x0}, 0x1, 0x0, 0xf0}, 0x0) 17:03:38 executing program 0: openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x400, 0x0) 17:03:38 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000080)={0x98ff, 0x800, 0x4}) 17:03:38 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000740c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:03:38 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x2c, 0x2, 0x9, 0x3, 0x0, 0x0, {}, [@NFCTH_TUPLE={0x18, 0x2, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8}}}]}]}, 0x2c}}, 0x0) 17:03:38 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) recvmmsg(r1, &(0x7f0000002440), 0x3ffffff00000164, 0x0, 0x0) 17:03:38 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f00000000c0)={0x14, 0x0, 0x3, 0x801}, 0x14}}, 0x0) 17:03:38 executing program 0: socketpair(0x1, 0x0, 0x42, &(0x7f0000000040)) [ 1213.440695] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 17:03:38 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010007a0c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:03:38 executing program 3: getsockopt$TIPC_NODE_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x83, 0x0, 0x0) 17:03:38 executing program 2: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vim2m\x00', 0x2, 0x0) ioctl$vim2m_VIDIOC_DQBUF(r0, 0xc0d05605, &(0x7f0000000180)={0x0, 0x0, 0x4, 0x0, 0x0, {0x0, 0xea60}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "fd15a5c9"}, 0x0, 0x0, @planes=0x0}) 17:03:38 executing program 3: sched_setscheduler(0x0, 0x2, &(0x7f0000000040)=0x2) 17:03:38 executing program 5: move_pages(0x0, 0x1, &(0x7f0000000000)=[&(0x7f0000ff9000/0x1000)=nil], &(0x7f0000000040), 0x0, 0x0) 17:03:38 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000001140)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000011c0)={0x0}) 17:03:38 executing program 0: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vim2m\x00', 0x2, 0x0) ioctl$vim2m_VIDIOC_DQBUF(r0, 0xc0585611, &(0x7f0000000180)={0x0, 0x3, 0x4, 0x0, 0x0, {0x0, 0xea60}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "fd15a5c9"}, 0x0, 0x0, @planes=0x0}) 17:03:38 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/net/tun\x00', 0x0, 0x0) 17:03:39 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000400)='/dev/autofs\x00', 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000580)='l2tp\x00', r0) 17:03:39 executing program 2: syz_genetlink_get_family_id$nl802154(&(0x7f0000000040)='nl802154\x00', 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000440)='nl802154\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, 0x0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) sendmsg$NL802154_CMD_GET_SEC_DEV(r0, &(0x7f00000005c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x800240}, 0xc, &(0x7f0000000580)={&(0x7f0000000500)={0x6c, r1, 0x100, 0x1, 0x25dfdbfc, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x6c}, 0x1, 0x0, 0x0, 0x80}, 0x4000000) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000640)={'wpan1\x00'}) sendmsg$NL802154_CMD_SET_TX_POWER(r0, &(0x7f0000000a80)={&(0x7f00000009c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000a40)={&(0x7f0000000a00)={0x34, r1, 0x21, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}, @NL802154_ATTR_TX_POWER={0x8}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x40000}, 0x20000000) 17:03:39 executing program 5: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/time_for_children\x00') ioctl$NS_GET_PARENT(r0, 0x5452, 0x0) 17:03:39 executing program 3: sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, &(0x7f00000011c0)={0x0, 0x0, 0x0}, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) socketpair(0x27, 0x0, 0x0, &(0x7f0000001b80)) 17:03:39 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000c80c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:03:39 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_int(r0, 0x11, 0x1, &(0x7f00000011c0), 0x4) 17:03:39 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_MSCBIT(r0, 0x40045568, 0x0) 17:03:39 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={0x0}, 0x1, 0x0, 0x2}, 0x0) 17:03:39 executing program 2: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vim2m\x00', 0x2, 0x0) ioctl$vim2m_VIDIOC_DQBUF(r0, 0x4020940d, &(0x7f0000000180)={0x0, 0x0, 0x4, 0x0, 0x0, {0x0, 0xea60}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "fd15a5c9"}, 0x0, 0x0, @planes=0x0}) 17:03:39 executing program 1: perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:03:39 executing program 5: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vim2m\x00', 0x2, 0x0) ioctl$vim2m_VIDIOC_DQBUF(r0, 0x400448c9, &(0x7f0000000180)={0x0, 0x0, 0x4, 0x0, 0x0, {0x0, 0xea60}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "fd15a5c9"}, 0x0, 0x0, @planes=0x0}) 17:03:39 executing program 3: r0 = gettid() rt_sigqueueinfo(r0, 0x0, &(0x7f0000002140)={0x0, 0x0, 0x7}) 17:03:39 executing program 2: prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000000c0)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000000000/0x4000)=nil, 0x0}, 0x68) 17:03:39 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000640)='/dev/usbmon#\x00', 0x0, 0x40800) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000006c0)={0x0}) 17:03:39 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000000000100fff0c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:03:39 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000000c0)=[{&(0x7f0000010000)="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", 0x2f0}, {0x0, 0x0, 0xfffffffffffffffd}], 0x0, &(0x7f0000000080)) 17:03:40 executing program 3: syz_open_dev$usbfs(&(0x7f0000002600)='/dev/bus/usb/00#/00#\x00', 0x2, 0x0) 17:03:40 executing program 2: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vim2m\x00', 0x2, 0x0) ioctl$vim2m_VIDIOC_DQBUF(r0, 0x5421, &(0x7f0000000180)={0x0, 0x0, 0x4, 0x0, 0x0, {0x0, 0xea60}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "fd15a5c9"}, 0x0, 0x0, @planes=0x0}) 17:03:40 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/time_for_children\x00') ioctl$NS_GET_PARENT(r0, 0x5451, 0x0) 17:03:40 executing program 1: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/time_for_children\x00') ioctl$NS_GET_PARENT(r0, 0xc0189436, 0x0) 17:03:40 executing program 5: r0 = fork() move_pages(r0, 0x2, &(0x7f0000000000)=[&(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ff9000/0x1000)=nil], &(0x7f0000000040), &(0x7f0000000080), 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x8) mlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) ioctl$DRM_IOCTL_ADD_MAP(0xffffffffffffffff, 0xc0286415, &(0x7f0000000300)={&(0x7f0000ffd000/0x3000)=nil, 0xffff, 0x1}) fork() 17:03:40 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000000", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:03:40 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000000c0)=[{&(0x7f0000010000)="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", 0x2f0}, {0x0, 0x0, 0xfffffffffffffffd}], 0x0, &(0x7f0000000080)) r2 = openat(r1, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat(r2, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$F2FS_IOC_GET_COMPRESS_BLOCKS(0xffffffffffffffff, 0x8008f511, 0x0) 17:03:40 executing program 3: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/time_for_children\x00') ioctl$NS_GET_PARENT(r0, 0x2, 0x400000) 17:03:40 executing program 3: r0 = openat$6lowpan_enable(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/kernel/debug/bluetooth/6lowpan_enable\x00', 0x2, 0x0) write$6lowpan_enable(r0, &(0x7f0000000100)='1', 0x1) 17:03:40 executing program 0: mount$9p_fd(0x0, &(0x7f0000002340)='./file0\x00', &(0x7f0000002380)='9p\x00', 0x0, &(0x7f00000023c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}}) 17:03:40 executing program 2: perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:03:40 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000001640)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000001600)={&(0x7f00000000c0)={0xec4, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic="063b02c2a120a4c4dd02cebd3e53e5887dc9d62bae63f5571f4990f9c9603a8559e7e6988382cc106a153d85c2bc1818a6", @nested={0xe79, 0x0, 0x0, 0x1, [@generic="8731be20d52753ac908651494169555fd1a77af009a5e231717dbd9da678ece1439e38e885fcd92e9991", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="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"]}]}, 0xec4}}, 0x0) 17:03:40 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x1, 0x9, 0x101}, 0x14}}, 0x0) 17:03:40 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000080)='nbd\x00', r0) 17:03:40 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000000", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:03:40 executing program 0: mbind(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) 17:03:40 executing program 5: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vim2m\x00', 0x2, 0x0) ioctl$vim2m_VIDIOC_DQBUF(r0, 0xc0585611, &(0x7f0000000180)={0x0, 0xa, 0x4, 0x0, 0x0, {0x0, 0xea60}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "fd15a5c9"}, 0x0, 0x0, @planes=0x0}) 17:03:40 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0x0, 0x1}, 0x6) write$binfmt_misc(r0, &(0x7f0000000040)={'syz1'}, 0x4) 17:03:40 executing program 2: syz_genetlink_get_family_id$ieee802154(&(0x7f0000000040)='802.15.4 MAC\x00', 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000740)={'wpan1\x00'}) 17:03:40 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x8, &(0x7f00000001c0)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}, @initr0, @map_val]}, &(0x7f0000000200)='GPL\x00', 0x17f, 0x54, &(0x7f0000000680)=""/84, 0x41100, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000640), 0x8, 0x10, 0x0}, 0x78) 17:03:40 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000001140)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000011c0)={0x0, 0x0, 0x5e6e3cc6}) 17:03:40 executing program 0: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dlm-monitor\x00', 0x0, 0x0) ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, 0x0) 17:03:40 executing program 5: select(0x40, &(0x7f0000000080)={0xfffffffffffffffa}, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x77359400}) 17:03:40 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000200", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:03:40 executing program 1: r0 = gettid() perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0b, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 17:03:40 executing program 2: r0 = syz_open_dev$vim2m(&(0x7f0000002140)='/dev/video#\x00', 0x6, 0x2) ioctl$vim2m_VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000002180)={0x0, 0x0, 0x4, 0x0, 0x0, {0x0, 0xea60}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "685eb59b"}, 0x0, 0x0, @userptr}) 17:03:40 executing program 0: perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0xa}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:03:41 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCH_MFLUSH(r0, 0x9208, 0x4) 17:03:41 executing program 1: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/time_for_children\x00') ioctl$NS_GET_PARENT(r0, 0x4020940d, 0x0) 17:03:41 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000), 0x6) ioctl$sock_bt_hci(r0, 0x800448d7, &(0x7f00000000c0)) 17:03:41 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000020c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:03:41 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'ipvlan1\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={@private1, 0x0, r2}) 17:03:41 executing program 3: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vcsu\x00', 0x0, 0x0) ioctl$vim2m_VIDIOC_DQBUF(r0, 0x541b, 0x0) 17:03:41 executing program 5: perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:03:41 executing program 1: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self\x00', 0x20800, 0x0) 17:03:41 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'ansi_cprng\x00'}, 0x58) 17:03:41 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_TX_POWER(r0, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000a40)={&(0x7f0000000a00)={0x14, 0x0, 0x21}, 0x14}}, 0x0) 17:03:41 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000030c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:03:41 executing program 3: mbind(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x4) 17:03:41 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128\x00'}, 0x58) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) 17:03:41 executing program 1: select(0x0, 0x0, 0x0, &(0x7f0000000100), 0x0) 17:03:41 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0x144, 0x10, 0x713, 0x0, 0x0, {{@in=@local, @in6=@mcast2}, {@in6=@empty={[0x0, 0x0, 0x8]}, 0x0, 0x32}, @in6=@empty, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @offload={0xc}]}, 0x144}}, 0x0) 17:03:41 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={0x0}, 0x1, 0x0, 0x60}, 0x0) 17:03:41 executing program 2: move_pages(0x0, 0x1, &(0x7f0000000000)=[&(0x7f0000ffa000/0x3000)=nil], 0x0, 0x0, 0x0) sigaltstack(&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000140)) 17:03:41 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000040c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:03:42 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128\x00'}, 0x58) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) 17:03:42 executing program 5: syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00', 0xffffffffffffffff) sendmsg$NLBL_UNLABEL_C_LIST(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_KEY_SET(0xffffffffffffffff, 0x0, 0x0) socketpair(0x21, 0x1, 0x0, &(0x7f0000001800)) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, 0x0, 0x0) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(0xffffffffffffffff, 0x0, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000001f40)={'wpan4\x00'}) 17:03:42 executing program 2: prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000000c0)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000000000/0x4000)=nil, 0x0}, 0x68) mlock2(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0) 17:03:42 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) recvmsg$can_bcm(r0, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x10102) 17:03:42 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128\x00'}, 0x58) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) 17:03:42 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000050c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:03:42 executing program 2: r0 = gettid() rt_sigqueueinfo(r0, 0x0, &(0x7f0000002140)) 17:03:42 executing program 1: get_mempolicy(0x0, &(0x7f0000002300), 0x3, &(0x7f0000ffc000/0x1000)=nil, 0x2) 17:03:42 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128\x00'}, 0x58) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) 17:03:42 executing program 2: r0 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000040)='802.15.4 MAC\x00', 0xffffffffffffffff) sendmsg$IEEE802154_LLSEC_LIST_DEV(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r0, 0x400, 0x70bd25, 0x25dfdbfb, {}, ["", "", "", "", "", "", ""]}, 0x14}}, 0x4000500) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_ADD_DEVKEY(r1, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x2c, 0x0, 0x200, 0x70bd25, 0x25dfdbfd, {}, [@IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0202}}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20040800}, 0x24004080) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000240)='802.15.4 MAC\x00', r1) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000002c0)='802.15.4 MAC\x00', r1) sendmsg$IEEE802154_LLSEC_GETPARAMS(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r4, 0x400, 0x70bd29, 0x25dfdbfc}, 0x14}}, 0x4000054) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000400)='802.15.4 MAC\x00', r3) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(r5, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r6, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_LLSEC_KEY_SOURCE_SHORT={0x8, 0x2c, 0x10f4b9e4}]}, 0x24}, 0x1, 0x0, 0x0, 0x48800}, 0x20008000) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_KEY(r7, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x1c, 0x0, 0x200, 0x70bd2a, 0x25dfdbfb, {}, [@IEEE802154_ATTR_LLSEC_KEY_MODE={0x5, 0x2b, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000080}, 0x4801) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_KEY(r8, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x40, r2, 0x600, 0x70bd2c, 0x25dfdbfb, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0xffff}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0102}}, @IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan4\x00'}]}, 0x40}, 0x1, 0x0, 0x0, 0x58}, 0x0) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, &(0x7f0000000700)) r9 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r9, 0x8933, &(0x7f0000000740)={'wpan1\x00'}) 17:03:42 executing program 5: openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsu\x00', 0x76b36cbae9dbefbf, 0x0) 17:03:42 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000060c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:03:42 executing program 3: r0 = gettid() rt_sigqueueinfo(r0, 0x21, &(0x7f0000000000)={0x0, 0x0, 0x7f}) 17:03:43 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000001f40)={'wpan4\x00'}) 17:03:43 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x20, 0x0, 0x2, 0x201, 0x0, 0x0, {}, [@CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}]}, 0x20}}, 0x0) 17:03:43 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/bus/input/devices\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000080)={0x2020}, 0x2020) read$FUSE(r0, 0x0, 0x0) 17:03:43 executing program 1: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vim2m\x00', 0x2, 0x0) ioctl$vim2m_VIDIOC_DQBUF(r0, 0xc0285628, &(0x7f0000000180)={0x0, 0x0, 0x4, 0x0, 0x0, {0x0, 0xea60}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "fd15a5c9"}, 0x0, 0x0, @planes=0x0}) 17:03:43 executing program 2: clock_gettime(0x2, &(0x7f0000004e00)) 17:03:43 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000070c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:03:43 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x50, 0x1, 0x9, 0x401, 0x0, 0x0, {}, [@NFCTH_TUPLE={0x3c, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}]}, 0x50}}, 0x0) 17:03:43 executing program 3: r0 = syz_open_procfs$userns(0x0, &(0x7f0000000000)='ns/user\x00') ioctl$NS_GET_OWNER_UID(r0, 0xb704, &(0x7f0000000080)) [ 1218.009305] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 1218.028521] netlink: 'syz-executor.3': attribute type 2 has an invalid length. 17:03:43 executing program 2: sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, 0x0, 0x0) 17:03:43 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x2a) dup2(r0, r1) 17:03:43 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_MAX_CSMA_BACKOFFS(r0, &(0x7f0000002000)={0x0, 0x0, &(0x7f0000001fc0)={0x0}}, 0x15) 17:03:43 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'wlan0\x00', &(0x7f0000000100)=ANY=[@ANYRES16=r0]}) 17:03:43 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000080c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:03:43 executing program 3: select(0x40, &(0x7f0000000080)={0xfffffffffffffffa}, 0x0, 0x0, 0x0) 17:03:43 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x2, 0x8, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@local, @in6=@loopback}}, @sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@empty, @in=@private}}]}, 0x90}}, 0x0) 17:03:43 executing program 5: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vim2m\x00', 0x2, 0x0) ioctl$vim2m_VIDIOC_DQBUF(r0, 0x5421, &(0x7f0000000180)={0x5, 0x0, 0x4, 0x0, 0x0, {0x0, 0xea60}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "fd15a5c9"}, 0x0, 0x0, @planes=0x0}) 17:03:43 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_MSCBIT(r0, 0x40045568, 0xb) 17:03:43 executing program 2: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_DEL_SEC_KEY(0xffffffffffffffff, 0x0, 0x0) sendmsg$IEEE802154_LLSEC_ADD_DEVKEY(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$ieee802154(0x0, 0xffffffffffffffff) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000900)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000940)='./file0\x00', 0x0) 17:03:43 executing program 1: stat(&(0x7f0000000080)='./file0\x00', 0x0) stat(&(0x7f0000001b00)='./file0\x00', 0x0) 17:03:43 executing program 3: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/time_for_children\x00') ioctl$NS_GET_PARENT(r0, 0xc0045878, 0x0) 17:03:43 executing program 3: openat$autofs(0xffffffffffffff9c, &(0x7f0000000400)='/dev/autofs\x00', 0x181000, 0x0) 17:03:43 executing program 3: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vim2m\x00', 0x2, 0x0) ioctl$vim2m_VIDIOC_DQBUF(r0, 0xc050560f, &(0x7f0000000180)={0x0, 0x2, 0x4, 0x0, 0x0, {0x0, 0xea60}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "fd15a5c9"}, 0x0, 0x0, @planes=0x0}) 17:03:43 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000090c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:03:43 executing program 5: perf_event_open(&(0x7f0000002200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffe0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:03:43 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCATTCHAN(r0, 0x40047438, 0x0) 17:03:43 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) sendmsg$NL802154_CMD_GET_SEC_DEV(r0, &(0x7f00000005c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x800240}, 0xc, &(0x7f0000000580)={&(0x7f0000000500)={0x14}, 0x14}}, 0x0) 17:03:43 executing program 2: perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:03:43 executing program 1: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/time_for_children\x00') ioctl$NS_GET_PARENT(r0, 0x40305829, 0x0) 17:03:43 executing program 3: syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) syz_open_procfs$namespace(0x0, 0x0) 17:03:44 executing program 3: select(0x40, &(0x7f0000000040)={0x1}, 0x0, &(0x7f00000000c0)={0x2}, 0x0) 17:03:44 executing program 5: rt_sigprocmask(0x57e5e351d30680db, &(0x7f0000000000), 0x0, 0x8) 17:03:44 executing program 0: syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/time\x00') prctl$PR_GET_PDEATHSIG(0x2, &(0x7f0000000000)) 17:03:44 executing program 2: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vim2m\x00', 0x2, 0x0) ioctl$vim2m_VIDIOC_DQBUF(r0, 0xc0585611, &(0x7f0000000180)={0x0, 0x2, 0x4, 0x0, 0x0, {0x0, 0xea60}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "fd15a5c9"}, 0x0, 0x0, @planes=0x0}) 17:03:44 executing program 3: sigaltstack(&(0x7f0000ffd000/0x1000)=nil, 0x0) mlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) 17:03:44 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000b0c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:03:44 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) recvmmsg(r1, &(0x7f0000002440), 0x3ffffff000001eb, 0x0, 0x0) 17:03:44 executing program 5: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r0 = syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000010200)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000009ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffed4103005cf9535fc0", 0x789, 0x880}, {0x0, 0x0, 0x11000}], 0x0, &(0x7f0000000040)=ANY=[]) mknodat$null(r0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x103) 17:03:44 executing program 3: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vim2m\x00', 0x2, 0x0) ioctl$vim2m_VIDIOC_DQBUF(r0, 0xc0505611, &(0x7f0000000180)={0x0, 0x0, 0x4, 0x0, 0x0, {0x0, 0xea60}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "fd15a5c9"}, 0x0, 0x0, @planes=0x0}) 17:03:44 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f0000000580)=ANY=[@ANYBLOB='#3 '], 0x191) close(r0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 17:03:44 executing program 2: openat$autofs(0xffffffffffffff9c, &(0x7f0000000400)='/dev/autofs\x00', 0x0, 0x0) syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={0x0}}, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000ac0)='l2tp\x00', r0) 17:03:44 executing program 3: perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:03:44 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000f0c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:03:44 executing program 1: r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc058565d, &(0x7f00000000c0)={0x0, 0x7, 0x4, 0x0, 0x0, {0x77359400}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "31a1cf58"}, 0x0, 0x0, @planes=0x0}) 17:03:44 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000300)={0x0, @l2tp={0x2, 0x0, @broadcast}, @l2, @xdp, 0x7ff, 0x0, 0x0, 0x0, 0xa98}) 17:03:44 executing program 0: perf_event_open(&(0x7f00000000c0)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:03:44 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)={0x2c, 0x9, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_ADT={0x4}]}, 0x2c}}, 0x0) 17:03:44 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DESTROY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, 0x3, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) 17:03:44 executing program 3: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vim2m\x00', 0x2, 0x0) ioctl$vim2m_VIDIOC_DQBUF(r0, 0x5460, 0x0) 17:03:44 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x2, 0x14, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 17:03:44 executing program 3: move_pages(0x0, 0x1, &(0x7f0000000000)=[&(0x7f0000ffa000/0x3000)=nil], 0x0, 0x0, 0x0) mlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) 17:03:44 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000230c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:03:44 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000001700)={0x0, 0x0, &(0x7f00000016c0)={&(0x7f0000001740)=ANY=[], 0x164c}}, 0x0) 17:03:44 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 17:03:44 executing program 5: syz_open_dev$swradio(0xfffffffffffffffc, 0x0, 0x2) 17:03:44 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000002700)={0x0, 0x0, &(0x7f00000026c0)={&(0x7f0000002080)={0x14, 0x10, 0x8, 0x5}, 0x14}}, 0x0) 17:03:44 executing program 1: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vim2m\x00', 0x2, 0x0) ioctl$vim2m_VIDIOC_DQBUF(r0, 0xc0585611, &(0x7f0000000180)={0x0, 0xc, 0x4, 0x0, 0x0, {0x0, 0xea60}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "fd15a5c9"}, 0x0, 0x0, @planes=0x0}) 17:03:44 executing program 3: syz_open_dev$mouse(&(0x7f0000000400)='/dev/input/mouse#\x00', 0x8, 0x6a7a71db135bd925) 17:03:45 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000002bc0)={&(0x7f0000000380)={0x2, 0x4e24, 0x0, @dev}, 0x1c, 0x0, 0x0, &(0x7f0000002900)=[@hopopts={{0x12, 0x11, 0x67}}], 0x18}, 0x0) 17:03:45 executing program 2: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) mkdir(&(0x7f0000000100)='./file1\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6900) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", [[], [], [], [], [], [], [], []]}, 0x878) sendfile(r0, r1, 0x0, 0x8400fffffffa) 17:03:45 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000100)={0x4c, 0x0, 0x2, 0x5, 0x0, 0x0, {0x2}, [@CTA_EXPECT_MASK={0x4}, @CTA_EXPECT_TUPLE={0x30, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={[], [], @empty}}, {0x14, 0x4, @dev}}}]}, @CTA_EXPECT_MASTER={0x4}]}, 0x4c}}, 0x0) 17:03:45 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000480c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:03:45 executing program 0: fork() move_pages(0x0, 0x1, &(0x7f0000000000)=[&(0x7f0000ffa000/0x3000)=nil], 0x0, 0x0, 0x0) fork() 17:03:45 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$sysv(&(0x7f0000000140)='sysv\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)) 17:03:45 executing program 3: socketpair(0xa, 0x0, 0x401, &(0x7f0000000000)) 17:03:45 executing program 5: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vcsu\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000440)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) waitid(0x2, r1, 0x0, 0x8, 0x0) [ 1220.049278] audit: type=1804 audit(1618851825.258:3207): pid=3026 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir625831378/syzkaller.bXNZMV/2593/file1/bus" dev="loop2" ino=10 res=1 17:03:45 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010004c0c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:03:45 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x43406, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1220.110828] VFS: unable to find oldfs superblock on device loop1 [ 1220.121076] attempt to access beyond end of device 17:03:45 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000440)='nl802154\x00', 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_TX_POWER(r0, &(0x7f0000000a80)={&(0x7f00000009c0), 0xc, &(0x7f0000000a40)={&(0x7f0000000a00)={0x14, r1, 0x21}, 0x14}}, 0x0) [ 1220.153757] loop2: rw=2049, want=106, limit=87 [ 1220.171043] audit: type=1804 audit(1618851825.328:3208): pid=3026 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir625831378/syzkaller.bXNZMV/2593/file1/file1/bus" dev="loop2" ino=12 res=1 17:03:45 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000280)={&(0x7f0000000180), 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x2c, 0x2, 0x9, 0x3, 0x0, 0x0, {}, [@NFCTH_TUPLE={0x18, 0x2, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8}}}]}]}, 0x2c}}, 0x0) 17:03:45 executing program 2: r0 = gettid() perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0xc0b, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 17:03:45 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_int(r0, 0x11, 0x1, &(0x7f00000011c0)=0x7, 0x4) 17:03:45 executing program 1: mlock2(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x1) 17:03:45 executing program 3: r0 = syz_open_dev$vim2m(&(0x7f0000000080)='/dev/video#\x00', 0x0, 0x2) ioctl$vim2m_VIDIOC_DQBUF(r0, 0x541b, 0x0) 17:03:45 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000600c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) [ 1220.400189] netlink: 'syz-executor.5': attribute type 1 has an invalid length. 17:03:45 executing program 0: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dlm-monitor\x00', 0x0, 0x0) 17:03:45 executing program 3: get_mempolicy(&(0x7f00000022c0), 0x0, 0x0, &(0x7f0000ffc000/0x1000)=nil, 0x2) 17:03:45 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x18, 0x1, 0x9, 0x401, 0x0, 0x0, {}, [@NFCTH_TUPLE={0x4}]}, 0x18}}, 0x0) 17:03:45 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_LIST(r0, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={0x0}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000001b40)='nl802154\x00', r1) 17:03:45 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@nat={'nat\x00', 0x19, 0x0, 0x90, [0x20000180, 0x0, 0x0, 0x200001b0, 0x200001e0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}]}, 0x108) 17:03:45 executing program 3: futex(0x0, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) 17:03:45 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000140)={0x0, {{0x2, 0x0, @loopback}}, {{0x2, 0x0, @broadcast}}}, 0x104) 17:03:46 executing program 5: open$dir(0x0, 0x5d7441, 0x0) 17:03:46 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x33c, 0xffffffff, 0x190, 0xc8, 0x0, 0xffffffff, 0xffffffff, 0x274, 0x274, 0x274, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xa4, 0xc8}, @common=@unspec=@STANDARD={0x24, '\x00', 0x0, 0x190}}, {{@uncond, 0x0, 0xa4, 0xc8}, @REJECT={0x24, 'REJECT\x00'}}, {{@ipv6={@loopback, @mcast2, [], [], 'geneve0\x00', 'veth1\x00'}, 0x0, 0xa4, 0xe4}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "af62ef6a6619ed1016c5c53d41a3a5333042ca6bbb0b230f1986378864f3"}}], {{[], 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x398) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000002440)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000044c0)=@newlink={0x50, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @local}]}]}, @IFLA_IFNAME={0x14, 0x3, 'veth0_vlan\x00'}]}, 0x50}}, 0x0) io_setup(0x0, 0x0) 17:03:46 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000680c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:03:46 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) accept4$inet(r0, 0x0, 0x0, 0x80000) socket$inet(0x2, 0xa, 0x0) 17:03:46 executing program 3: r0 = socket$inet(0x2, 0x3, 0x5) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, 0x0, 0x7be) 17:03:46 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, &(0x7f0000000100)={0x0, {{0x2, 0x0, @dev}}}, 0x84) 17:03:46 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x308, 0xffffffff, 0x1b4, 0x1b4, 0x0, 0xffffffff, 0xffffffff, 0x274, 0x274, 0x274, 0xffffffff, 0x4, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'wg2\x00', 'ip6erspan0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff}}}}, {{@uncond, 0x0, 0xc0, 0xe4, 0x0, {}, [@common=@osf={{0x50, 'osf\x00'}, {'syz0\x00'}}]}, @REJECT={0x24, 'REJECT\x00'}}, {{@uncond, 0x0, 0x9c, 0xc0, 0x0, {}, [@common=@ah={{0x2c, 'ah\x00'}}]}, @REJECT={0x24, 'REJECT\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x364) 17:03:46 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@loopback, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@private1}}, 0xe4) 17:03:46 executing program 3: r0 = gettid() perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0xf, 0xffffffffffffffff, 0x0) 17:03:46 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000c00)=@filter={'filter\x00', 0xe, 0x3, 0x19e, [0x0, 0x20000040, 0x20000aa4, 0x20000bb2], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{0x0, 0x0, 0x0, 'erspan0\x00', 'veth0_to_hsr\x00', 'sit0\x00', 'wg1\x00', @local, [], @empty, [], 0x6e, 0x9e, 0x10e, [], [@common=@dnat={'dnat\x00', 0xc, {{@local}}}], @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x0, 0x0, 0x0, 0x0, 0x0, "44f80cf03a935c93f745c9030350a4f43a56435e9dfdd5ac5064ca2249caf97e4a5a6353394e0d66fdc79244df6f580121e82caf10dd68ff2697adba446649b3"}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x3}]}, 0x226) 17:03:46 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000040)={'filter\x00', 0x7, 0x4, 0x3d8, 0x0, 0x0, 0x0, 0x2f8, 0x2f8, 0x2f8, 0x4, 0x0, {[{{@arp={@loopback, @remote, 0x0, 0x0, 0x0, 0x2, {}, {@mac=@random="e2dad7ad17d7"}, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 'wlan1\x00', 'veth1\x00', {}, {}, 0x0, 0x104}, 0xbc, 0x10c}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@local, @empty, @loopback, @remote, 0x4}}}, {{@arp={@local, @dev, 0x0, 0x0, 0x0, 0x0, {@mac=@broadcast}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 'ip_vti0\x00'}, 0xbc, 0x10c}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@multicast, @mac=@remote, @rand_addr, @loopback, 0x1}}}, {{@arp={@remote, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth1_to_bond\x00', 'vxcan1\x00'}, 0xbc, 0xe0}, @unspec=@AUDIT={0x24, 'AUDIT\x00'}}], {{[], 0xbc, 0xe0}, {0x24}}}}, 0x424) syz_emit_ethernet(0x2a, &(0x7f0000000500)={@broadcast, @local, @void, {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @remote, @private, @local, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x0) 17:03:46 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f00000001c0)={{0x2, 0x0, @broadcast}, {0x1, @broadcast}, 0x0, {0x2, 0x0, @broadcast}, 'veth1_to_bond\x00'}) 17:03:46 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010006c0c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:03:46 executing program 3: prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000040)) 17:03:46 executing program 5: openat$null(0xffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x10140, 0x0) 17:03:46 executing program 2: clone(0x800, 0x0, 0x0, 0x0, 0x0) 17:03:46 executing program 0: open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x158) close(r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 17:03:46 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000080)=0x54) 17:03:46 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_buf(r0, 0x6, 0x0, 0x0, 0x60) 17:03:46 executing program 3: r0 = gettid() ptrace$setopts(0x4206, r0, 0x2, 0x0) 17:03:46 executing program 5: sched_getaffinity(0x0, 0x8, &(0x7f0000000000)) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)) 17:03:46 executing program 2: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/net\x00') setns(r0, 0x0) 17:03:46 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000740c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:03:46 executing program 3: clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) setitimer(0x2, &(0x7f0000000040)={{0x0, 0x2710}, {0x0, r0/1000+60000}}, 0x0) 17:03:46 executing program 0: setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000000)={'filter\x00', 0x4}, 0x64) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) 17:03:46 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) recvmmsg(r0, &(0x7f0000004440)=[{{0x0, 0x0, &(0x7f0000001500)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}}], 0x1, 0x0, 0x0) 17:03:46 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, 0x0, 0xffffffffffffff4b) 17:03:46 executing program 5: gettid() getrusage(0x1, &(0x7f0000000040)) 17:03:46 executing program 2: bpf$ITER_CREATE(0x21, 0x0, 0x19) 17:03:47 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000007, 0x800000000009031, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 17:03:47 executing program 0: r0 = socket$inet(0x2, 0x3, 0x4) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @remote}, {0x0, @remote}, 0x48, {0x2, 0x0, @dev}, 'veth1_to_bridge\x00'}) 17:03:47 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010007a0c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:03:47 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) recvmmsg(r0, &(0x7f0000001280)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40010003, 0x0) 17:03:47 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={0x0, @nl=@unspec, @generic={0x0, "bb0222dbe1af3f7f203f46806e06"}, @can}) 17:03:47 executing program 0: r0 = openat$null(0xffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0x0) 17:03:47 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000007, 0x800000000009031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_MODE={0x5, 0x4, 0xff}]}}}]}, 0x44}}, 0x0) 17:03:47 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000c80c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:03:47 executing program 1: r0 = gettid() rt_sigqueueinfo(r0, 0x0, &(0x7f0000000200)) 17:03:47 executing program 2: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000380)=@security={'security\x00', 0xe, 0x4, 0x2fc, 0xffffffff, 0xd0, 0x0, 0xd0, 0xffffffff, 0xffffffff, 0x268, 0x268, 0x268, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00', 0x0, {{}, {0xfffd}}}}, {{@uncond, 0x0, 0x70, 0xcc}, @common=@CLUSTERIP={0x5c, 'CLUSTERIP\x00', 0x0, {0x0, @link_local, 0x0, 0x0, [0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x34]}}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @empty, 0x0, 0x0, 'ip6_vti0\x00', 'rose0\x00'}, 0x0, 0x70, 0xcc}, @common=@CLUSTERIP={0x5c, 'CLUSTERIP\x00', 0x0, {0x0, @link_local, 0x0, 0x0, [0x0, 0x0, 0x22, 0x0, 0x0, 0xf]}}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x358) 17:03:47 executing program 0: r0 = openat$null(0xffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x0, 0x0) mmap$perf(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x200000a, 0x12, r0, 0x0) 17:03:47 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000014", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:03:47 executing program 3: socketpair(0x11, 0x3, 0x5, 0x0) 17:03:47 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$GTP_CMD_NEWPDP(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 17:03:47 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x210000000013, &(0x7f0000000040)=0x100000001, 0x4) connect$inet(r1, &(0x7f0000000280)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x3fd, 0x401}, 0x14) r2 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000001640)=@mangle={'mangle\x00', 0x1f, 0x6, 0xbe0, 0x990, 0x0, 0x990, 0x990, 0xf8, 0xb4c, 0xb4c, 0xb4c, 0xb4c, 0xb4c, 0x6, 0x0, {[{{@uncond, 0x0, 0xd4, 0xf8, 0x0, {}, [@common=@inet=@iprange={{0x64, 'iprange\x00'}, {@ipv4=@local, @ipv4=@loopback, @ipv4=@local, @ipv4=@broadcast}}]}, @TTL={0x24, 'TTL\x00'}}, {{@uncond, 0x0, 0x874, 0x898, 0x0, {}, [@common=@ttl={{0x24, 'ttl\x00'}}, @common=@unspec=@u32={{0x7e0, 'u32\x00'}, {[], 0x9}}]}, @TTL={0x24, 'TTL\x00'}}, {{@uncond, 0x0, 0x70, 0x94}, @TTL={0x24, 'TTL\x00', 0x0, {0x2, 0x81}}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @dev, 0x0, 0x0, 'vxcan1\x00', 'team_slave_0\x00'}, 0x0, 0x70, 0x94}, @unspec=@CHECKSUM={0x24, 'CHECKSUM\x00'}}, {{@ip={@remote, @dev, 0x0, 0x0, 'ip6_vti0\x00', 'macvlan1\x00'}, 0x0, 0x70, 0x94}, @ECN={0x24, 'ECN\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0xc3c) sendfile(r1, r0, 0x0, 0x4000000000edbc) 17:03:48 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGNAME(r0, 0x80404506, &(0x7f0000000040)=""/129) 17:03:48 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) write$vhost_msg(r0, &(0x7f0000000200)={0x1, {0x0, 0x0, 0x0, 0x0, 0x2}}, 0x48) 17:03:48 executing program 0: r0 = openat$null(0xffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, 0x0) 17:03:48 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000a00)=@security={'security\x00', 0xe, 0x4, 0x34c, 0xffffffff, 0x238, 0x13c, 0x238, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xc0, 0x11c, 0x0, {}, [@common=@osf={{0x50, 'osf\x00'}, {'syz0\x00'}}]}, @common=@CLUSTERIP={0x5c, 'CLUSTERIP\x00', 0x0, {0x0, @link_local}}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @rand_addr, 0x0, 0x0, 'veth0_to_team\x00', 'nr0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}, {{@ip={@multicast2, @broadcast, 0x0, 0x0, 'xfrm0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x70, 0xcc}, @common=@CLUSTERIP={0x5c, 'CLUSTERIP\x00', 0x0, {0x0, @multicast}}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x3a8) 17:03:48 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) recvmmsg(r0, &(0x7f00000022c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2000, 0x0) 17:03:48 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000017", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:03:48 executing program 3: perf_event_open$cgroup(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1404, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:03:48 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000080)=@nat={'nat\x00', 0x1b, 0x5, 0x48c, 0x0, 0x0, 0xffffffff, 0x3d8, 0x2ac, 0x4e0, 0x4e0, 0xffffffff, 0x4e0, 0x4e0, 0x5, 0x0, {[{{@uncond, 0x0, 0x188, 0x1bc, 0x0, {}, [@common=@inet=@recent0={{0xf4, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}, @common=@icmp={{0x24, 'icmp\x00'}, {0x0, "61aa"}}]}, @NETMAP={0x34, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @initdev={0xac, 0x1e, 0x0, 0x0}, @port, @gre_key}}}}, {{@uncond, 0x0, 0x70, 0xcc}, @common=@CLUSTERIP={0x5c, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xb8}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4=@dev, @ipv4=@broadcast, @gre_key, @icmp_id}}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x4e8) 17:03:48 executing program 0: clone(0x800, &(0x7f0000000000)="e338bc6268cf8bfd6d7797748c78b51f774db4bcc231acce3200fd9d560dbd05af76fa8e727296768eb4b5735a2046c915d4089b559cb0a4bcdd860b2ee2ecfe5166dcd3a781db92fe780b1d802ead32630fa58c103b9432a4a31332ec66e57fa998ff91201854710f368512a8aa5feb8441fa68def3ce4892ff06b73972020dee8dccec", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="f0ab8cd9b5c0cb5a2101ec4dfd4fbfaaaadde2540bc69123e6a6deddac458d224c7deee342ab1fead6cc2743b31303a9fed4de027e5b168799bc2f04baa14c21d9671dd070c226471be5cc5148") ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)=0x2) bpf$ITER_CREATE(0x21, &(0x7f0000000200), 0x8) clone(0x40000000, &(0x7f0000000240)="0fdaf3e01992d3fb8bfbbc2dccdd54ef2838c80eb085f6ab335fb6d234398a33b6aa6bcc0fb413938a0ed0945d772cc48529681c0a8013cb1820c7d9508b3e08980cb869b2cc2021f8f206d73c5308425438ffdc92974f70cec81a9d0b404234fa2331ff54d3c5aee6cf1d24d4f2846928afc030cf8b2a89e22e0f5ddd100fbeb7c2e59f5537ea40d95eb1a9c8d6345394f78c58f588b2f383837f09b3713582e37d29c8b4176b9d5e00f7509d067dad44aa312716f0182adf1846eb87f5495f6570111347e935c795a8b8aed830d9379b66e3b774aa581af82b17b8b0096c83c7254ba33c2b", &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9d66f9f441bd9d1e6083c77a1862d050d37d1215ded577208f1e5f7d966974d1b759a93ba5b00fa3c1a1b7c7cca8619240110599b758f8c3c57b271c6b37ab14d64981ed46f6e75639ff0fb2b0ea98cbd643d472bb37f8bfdeaabe368726396791ef2493d9") sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, 0x0, 0x0) 17:03:48 executing program 3: perf_event_open(&(0x7f0000000280)={0x2, 0x70, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f00000000c0)='sysfs\x00', 0x0, 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000180)='./file0\x00', 0x400) umount2(&(0x7f0000000080)='./file0\x00', 0x0) 17:03:48 executing program 3: perf_event_open(&(0x7f0000000280)={0x2, 0x70, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f00000000c0)='sysfs\x00', 0x0, 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000180)='./file0\x00', 0x400) umount2(&(0x7f0000000080)='./file0\x00', 0x0) 17:03:48 executing program 1: rt_sigqueueinfo(0xffffffffffffffff, 0x0, &(0x7f0000000040)={0x0, 0x0, 0xfffffffe}) 17:03:48 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r2, 0x0) preadv(r1, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) shutdown(0xffffffffffffffff, 0x0) 17:03:48 executing program 3: perf_event_open(&(0x7f0000000280)={0x2, 0x70, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f00000000c0)='sysfs\x00', 0x0, 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000180)='./file0\x00', 0x400) umount2(&(0x7f0000000080)='./file0\x00', 0x0) 17:03:48 executing program 5: getcwd(&(0x7f0000000040)=""/69, 0x45) 17:03:48 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000003f", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) [ 1223.372955] IPVS: ftp: loaded support on port[0] = 21 17:03:48 executing program 3: perf_event_open(&(0x7f0000000280)={0x2, 0x70, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f00000000c0)='sysfs\x00', 0x0, 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000180)='./file0\x00', 0x400) umount2(&(0x7f0000000080)='./file0\x00', 0x0) 17:03:48 executing program 1: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_hsr\x00', 0x3}, 0x18) ioctl(r0, 0x8936, &(0x7f0000000000)) 17:03:48 executing program 2: r0 = openat$tun(0xffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) 17:03:48 executing program 5: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1223.918090] IPVS: ftp: loaded support on port[0] = 21 17:03:49 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x1d, 0x0, &(0x7f0000000140)) 17:03:49 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) syncfs(r0) 17:03:49 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000005f", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:03:49 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000180)=0xfffffffffffffcba) 17:03:49 executing program 5: clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) setitimer(0x1, &(0x7f0000000080)={{}, {0x0, r0/1000+10000}}, 0x0) 17:03:49 executing program 2: socketpair(0x61487d34132a8320, 0x0, 0x0, 0x0) 17:03:49 executing program 3: add_key(&(0x7f0000000000)='ceph\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) fork() 17:03:49 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$sock_buf(r0, 0x1, 0x27, 0x0, &(0x7f0000000080)=0x62) 17:03:49 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x13d, 0x13d, 0x2, [@struct={0x0, 0x3, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}]}, @datasec={0x0, 0x5, 0x0, 0xf, 0x3, [{}, {}, {}, {}, {}], "ddc439"}, @struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}, {}]}, @fwd, @fwd, @func, @typedef, @datasec={0x0, 0x7, 0x0, 0xf, 0x2, [{}, {}, {}, {}, {}, {}, {}], "69aa"}, @typedef]}}, 0x0, 0x15a}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 17:03:49 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0x4004ae99, 0x0) 17:03:49 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x100) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) faccessat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 17:03:49 executing program 3: prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000000)={&(0x7f00000c2000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000172000/0x1000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000935000/0x1000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ff9000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0}, 0x68) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r0, &(0x7f0000000280), 0xfffffed3) 17:03:49 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000792", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:03:49 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, 0x0, 0x0) 17:03:49 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'vlan1\x00'}) 17:03:49 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0x4040aea0, 0x0) 17:03:49 executing program 5: r0 = fork() migrate_pages(r0, 0x20, &(0x7f00000000c0)=0x5, &(0x7f0000000040)=0x3) 17:03:49 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x401070c9, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6e0968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9ae0278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000000) 17:03:49 executing program 1: r0 = socket(0xa, 0x3, 0x7) recvmmsg(r0, &(0x7f00000009c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x103, 0x0) 17:03:49 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000079f", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:03:49 executing program 3: openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ttyprintk\x00', 0x0, 0x0) 17:03:49 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)={0x24, 0x7, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_FLAGS={0x8}]}, 0x24}}, 0x0) [ 1224.605842] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 17:03:49 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ttyprintk\x00', 0x60802, 0x0) writev(r1, &(0x7f0000000000)=[{&(0x7f0000000380)='\r', 0x1600}], 0x1) 17:03:49 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x20, 0x16, 0xa, 0x101, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_DELFLOWTABLE={0x30, 0x16, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x4}]}], {0x14, 0x10}}, 0x98}}, 0x0) 17:03:49 executing program 2: r0 = socket(0x11, 0x800000003, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {0x2}, {0xffff, 0xffff}}}, 0x24}}, 0x0) 17:03:49 executing program 5: r0 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCGWINSZ(r0, 0x40087468, &(0x7f0000000040)) [ 1224.733666] [U] ŽC [ 1224.736247] [U] [ 1224.738219] [U] [ 1224.740190] [U] 17:03:50 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000000000100000bf", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:03:50 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getpeername$unix(r0, 0x0, &(0x7f0000001080)) [ 1224.840270] [U] [ 1224.842328] [U] [ 1224.844334] [U] [ 1224.846310] [U] t>d‹% [ 1224.848976] [U] ë1Àº [ 1224.851584] [U] t H=èŒ [ 1224.854252] [U] èã} [ 1224.856665] [U] ÿÚŒ [ 1224.859103] [U] ƒ=ߌ [ 1224.861513] [U]  [ 1224.863582] [U]  [ 1224.865759] [U] ƒø…À [ 1224.868339] [U]  [ 1224.870404] [U] ÿȉxŒ [ 1224.872986] [U] uDHÇoŒ 17:03:50 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2, 0x10, r0, 0x0) [ 1225.079622] [U]  [ 1225.087690] [U] UŒ [ 1225.089868] [U] ë%‡MŒ [ 1225.092449] [U] ÿÈ~E1Òº [ 1225.095403] [U] ¿ [ 1225.099532] [U] t>d‹% [ 1225.102208] [U] ë1Àº [ 1225.105675] [U] t H=à‹ [ 1225.108858] [U] èÛ| [ 1225.111250] [U] ÿÒ‹ [ 1225.113724] [U] ëƒøu>H´$€ [ 1225.116826] [U]  [ 1225.118974] [U] udž‹ [ 1225.121881] [U]  [ 1225.124008] [U] u Çi‹ [ 1225.126678] [U]  17:03:50 executing program 0: r0 = socket$inet(0x2, 0x3, 0x0) setsockopt$sock_timeval(r0, 0xffff, 0x1006, &(0x7f0000000000)={0x0, 0x7ff}, 0x10) 17:03:50 executing program 2: r0 = socket$inet6(0x18, 0x3, 0x0) bind$inet6(r0, &(0x7f0000001140)={0x18, 0x2}, 0xc) 17:03:50 executing program 3: clock_gettime(0x0, &(0x7f0000000040)) madvise(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4) 17:03:50 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000010", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:03:50 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0xffff, 0x1022, 0x0, 0x0) [ 1225.128996] [U] uÇU‹ [ 1225.334025] [U]  [ 1225.336241] [U] [ 1225.338227] [U] [ 1225.340218] [U] [ 1225.342201] [U] [ 1225.344184] [U] [ 1225.346176] [U] [ 1225.348690] [U] [ 1225.350680] [U] [ 1225.352679] [U] [ 1225.354716] [U] M…Àt¹ [ 1225.409578] [U]  [ 1225.414054] [U] [ 1225.426399] [U] L9à…P 17:03:50 executing program 1: clock_gettime(0x0, &(0x7f0000000040)) clock_gettime(0x3, &(0x7f0000000000)) 17:03:50 executing program 3: socket$inet(0x2, 0x5a3551c3398b3dce, 0x0) 17:03:50 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0) 17:03:50 executing program 2: r0 = socket$inet6(0x18, 0x3, 0x0) bind$inet6(r0, 0x0, 0x0) 17:03:50 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000014", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:03:50 executing program 0: r0 = socket$inet(0x2, 0x3, 0x0) getsockopt$inet_opts(r0, 0x0, 0x1, &(0x7f0000000000)=""/188, &(0x7f00000000c0)=0xbc) 17:03:50 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getpeername$unix(r0, 0x0, 0x0) 17:03:50 executing program 3: r0 = socket$inet(0x2, 0x3, 0x0) getpeername$inet(r0, 0x0, 0x0) 17:03:50 executing program 2: r0 = syz_open_pts(0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x3, 0x0) poll(&(0x7f0000000100)=[{r1, 0x4}, {r0, 0x4}], 0x2, 0x0) 17:03:50 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x339e473906b17dfc, 0x0) 17:03:50 executing program 1: preadv(0xffffffffffffffff, &(0x7f0000001540)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0, 0x0) 17:03:50 executing program 3: socket$inet6(0x18, 0x3, 0x0) 17:03:50 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000017", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:03:50 executing program 0: getgroups(0x7, &(0x7f0000000080)=[0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff]) setgid(r0) 17:03:50 executing program 3: lchown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) munlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) 17:03:51 executing program 3: clock_gettime(0x0, &(0x7f0000000040)) clock_gettime(0x4, &(0x7f0000000000)) 17:03:51 executing program 5: r0 = socket$inet(0x2, 0x3, 0x0) getsockopt$sock_int(r0, 0xffff, 0x0, 0x0, 0x0) 17:03:51 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2, 0x810, r0, 0x0) 17:03:51 executing program 3: clock_gettime(0x0, &(0x7f0000000040)) madvise(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) 17:03:51 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000005f", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:03:51 executing program 2: openat$sndseq(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/snd/seq\x00', 0x40) 17:03:51 executing program 0: r0 = socket$l2tp6(0xa, 0x2, 0x73) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, 0x0) 17:03:51 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x2, 0x0) sendmsg$nl_route(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="480000001000054700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010068667363"], 0x38}}, 0x0) 17:03:51 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x59061, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x100000000, 0x7f}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x8) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880)='/dev/loop#\x00', 0x7f, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x1) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, &(0x7f00000001c0)) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={[0x48], 0x8, 0x40, 0x2, 0x20}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@dev={0xfe, 0x80, [], 0x16}, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f, 0x2, 0x0, 0x0, 0xa, 0x0, 0xc31fc3b4eebcb907}, {0x3ff, 0x0, 0x6f, 0x8, 0x6, 0x5, 0xfffffffffbd8b9e9, 0x7}, {0x0, 0x2, 0x0, 0xffffffffffffff4d}, 0x5f, 0x6e6bbf, 0x0, 0x0, 0x3}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4d3, 0xff}, 0x2, @in=@empty, 0x3504, 0x2, 0x2, 0x8, 0x5, 0x6, 0xffffffc0}}, 0xe8) 17:03:51 executing program 1: open$dir(&(0x7f0000001500)='./file0\x00', 0x200, 0x0) open$dir(&(0x7f0000001580)='./file0\x00', 0x0, 0x0) [ 1226.014864] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1226.054321] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 17:03:51 executing program 0: syz_emit_ethernet(0x1366, 0x0, 0x0) 17:03:51 executing program 2: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/snd/seq\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f0000000000)={{}, 'port1\x00'}) 17:03:51 executing program 3: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$IOCTL_STATUS_ACCEL_DEV(r0, 0x40046103, &(0x7f0000001840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "ad253ac5289e51be64b189ac56a4b5064500b3f890cf3e579260250b301b666a"}) [ 1226.084185] blktrace: Concurrent blktraces are not allowed on loop7 [ 1226.088586] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1226.106826] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 17:03:51 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000000000100000bf", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:03:51 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000002e00)=[{{0x0, 0x3e, &(0x7f0000000180)=[{&(0x7f00000009c0)="4d97be72540a56afcb6ccea6f0824690", 0x2802}], 0x1}}, {{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000280)="c980e9c87be587650c20f4608c6bdad6", 0x4ae4ef9f}], 0x1}}], 0x2, 0x0) 17:03:51 executing program 1: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/snd/seq\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000001c0)) [ 1226.228128] blktrace: Concurrent blktraces are not allowed on loop7 17:03:51 executing program 2: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/seq\x00', 0xaac81) write$sndseq(r0, 0x0, 0x0) 17:03:51 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000002e00)=[{{0x0, 0x3e, &(0x7f0000000180)=[{&(0x7f00000009c0)="4d97be72540a56afcb6ccea6f0824690", 0x2802}], 0x1}}, {{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000280)="c980e9c87be587650c20f4608c6bdad6", 0x4ae4ef9f}], 0x1}}], 0x2, 0x0) 17:03:51 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/qat_adf_ctl\x00', 0x802, 0x0) 17:03:51 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x8) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x208e24b) r0 = open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000880)='/dev/loop#\x00', 0x7f, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x1) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={[0x48], 0x0, 0x40, 0x2, 0x20}) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000018c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 17:03:51 executing program 1: pselect6(0x0, 0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100)={0x77359400}, &(0x7f0000000180)={&(0x7f0000000140)={[0x4]}, 0x8}) 17:03:51 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000092", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:03:51 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000002e00)=[{{0x0, 0x3e, &(0x7f0000000180)=[{&(0x7f00000009c0)="4d97be72540a56afcb6ccea6f0824690", 0x2802}], 0x1}}, {{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000280)="c980e9c87be587650c20f4608c6bdad6", 0x4ae4ef9f}], 0x1}}], 0x2, 0x0) 17:03:51 executing program 0: syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/schedstat\x00', 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r2, &(0x7f0000000600)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000005c0)={&(0x7f0000000540)={0x40, 0x0, 0x100, 0x4, 0x25dfdbfe, {}, [@L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x1f}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x1}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e20}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e23}]}, 0x40}, 0x1, 0x0, 0x0, 0x4}, 0x40000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00', 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00'}) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00', 0xffffffffffffffff) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_FRAME(r4, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000980)={&(0x7f00000000c0)=ANY=[@ANYBLOB="88040000", @ANYRES16=r3, @ANYBLOB="010025bd7023fedbdf253b00000008000300", @ANYRES32=r6, @ANYBLOB="04008e006604330080280300080211000001080211"], 0x488}}, 0x0) sendmsg$NL80211_CMD_TDLS_MGMT(r1, 0x0, 0x0) [ 1226.452936] blktrace: Concurrent blktraces are not allowed on loop7 17:03:51 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x40, 0xb, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_ADT={0x14, 0x8, 0x0, 0x1, [{0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_IP2={0xc, 0x14, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @local}}}]}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x40}}, 0x0) 17:03:51 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000002e00)=[{{0x0, 0x3e, &(0x7f0000000180)=[{&(0x7f00000009c0)="4d97be72540a56afcb6ccea6f0824690", 0x2802}], 0x1}}, {{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000280)="c980e9c87be587650c20f4608c6bdad6", 0x4ae4ef9f}], 0x1}}], 0x2, 0x0) 17:03:51 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000009f", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:03:51 executing program 3: socket$inet_udplite(0x2, 0x2, 0x11) 17:03:51 executing program 2: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$IOCTL_STATUS_ACCEL_DEV(r0, 0x40046103, 0x0) 17:03:52 executing program 3: pselect6(0x40, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000100)={0x77359400}, &(0x7f0000000180)={&(0x7f0000000140)={[0x4]}, 0x8}) 17:03:52 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880)='/dev/loop#\x00', 0x7f, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x1) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000000)={[0x48], 0x8, 0x40, 0x0, 0x20}) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) [ 1226.851515] QAT: failed to copy from user. 17:03:52 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x8) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x208e24b) r0 = open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000880)='/dev/loop#\x00', 0x7f, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x1) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={[0x48], 0x0, 0x40, 0x2, 0x20}) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000018c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 17:03:52 executing program 1: syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x7, 0x67940) 17:03:52 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000000000100000ff", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:03:52 executing program 2: write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x208e24b) r0 = open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000880)='/dev/loop#\x00', 0x7f, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x1) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, &(0x7f00000001c0)) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={[0x48], 0x0, 0x40, 0x2, 0x20}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@dev={0xfe, 0x80, [], 0x16}, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x2, 0x0, 0x0, 0xa, 0x0, 0xc31fc3b4eebcb907, 0x8}, {0x3ff, 0x0, 0x6f, 0x8, 0x6, 0x5, 0xfffffffffbd8b9e9}, {0x0, 0x0, 0x0, 0xffffffffffffff4d}, 0x5f, 0x0, 0x0, 0x0, 0x3}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4d3, 0xff}, 0x2, @in=@empty, 0x3504, 0x0, 0x2, 0x0, 0x5, 0x6, 0xffffffc0}}, 0xe8) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 17:03:52 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880)='/dev/loop#\x00', 0x7f, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x1) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000000)={[0x48], 0x8, 0x40, 0x0, 0x20}) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 17:03:52 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x8) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x208e24b) r0 = open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000880)='/dev/loop#\x00', 0x7f, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x1) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={[0x48], 0x0, 0x40, 0x2, 0x20}) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000018c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 17:03:52 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x25, 0x8000}, {&(0x7f0000000140)="10c4645f01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:03:52 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TYPE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x38, 0xd, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x38}}, 0x0) 17:03:52 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x8) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x208e24b) r0 = open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000880)='/dev/loop#\x00', 0x7f, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x1) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={[0x48], 0x0, 0x40, 0x2, 0x20}) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000018c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 17:03:52 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880)='/dev/loop#\x00', 0x7f, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x1) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000000)={[0x48], 0x8, 0x40, 0x0, 0x20}) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 17:03:52 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0}}, 0x0) [ 1227.719656] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1227.719656] 17:03:53 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/snd/seq\x00', 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, 0x0) 17:03:53 executing program 1: execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000001c0)=[&(0x7f0000000180)='\x00'], 0x1000) 17:03:53 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000002e00)=[{{0x0, 0x3e, &(0x7f0000000180)=[{&(0x7f00000009c0)="4d97be72540a56afcb6ccea6f0824690", 0x2804}], 0x1, 0x0, 0x0, 0x8dffffff}}, {{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000280)="c980e9c87be587650c20f4608c6bdad6", 0x4ae4ef9f}], 0x1}}], 0x2, 0x0) 17:03:53 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setfsgid(0x0) 17:03:53 executing program 3: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0xcc4}, 0x0, 0x0, 0x0) [ 1227.897601] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1227.897601] 17:03:53 executing program 3: ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xa) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r0 = socket$nl_audit(0x10, 0x3, 0x9) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x0, &(0x7f0000000300), 0x4) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x2100, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) 17:03:53 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000080)={'ip6tnl0\x00', 0x0}) 17:03:53 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x5f, 0x8000}, {&(0x7f0000000140)="10c4645f01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:03:53 executing program 1: pselect6(0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0) 17:03:53 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) 17:03:53 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880)='/dev/loop#\x00', 0x7f, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x1) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000000)={[0x48], 0x8, 0x40, 0x0, 0x20}) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 17:03:53 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(r0, &(0x7f0000000200)={&(0x7f0000000000), 0xc, &(0x7f00000001c0)={&(0x7f0000000040)={0x40, 0xb, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_ADT={0x14, 0x8, 0x0, 0x1, [{0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_IP2={0xc, 0x14, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @local}}}]}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x40}}, 0x0) 17:03:53 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) io_setup(0x9, &(0x7f0000000440)=0x0) io_destroy(r0) 17:03:53 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000002e00)=[{{0x0, 0x3e, &(0x7f0000000180)=[{&(0x7f00000009c0)="4d97be72540a56afcb6ccea6f0824690", 0x2804}], 0x1, 0x0, 0x0, 0x8dffffff}}, {{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000280)="c980e9c87be587650c20f4608c6bdad6", 0x4ae4ef9f}], 0x1}}], 0x2, 0x0) 17:03:53 executing program 5: fork() ptrace$setsig(0x4203, 0x0, 0x0, 0x0) 17:03:53 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/snd/seq\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r0, 0xc08c5335, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue0\x00'}) [ 1228.237113] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1228.237113] [ 1228.361575] audit: type=1326 audit(1618851833.568:3209): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=3922 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x466459 code=0x7ffc0000 [ 1228.396004] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1228.396004] 17:03:53 executing program 0: socketpair(0x1, 0x0, 0x9, &(0x7f0000000540)) 17:03:53 executing program 5: preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x2, 0x0) sendmsg$nl_route(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="480000001000054700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000000090001006866736300fdff00080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@newtfilter={0x34, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {}, {0xfff1}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x4}}]}, 0x34}}, 0x0) 17:03:53 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0xbf, 0x8000}, {&(0x7f0000000140)="10c4645f01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) [ 1228.493576] audit: type=1326 audit(1618851833.598:3210): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=3922 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=157 compat=0 ip=0x466459 code=0x7ffc0000 17:03:53 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000002e00)=[{{0x0, 0x3e, &(0x7f0000000180)=[{&(0x7f00000009c0)="4d97be72540a56afcb6ccea6f0824690", 0x2804}], 0x1, 0x0, 0x0, 0x8dffffff}}, {{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000280)="c980e9c87be587650c20f4608c6bdad6", 0x4ae4ef9f}], 0x1}}], 0x2, 0x0) [ 1228.589171] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1228.617436] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1228.617436] [ 1228.681149] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1228.699961] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1228.699961] 17:03:54 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x1c, 0xb, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 17:03:54 executing program 3: semget$private(0x0, 0x6, 0x0) 17:03:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x3000883}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000080}, 0xc881) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) 17:03:54 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000006000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000040)="45060f98150f20d8663508a20000000022d8650f01f60f20e06635000010000f22e00f01d967660fc7b1120d000066b90902000066b80068000066ba000000000f30650f01c9b812000f00d8f3ad", 0x4e}], 0x1, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4ce]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 17:03:54 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000002e00)=[{{0x0, 0x3e, &(0x7f0000000180)=[{&(0x7f00000009c0)="4d97be72540a56afcb6ccea6f0824690", 0x2804}], 0x1, 0x0, 0x0, 0x8dffffff}}, {{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000280)="c980e9c87be587650c20f4608c6bdad6", 0x4ae4ef9f}], 0x1}}], 0x2, 0x0) 17:03:54 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0xe0, 0x8000}, {&(0x7f0000000140)="10c4645f01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:03:54 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) bind(r0, &(0x7f0000000100)=@ipx={0x4, 0x0, 0x0, "d5518d748e0d"}, 0x80) 17:03:54 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x18, 0xb, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_ADT={0x4}]}, 0x18}}, 0x0) [ 1229.132133] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1229.132133] 17:03:54 executing program 1: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0xcc4}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140), 0x8}) 17:03:54 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000880)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x1) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, &(0x7f00000001c0)) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={[0x48], 0x8, 0x40, 0x2, 0x20}) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000018c0)) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @mcast1, @loopback}) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@dev={0xfe, 0x80, [], 0x16}, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x2, 0x0, 0x0, 0xa, 0x0, 0xc31fc3b4eebcb907}, {0x0, 0x0, 0x6f, 0x8, 0x6, 0x0, 0x0, 0x7}, {0x0, 0x2}, 0x0, 0x6e6bbf}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4d3}, 0x0, @in=@empty, 0x3504, 0x2, 0x2, 0x8, 0x0, 0x6}}, 0xe8) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000140)=ANY=[]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 17:03:54 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x8) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x208e24b) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880)='/dev/loop#\x00', 0x7f, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={[0x48], 0x0, 0x40, 0x2, 0x20}) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000018c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@dev={0xfe, 0x80, [], 0x16}, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x2, 0x0, 0x0, 0xa, 0x0, 0xc31fc3b4eebcb907, 0x8}, {0x3ff, 0x0, 0x6f, 0x8, 0x6, 0x5, 0xfffffffffbd8b9e9, 0x7}, {0x0, 0x2, 0x0, 0xffffffffffffff4d}, 0x5f, 0x6e6bbf, 0x0, 0x0, 0x3}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0xff}, 0x0, @in=@empty, 0x3504, 0x0, 0x2, 0x0, 0x5, 0x6, 0xffffffc0}}, 0xe8) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) [ 1229.265352] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1229.265352] 17:03:54 executing program 1: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0xcc4}, &(0x7f00000000c0), &(0x7f0000000100)={0x77359400}, &(0x7f0000000180)={&(0x7f0000000140)={[0x4]}, 0x8}) 17:03:54 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x1, 0x2}, 0x40) 17:03:54 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x18, 0xb, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0x4}]}, 0x18}}, 0x0) 17:03:55 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='freezer.self_freezing\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x59061, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x100000000, 0x7f}, 0x40200, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x8) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[], 0x208e24b) r1 = open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000880)='/dev/loop#\x00', 0x7f, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x1) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, &(0x7f00000001c0)) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000000)={[0x48], 0x8, 0x40, 0x2, 0x20}) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000018c0)) pwritev(r2, 0x0, 0x0, 0x7, 0x9) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @mcast1, @loopback}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@private, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@broadcast}}, &(0x7f00000005c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@dev={0xfe, 0x80, [], 0x16}, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f, 0x2, 0x0, 0x0, 0xa, 0x0, 0xc31fc3b4eebcb907, 0x8, 0x0, r4}, {0x3ff, 0x0, 0x6f, 0x8, 0x6, 0x5, 0xfffffffffbd8b9e9, 0x7}, {0x0, 0x2, 0x0, 0xffffffffffffff4d}, 0x5f, 0x6e6bbf, 0x0, 0x0, 0x3}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4d3, 0xff}, 0x2, @in=@empty, 0x3504, 0x2, 0x2, 0x8, 0x5, 0x6, 0xffffffc0}}, 0xe8) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) 17:03:55 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0xffe0, 0x8000}, {&(0x7f0000000140)="10c4645f01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:03:55 executing program 3: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[], 0x2bcf) shutdown(r0, 0x1) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0xf99e}], 0x1, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x1100) 17:03:55 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x59061, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x100000000, 0x7f}, 0x40200}, 0x0, 0x0, 0xffffffffffffffff, 0x8) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) r1 = open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000880)='/dev/loop#\x00', 0x7f, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x1) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, &(0x7f00000001c0)) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000000)={[0x48], 0x8, 0x40, 0x2, 0x20}) r3 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000018c0)) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @mcast1, @loopback}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@private, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@broadcast}}, &(0x7f00000005c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@dev={0xfe, 0x80, [], 0x16}, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f, 0x2, 0x0, 0x0, 0xa, 0x0, 0xc31fc3b4eebcb907, 0x8, 0x0, r4}, {0x3ff, 0x0, 0x6f, 0x8, 0x6, 0x5, 0xfffffffffbd8b9e9, 0x7}, {0x0, 0x2, 0x0, 0xffffffffffffff4d}, 0x5f, 0x0, 0x0, 0x0, 0x3}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4d3, 0xff}, 0x2, @in=@empty, 0x3504, 0x2, 0x2, 0x8, 0x5, 0x6, 0xffffffc0}}, 0xe8) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) 17:03:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom(r0, 0x0, 0x0, 0x40012142, 0x0, 0x0) 17:03:55 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 17:03:55 executing program 1: pselect6(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)={0x77359400}, &(0x7f0000000180)={&(0x7f0000000140)={[0x4]}, 0x8}) [ 1230.148788] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1230.148788] [ 1230.270335] blktrace: Concurrent blktraces are not allowed on loop7 17:03:55 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x59061, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x100000000, 0x7f}, 0x40200}, 0x0, 0x0, 0xffffffffffffffff, 0x8) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) r1 = open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000880)='/dev/loop#\x00', 0x7f, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x1) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, &(0x7f00000001c0)) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000000)={[0x48], 0x8, 0x40, 0x2, 0x20}) r3 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000018c0)) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @mcast1, @loopback}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@private, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@broadcast}}, &(0x7f00000005c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@dev={0xfe, 0x80, [], 0x16}, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f, 0x2, 0x0, 0x0, 0xa, 0x0, 0xc31fc3b4eebcb907, 0x8, 0x0, r4}, {0x3ff, 0x0, 0x6f, 0x8, 0x6, 0x5, 0xfffffffffbd8b9e9, 0x7}, {0x0, 0x2, 0x0, 0xffffffffffffff4d}, 0x5f, 0x0, 0x0, 0x0, 0x3}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4d3, 0xff}, 0x2, @in=@empty, 0x3504, 0x2, 0x2, 0x8, 0x5, 0x6, 0xffffffc0}}, 0xe8) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) [ 1230.327197] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1230.327197] 17:03:55 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0xffffffe0, 0x8000}, {&(0x7f0000000140)="10c4645f01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:03:55 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x59061, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x100000000, 0x7f}, 0x40200}, 0x0, 0x0, 0xffffffffffffffff, 0x8) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) r1 = open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000880)='/dev/loop#\x00', 0x7f, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x1) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, &(0x7f00000001c0)) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000000)={[0x48], 0x8, 0x40, 0x2, 0x20}) r3 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000018c0)) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @mcast1, @loopback}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@private, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@broadcast}}, &(0x7f00000005c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@dev={0xfe, 0x80, [], 0x16}, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f, 0x2, 0x0, 0x0, 0xa, 0x0, 0xc31fc3b4eebcb907, 0x8, 0x0, r4}, {0x3ff, 0x0, 0x6f, 0x8, 0x6, 0x5, 0xfffffffffbd8b9e9, 0x7}, {0x0, 0x2, 0x0, 0xffffffffffffff4d}, 0x5f, 0x0, 0x0, 0x0, 0x3}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4d3, 0xff}, 0x2, @in=@empty, 0x3504, 0x2, 0x2, 0x8, 0x5, 0x6, 0xffffffc0}}, 0xe8) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) 17:03:55 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x59061, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x100000000, 0x7f}, 0x40200}, 0x0, 0x0, 0xffffffffffffffff, 0x8) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) r1 = open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000880)='/dev/loop#\x00', 0x7f, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x1) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, &(0x7f00000001c0)) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000000)={[0x48], 0x8, 0x40, 0x2, 0x20}) r3 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000018c0)) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @mcast1, @loopback}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@private, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@broadcast}}, &(0x7f00000005c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@dev={0xfe, 0x80, [], 0x16}, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f, 0x2, 0x0, 0x0, 0xa, 0x0, 0xc31fc3b4eebcb907, 0x8, 0x0, r4}, {0x3ff, 0x0, 0x6f, 0x8, 0x6, 0x5, 0xfffffffffbd8b9e9, 0x7}, {0x0, 0x2, 0x0, 0xffffffffffffff4d}, 0x5f, 0x0, 0x0, 0x0, 0x3}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4d3, 0xff}, 0x2, @in=@empty, 0x3504, 0x2, 0x2, 0x8, 0x5, 0x6, 0xffffffc0}}, 0xe8) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) 17:03:55 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x59061, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x100000000, 0x7f}, 0x40200}, 0x0, 0x0, 0xffffffffffffffff, 0x8) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) r1 = open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000880)='/dev/loop#\x00', 0x7f, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x1) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, &(0x7f00000001c0)) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000000)={[0x48], 0x8, 0x40, 0x2, 0x20}) r3 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000018c0)) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @mcast1, @loopback}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@private, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@broadcast}}, &(0x7f00000005c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@dev={0xfe, 0x80, [], 0x16}, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f, 0x2, 0x0, 0x0, 0xa, 0x0, 0xc31fc3b4eebcb907, 0x8, 0x0, r4}, {0x3ff, 0x0, 0x6f, 0x8, 0x6, 0x5, 0xfffffffffbd8b9e9, 0x7}, {0x0, 0x2, 0x0, 0xffffffffffffff4d}, 0x5f, 0x0, 0x0, 0x0, 0x3}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4d3, 0xff}, 0x2, @in=@empty, 0x3504, 0x2, 0x2, 0x8, 0x5, 0x6, 0xffffffc0}}, 0xe8) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) 17:03:56 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='freezer.self_freezing\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x59061, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x100000000, 0x7f}, 0x40200, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x8) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[], 0x208e24b) r1 = open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000880)='/dev/loop#\x00', 0x7f, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x1) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, &(0x7f00000001c0)) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000000)={[0x48], 0x8, 0x40, 0x2, 0x20}) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000018c0)) pwritev(r2, 0x0, 0x0, 0x7, 0x9) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @mcast1, @loopback}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@private, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@broadcast}}, &(0x7f00000005c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@dev={0xfe, 0x80, [], 0x16}, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f, 0x2, 0x0, 0x0, 0xa, 0x0, 0xc31fc3b4eebcb907, 0x8, 0x0, r4}, {0x3ff, 0x0, 0x6f, 0x8, 0x6, 0x5, 0xfffffffffbd8b9e9, 0x7}, {0x0, 0x2, 0x0, 0xffffffffffffff4d}, 0x5f, 0x6e6bbf, 0x0, 0x0, 0x3}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4d3, 0xff}, 0x2, @in=@empty, 0x3504, 0x2, 0x2, 0x8, 0x5, 0x6, 0xffffffc0}}, 0xe8) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) 17:03:56 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x59061, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x100000000, 0x7f}, 0x40200}, 0x0, 0x0, 0xffffffffffffffff, 0x8) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) r1 = open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000880)='/dev/loop#\x00', 0x7f, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x1) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, &(0x7f00000001c0)) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000000)={[0x48], 0x8, 0x40, 0x2, 0x20}) r3 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000018c0)) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @mcast1, @loopback}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@private, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@broadcast}}, &(0x7f00000005c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@dev={0xfe, 0x80, [], 0x16}, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f, 0x2, 0x0, 0x0, 0xa, 0x0, 0xc31fc3b4eebcb907, 0x8, 0x0, r4}, {0x3ff, 0x0, 0x6f, 0x8, 0x6, 0x5, 0xfffffffffbd8b9e9, 0x7}, {0x0, 0x2, 0x0, 0xffffffffffffff4d}, 0x5f, 0x0, 0x0, 0x0, 0x3}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4d3, 0xff}, 0x2, @in=@empty, 0x3504, 0x2, 0x2, 0x8, 0x5, 0x6, 0xffffffc0}}, 0xe8) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) 17:03:56 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x59061, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x100000000, 0x7f}, 0x40200}, 0x0, 0x0, 0xffffffffffffffff, 0x8) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) r1 = open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000880)='/dev/loop#\x00', 0x7f, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x1) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, &(0x7f00000001c0)) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000000)={[0x48], 0x8, 0x40, 0x2, 0x20}) r3 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000018c0)) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @mcast1, @loopback}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@private, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@broadcast}}, &(0x7f00000005c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@dev={0xfe, 0x80, [], 0x16}, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f, 0x2, 0x0, 0x0, 0xa, 0x0, 0xc31fc3b4eebcb907, 0x8, 0x0, r4}, {0x3ff, 0x0, 0x6f, 0x8, 0x6, 0x5, 0xfffffffffbd8b9e9, 0x7}, {0x0, 0x2, 0x0, 0xffffffffffffff4d}, 0x5f, 0x0, 0x0, 0x0, 0x3}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4d3, 0xff}, 0x2, @in=@empty, 0x3504, 0x2, 0x2, 0x8, 0x5, 0x6, 0xffffffc0}}, 0xe8) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) 17:03:56 executing program 1: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0xcc4}, 0x0, &(0x7f0000000100)={0x77359400}, &(0x7f0000000180)={&(0x7f0000000140)={[0x4]}, 0x8}) 17:03:56 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='freezer.self_freezing\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x59061, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000000, 0x7f}, 0x40200}, 0x0, 0x0, 0xffffffffffffffff, 0x8) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) r1 = syz_open_dev$loop(&(0x7f0000000880)='/dev/loop#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, &(0x7f00000001c0)) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000000)={[0x48], 0x8, 0x40, 0x2, 0x20}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000018c0)) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@private, @in=@local}}, {{@in=@dev}, 0x0, @in=@broadcast}}, &(0x7f00000005c0)=0xe8) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 17:03:56 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0xffffffffffffffe0, 0x8000}, {&(0x7f0000000140)="10c4645f01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:03:56 executing program 3: openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvme-fabrics\x00', 0x4000, 0x0) 17:03:56 executing program 3: syz_emit_ethernet(0x4a, &(0x7f00000000c0)={@broadcast, @broadcast, @val, {@ipv6}}, 0x0) 17:03:56 executing program 1: syz_emit_ethernet(0x4e, &(0x7f0000000040)={@broadcast, @remote, @val, {@ipv6}}, 0x0) 17:03:56 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000000)={@broadcast, @remote, @val, {@ipv4}}, 0x0) 17:03:56 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x1, &(0x7f0000000000)="efa53897832466aa314824dc001192a12997e3fe31498d208558a5f9a1c6f91e098a8dc4a9350a8863f01b06", 0x2c) 17:03:56 executing program 3: r0 = semget(0x0, 0x0, 0x0) semctl$IPC_SET(r0, 0x0, 0x6, &(0x7f0000000080)={{0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}}) 17:03:57 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='freezer.self_freezing\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x59061, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x100000000, 0x7f}, 0x40200, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x8) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[], 0x208e24b) r1 = open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000880)='/dev/loop#\x00', 0x7f, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x1) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, &(0x7f00000001c0)) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000000)={[0x48], 0x8, 0x40, 0x2, 0x20}) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000018c0)) pwritev(r2, 0x0, 0x0, 0x7, 0x9) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @mcast1, @loopback}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@private, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@broadcast}}, &(0x7f00000005c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@dev={0xfe, 0x80, [], 0x16}, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f, 0x2, 0x0, 0x0, 0xa, 0x0, 0xc31fc3b4eebcb907, 0x8, 0x0, r4}, {0x3ff, 0x0, 0x6f, 0x8, 0x6, 0x5, 0xfffffffffbd8b9e9, 0x7}, {0x0, 0x2, 0x0, 0xffffffffffffff4d}, 0x5f, 0x6e6bbf, 0x0, 0x0, 0x3}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4d3, 0xff}, 0x2, @in=@empty, 0x3504, 0x2, 0x2, 0x8, 0x5, 0x6, 0xffffffc0}}, 0xe8) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) 17:03:57 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000140)={@broadcast, @broadcast, @val, {@ipv6}}, 0x0) 17:03:57 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @broadcast, @val, {@ipv4}}, 0x0) 17:03:57 executing program 1: syz_emit_ethernet(0x99, &(0x7f0000000180)={@broadcast, @remote, @val, {@ipv6}}, 0x0) 17:03:57 executing program 5: r0 = socket$inet6(0x18, 0x1, 0x0) shutdown(r0, 0x2) getsockname(r0, 0x0, &(0x7f0000000040)) 17:03:57 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x4}, {&(0x7f0000000140)="10c4645f01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:03:57 executing program 3: syz_emit_ethernet(0x56, &(0x7f0000000140)={@local, @random="3f42c22d165c", @val, {@ipv6}}, 0x0) 17:03:57 executing program 3: r0 = socket$inet(0x2, 0x1, 0x0) listen(r0, 0x0) setsockopt$sock_int(r0, 0xffff, 0x1023, 0x0, 0x0) 17:03:57 executing program 2: syz_emit_ethernet(0x57, &(0x7f0000000180)={@broadcast, @remote, @val, {@ipv6}}, 0x0) 17:03:57 executing program 5: syz_emit_ethernet(0xb4, &(0x7f0000000080)={@broadcast, @remote, @val, {@ipv4}}, 0x0) 17:03:57 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) preadv(r0, &(0x7f0000002740)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x0, 0x0) 17:03:57 executing program 3: syz_emit_ethernet(0x2e, &(0x7f0000000140)={@broadcast, @broadcast, @val, {@ipv4}}, 0x0) 17:03:58 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='freezer.self_freezing\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x59061, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x100000000, 0x7f}, 0x40200, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x8) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[], 0x208e24b) r1 = open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000880)='/dev/loop#\x00', 0x7f, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x1) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, &(0x7f00000001c0)) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000000)={[0x48], 0x8, 0x40, 0x2, 0x20}) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000018c0)) pwritev(r2, 0x0, 0x0, 0x7, 0x9) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @mcast1, @loopback}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@private, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@broadcast}}, &(0x7f00000005c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@dev={0xfe, 0x80, [], 0x16}, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f, 0x2, 0x0, 0x0, 0xa, 0x0, 0xc31fc3b4eebcb907, 0x8, 0x0, r4}, {0x3ff, 0x0, 0x6f, 0x8, 0x6, 0x5, 0xfffffffffbd8b9e9, 0x7}, {0x0, 0x2, 0x0, 0xffffffffffffff4d}, 0x5f, 0x6e6bbf, 0x0, 0x0, 0x3}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4d3, 0xff}, 0x2, @in=@empty, 0x3504, 0x2, 0x2, 0x8, 0x5, 0x6, 0xffffffc0}}, 0xe8) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) 17:03:58 executing program 5: syz_emit_ethernet(0x4e, &(0x7f0000000040)={@broadcast, @broadcast, @val, {@ipv6}}, 0x0) 17:03:58 executing program 2: syz_emit_ethernet(0x3a, &(0x7f0000000000)={@local, @broadcast, @val, {@ipv4}}, 0x0) 17:03:58 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x2000}, {&(0x7f0000000140)="10c4645f01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:03:58 executing program 1: r0 = msgget(0x0, 0x0) msgrcv(r0, 0x0, 0x0, 0x0, 0x0) 17:03:58 executing program 3: syz_emit_ethernet(0x62, &(0x7f0000000100)={@broadcast, @broadcast, @val, {@ipv6}}, 0x0) 17:03:58 executing program 3: syz_emit_ethernet(0x6e, &(0x7f00000000c0)={@local, @local, @val, {@ipv6}}, 0x0) 17:03:58 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) setsockopt$sock_timeval(r0, 0xffff, 0x2000, &(0x7f0000000000)={0xfffffffffffffffd}, 0x10) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000040)=@un=@abs={0x0, 0x0, 0x1}, 0x8, &(0x7f0000000280)=[{&(0x7f0000000080)="ee7484c268cf790ffdef6c09101a928cab8388261fb8c67223df7b12e5e396e35c04a90b2272045ee4594c61df366de6fe754ab609602f72c81232943040c56eb4b926d455546af9974062a46a19a3656fb2088debfb067573c46143c4025096b02bd123b9972d86d0bc57b20f579bbb87495203881eba241f4c0759a2f754366c72315b5c9f01bd32534d0dc16321a3c11fd7d3644c341fd2384ab1fc4b7258f70691586c7896e431b09b8b7728c2740dcefa4b3a20d613a6fb926551a799b7bcf8c7dd112dd8548eef99ba74e99dc03f29", 0xd2}, {&(0x7f0000000180)="02ae8f9a113bde083b9a5d17e1cb1fbd14a8f6037d9cf93d0e6416f4409b8ef6e26ea3d54ba07a7f4e21f099188bee6fa218804b327b747b8dc1c6b1e8e7361302aa7440db0b44f0f4657b62b91e87fda027a51fa5c9527176aa6035ca0507c096c9bec123ce4a5be23c67b0567aba00aa3a1107cef736920b007c95a7efbc2a87f3c783f3b73ebbc6827de64d2c7ebf033c6b51ef26d9b1ede84d6efdfd4c", 0x9f}], 0x2}, 0x0) 17:03:58 executing program 3: syz_emit_ethernet(0x42, &(0x7f0000000000)={@broadcast, @local, @val, {@ipv4}}, 0x0) 17:03:58 executing program 2: mprotect(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) connect$unix(r0, &(0x7f0000000000)=@abs={0x0, 0x0, 0x3}, 0x8) 17:03:58 executing program 5: syz_emit_ethernet(0x46, &(0x7f0000000000)={@broadcast, @broadcast, @val, {@ipv4}}, 0x0) 17:03:58 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x4000}, {&(0x7f0000000140)="10c4645f01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:03:58 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x6000}, {&(0x7f0000000140)="10c4645f01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:03:58 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt(r0, 0xffff, 0x0, 0x0, 0x0) 17:03:58 executing program 3: syz_emit_ethernet(0x4a, &(0x7f0000000140)={@broadcast, @broadcast, @val, {@ipv6}}, 0x0) 17:03:58 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000100)={@broadcast, @remote, @val, {@ipv4}}, 0x0) 17:03:59 executing program 1: syz_emit_ethernet(0x11b0, &(0x7f0000001500)=ANY=[@ANYBLOB="ffffffffffff2f9ad6f148f986dd643e9411117a330300000000000000000000ffff0000e304ff"], 0x0) 17:03:59 executing program 0: r0 = socket$inet6(0x18, 0x1, 0x0) shutdown(r0, 0x2) 17:03:59 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000f00)={@broadcast, @remote, @val, {@ipv6}}, 0x0) 17:03:59 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0101e7f1da80ef1138a6"], 0xa, 0x0}, 0x0) 17:03:59 executing program 2: syz_emit_ethernet(0xaa, &(0x7f0000000080)={@broadcast, @broadcast, @val, {@ipv4}}, 0x0) 17:03:59 executing program 3: syz_emit_ethernet(0x22, &(0x7f00000000c0)={@random="fb6d4e43b337", @empty, @val, {@generic={0x800, "9c679aa01d454ecf7d2219240d9aa837b8633d89"}}}, 0x0) 17:03:59 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x7f00}, {&(0x7f0000000140)="10c4645f01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:03:59 executing program 3: r0 = socket$inet6(0x18, 0x1, 0x0) listen(r0, 0x0) shutdown(r0, 0x2) 17:03:59 executing program 0: syz_emit_ethernet(0x2a, &(0x7f0000000080)={@broadcast, @broadcast, @val, {@ipv4}}, 0x0) 17:03:59 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000040)={@broadcast, @remote, @val, {@ipv6}}, 0x0) 17:03:59 executing program 3: syz_emit_ethernet(0x6e, &(0x7f0000000240)=ANY=[@ANYBLOB="aaaaaaaaaaaae54eecf3763c86dd60b6380f0038000000060000000000000400ffffac1400aafe8000000000000000000000000000aa"], 0x0) 17:03:59 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000140)={@broadcast, @local, @val, {@ipv6}}, 0x0) 17:03:59 executing program 1: syz_emit_ethernet(0x5e, &(0x7f0000000140)={@broadcast, @broadcast, @val, {@ipv6}}, 0x0) 17:03:59 executing program 3: semget$private(0x0, 0x3c, 0x0) 17:03:59 executing program 3: r0 = socket$inet6(0x18, 0x2, 0x0) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000000)=@in6={0x18}, 0xc, 0x0, 0x0, &(0x7f00000012c0)=[{0xf}], 0x10}, 0x0) 17:03:59 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8002}, {&(0x7f0000000140)="10c4645f01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:03:59 executing program 0: syz_emit_ethernet(0x9d, &(0x7f0000000180)={@broadcast, @remote, @val, {@ipv6}}, 0x0) 17:03:59 executing program 5: mprotect(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x1) r0 = socket$unix(0x1, 0x1, 0x0) getsockname(r0, 0x0, &(0x7f0000000080)) 17:03:59 executing program 2: r0 = msgget(0x0, 0x80) msgsnd(r0, &(0x7f0000000000)={0x1}, 0x8, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_timeval(r1, 0xffff, 0x1021, 0x0, 0x0) msgget(0x0, 0x0) 17:03:59 executing program 3: syz_emit_ethernet(0x22, &(0x7f00000001c0)={@broadcast, @empty, @val, {@ipv4}}, 0x0) 17:03:59 executing program 1: syz_emit_ethernet(0x46, &(0x7f0000000340)={@broadcast, @local, @val, {@ipv6}}, 0x0) 17:03:59 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@random="fb6d4e43b337", @broadcast, @val, {@ipv4}}, 0x0) 17:03:59 executing program 0: syz_emit_ethernet(0x86, &(0x7f0000000080)={@broadcast, @remote, @val, {@ipv4}}, 0x0) 17:03:59 executing program 2: syz_emit_ethernet(0x4e, &(0x7f0000000040)={@broadcast, @remote, @val, {@ipv6}}, 0x0) 17:03:59 executing program 3: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@broadcast, @remote, @val, {@ipv4}}, 0x0) 17:03:59 executing program 1: syz_emit_ethernet(0x46, &(0x7f0000000000)={@broadcast, @broadcast, @val, {@ipv4}}, 0x0) 17:03:59 executing program 5: syz_emit_ethernet(0x2a, &(0x7f0000000140)={@broadcast, @broadcast, @val, {@ipv4}}, 0x0) 17:03:59 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8003}, {&(0x7f0000000140)="10c4645f01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:03:59 executing program 0: mprotect(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x1) r0 = socket$unix(0x1, 0x1, 0x0) getsockopt$sock_linger(r0, 0xffff, 0x80, &(0x7f0000000040), &(0x7f0000000080)=0x8) 17:03:59 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000100)={@broadcast, @remote, @val, {@ipv6}}, 0x0) 17:04:00 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_timeval(r0, 0xffff, 0x1023, 0x0, 0x0) 17:04:00 executing program 5: r0 = socket$inet6(0x18, 0x2, 0x0) recvfrom$inet6(r0, &(0x7f0000000040)=""/196, 0xc4, 0x0, 0x0, 0x0) 17:04:00 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000100)={@broadcast, @local, @val, {@ipv6}}, 0x0) 17:04:00 executing program 1: syz_emit_ethernet(0x4a, &(0x7f00000000c0)={@broadcast, @broadcast, @val, {@ipv6}}, 0x0) 17:04:00 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local, @broadcast, @val, {@ipv4}}, 0x0) 17:04:00 executing program 0: syz_emit_ethernet(0x36, &(0x7f0000000100)={@broadcast, @local, @val, {@ipv6}}, 0x0) 17:04:00 executing program 3: syz_emit_ethernet(0x4a, &(0x7f0000000080)={@broadcast, @broadcast, @val, {@ipv6}}, 0x0) 17:04:00 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8004}, {&(0x7f0000000140)="10c4645f01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:00 executing program 5: syz_emit_ethernet(0x4a, &(0x7f00000000c0)={@broadcast, @broadcast, @val, {@ipv6}}, 0x0) 17:04:00 executing program 2: syz_emit_ethernet(0x46, &(0x7f0000000000)={@broadcast, @remote, @val, {@ipv4}}, 0x0) 17:04:00 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_timeval(r0, 0xffff, 0x1023, &(0x7f0000000000), 0xd) 17:04:00 executing program 1: syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @local, @val, {@ipv6}}, 0x0) 17:04:00 executing program 0: syz_emit_ethernet(0x3e, &(0x7f0000000080)={@broadcast, @broadcast, @val, {@ipv4}}, 0x0) 17:04:00 executing program 3: syz_emit_ethernet(0x2a, &(0x7f0000000040)={@random="fb6d4e43b337", @broadcast, @val, {@ipv4}}, 0x0) 17:04:00 executing program 5: syz_emit_ethernet(0x6e, &(0x7f0000000100)={@broadcast, @remote, @val, {@ipv6}}, 0x0) 17:04:00 executing program 2: syz_emit_ethernet(0x42, &(0x7f0000000080)={@broadcast, @remote, @val, {@ipv4}}, 0x0) 17:04:00 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8005}, {&(0x7f0000000140)="10c4645f01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:00 executing program 3: syz_emit_ethernet(0x4a, &(0x7f0000000080)={@broadcast, @remote, @val, {@ipv6}}, 0x0) 17:04:00 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000000100)={@broadcast, @local, @val, {@ipv6}}, 0x0) 17:04:00 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000080)={@broadcast, @remote, @val, {@ipv6}}, 0x0) 17:04:00 executing program 3: syz_emit_ethernet(0x6e, &(0x7f00000000c0)={@broadcast, @local, @val, {@ipv6}}, 0x0) 17:04:00 executing program 5: syz_emit_ethernet(0x77, &(0x7f00000000c0)={@broadcast, @remote, @val, {@ipv4}}, 0x0) 17:04:00 executing program 2: r0 = socket$inet6(0x18, 0x1, 0x0) getsockopt(r0, 0x6, 0x1, 0x0, 0x0) 17:04:00 executing program 3: syz_emit_ethernet(0x46, &(0x7f0000000000)={@broadcast, @broadcast, @val, {@ipv6}}, 0x0) 17:04:00 executing program 1: syz_emit_ethernet(0x46, &(0x7f0000000000)={@broadcast, @broadcast, @val, {@ipv4}}, 0x0) 17:04:00 executing program 0: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @empty, @val, {@ipv4}}, 0x0) 17:04:00 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8006}, {&(0x7f0000000140)="10c4645f01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:00 executing program 3: r0 = socket$inet6(0x18, 0x2, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f0000000100)=@in, 0xc, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="11"], 0x20}, 0x0) 17:04:00 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_timeval(r0, 0xffff, 0x2000, &(0x7f0000000000), 0xd) 17:04:00 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0xffff, 0x1023, 0x0, 0x0) listen(r0, 0x0) 17:04:00 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0xffff, 0x1023, 0x0, 0x0) shutdown(r0, 0x0) 17:04:00 executing program 1: syz_emit_ethernet(0x8a, &(0x7f0000000100)={@broadcast, @remote, @val, {@ipv6}}, 0x0) 17:04:01 executing program 0: syz_emit_ethernet(0x4e2, &(0x7f0000000100)={@broadcast, @broadcast, @val, {@ipv6}}, 0x0) 17:04:01 executing program 3: syz_emit_ethernet(0x22, &(0x7f0000000000)={@broadcast, @random="958366e16198", @val, {@ipv4}}, 0x0) 17:04:01 executing program 5: r0 = msgget(0x0, 0x0) msgsnd(r0, &(0x7f0000000000), 0x8, 0x0) 17:04:01 executing program 3: syz_emit_ethernet(0x4e, &(0x7f0000000000)={@broadcast, @remote, @val, {@ipv6}}, 0x0) 17:04:01 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8007}, {&(0x7f0000000140)="10c4645f01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:01 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000000)=@in6={0x18}, 0xc, 0x0, 0x2, &(0x7f00000012c0)=[{0x10}], 0x10}, 0x0) 17:04:01 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) shutdown(r0, 0x2) 17:04:01 executing program 3: syz_emit_ethernet(0x7e, &(0x7f0000000100)={@broadcast, @remote, @val, {@ipv6}}, 0x0) 17:04:01 executing program 0: syz_emit_ethernet(0x2a, &(0x7f0000000080)={@broadcast, @broadcast, @val, {@ipv4}}, 0x0) 17:04:01 executing program 5: syz_emit_ethernet(0x2fc6, &(0x7f0000000340)={@broadcast, @local, @val, {@ipv6}}, 0x0) 17:04:01 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) setsockopt$sock_timeval(r0, 0xffff, 0x2000, &(0x7f0000000000)={0xfffffffffffffffd}, 0x10) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000040)=@un=@abs={0x0, 0x0, 0x1}, 0x8, &(0x7f0000000280)=[{&(0x7f0000000080)="ee7484c268cf790ffdef6c09101a928cab8388261fb8c67223df7b12e5e396e35c04a90b2272045ee4594c61df366de6fe754ab609602f72c81232943040c56eb4b926d455546af9974062a46a19a3656fb2088debfb067573c46143c4025096b02bd123b9972d86d0bc57b20f579bbb87495203881eba241f4c0759a2f754366c72315b5c9f01bd32534d0dc16321a3c1", 0x91}], 0x1}, 0x0) 17:04:01 executing program 2: syz_emit_ethernet(0x66, &(0x7f00000000c0)={@local, @broadcast, @val, {@ipv6}}, 0x0) 17:04:01 executing program 1: syz_emit_ethernet(0x11b0, &(0x7f0000001500)=ANY=[@ANYBLOB="ffffffffffff2f9a56f148f986dd643e9411117a33030000000000000000ba00ffff0000e304ff"], 0x0) 17:04:01 executing program 3: syz_emit_ethernet(0x46, &(0x7f0000000180)={@local, @empty, @val, {@ipv6}}, 0x0) 17:04:01 executing program 3: syz_emit_ethernet(0x22, &(0x7f0000000040)={@broadcast, @remote, @val, {@ipv4}}, 0x0) 17:04:01 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8008}, {&(0x7f0000000140)="10c4645f01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:01 executing program 5: syz_emit_ethernet(0x22, &(0x7f0000000000)={@broadcast, @random="958366e16198", @val, {@ipv4}}, 0x0) 17:04:01 executing program 3: r0 = socket$inet6(0x18, 0x1, 0x0) shutdown(r0, 0x2) setsockopt$sock_int(r0, 0xffff, 0x1001, &(0x7f0000000040), 0x4) 17:04:01 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) connect$unix(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="3701"], 0xa) 17:04:01 executing program 3: syz_emit_ethernet(0x7e, &(0x7f0000000080)={@broadcast, @broadcast, @val, {@ipv4}}, 0x0) 17:04:01 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) sendmsg$unix(r0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB="10000000ffff000001"], 0x10}, 0x0) 17:04:01 executing program 2: syz_emit_ethernet(0x7bf, &(0x7f0000000140)={@broadcast, @broadcast, @val, {@ipv6}}, 0x0) 17:04:01 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @remote, @val, {@ipv4}}, 0x0) 17:04:01 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0xffff, 0x1021, &(0x7f00000001c0)=0x7fffffff, 0x4) 17:04:01 executing program 0: syz_emit_ethernet(0x62, &(0x7f0000000000)=ANY=[@ANYBLOB="ada494211fd2f7e6d77d158286dd601fea2c3c00fe8000000000000000000100000000bbff020000000000000000000000000001"], 0x0) 17:04:01 executing program 3: syz_emit_ethernet(0x6e, &(0x7f00000000c0)={@local, @random="e54eecf3763c", @val, {@ipv6}}, 0x0) 17:04:01 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000000f00)=ANY=[@ANYBLOB="ffffffffffffaa8daaaaaabb86dd6084600e00000000000000000000000000000000000000fbb3"], 0x0) 17:04:01 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8009}, {&(0x7f0000000140)="10c4645f01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:01 executing program 3: r0 = perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x8954, &(0x7f0000000040)=0x2) 17:04:01 executing program 2: socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000280)) 17:04:01 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000013f00)={0x0, 0x0, 0x0}, 0x2260) 17:04:01 executing program 5: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x80108906, 0x0) 17:04:01 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) sendmsg$inet(0xffffffffffffffff, 0x0, 0x4004000) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(r1, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) r3 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r3, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x2a}, @dev}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000840)=ANY=[@ANYBLOB="180000004000040000000000000005009500000000000000d387777ab82499fd7a38de0cd87509fd1d80585afff33091b533c720577af017450b2a886733ceb617f121d79e3628e72be0d39e77dcb16887214f541bb89938c19978ea22254c58d75439a1edfee2adfeaffc2d14ffab3ddc1dc20efe6f7c3913f273d7b48d10b9904fda943414bf2f1c68c4878937c8f83a5203d5b63a2689bccccbd486e66c4a5e059db4238ee52d47e704465a6a9726ba058bd85acc9322902c0200e50faf989fd44b66da1b795d04df0d9bfd563c608880516f25136a81d6b48d5f205d0d44bfabd7013f8192a3029ad96441ba7db2c3e80f0dbf59164e8806259d3b7633f704b15c3dc9259fa3aa3106e4821a62a5c356d074eeb638904c8af7cd704f4afa93fc61d6ba0e2148b09a28cd376bc43a1445c635c73a6bd9cda98b27f9981f6af46d74e057515bef88b90f987de14f2a9e1b07dd8b865715f25a4f95cc0024e18e96570000f7dab1a31b2f0fb51e0d9348aa80e2e60cd60800000088b06a13d14f14e829e4330e4475096c886864c5bf8be6441e7e24a4162d88a668b65bc80a10d3357cd62db832a98c116b0000d92a6dabe73e52fd78db326416f055e4f531abb858e1a4ee680c94407e1ee01d68139635ab636723848d90a40d2a2298b5cb3cbe8366b09957fc5ee5472fb7671f1b99a7b0508949eaf27f98356e321bb3ef7bfd1c957c1fe85603ff909878b9db38af432516700efc72e2847e1e86967d2a12a357a69a6cd73b73cfff08965818b338e5f5d20031bad9c612f6ea2861dd34e5be9aa536bd5b16857f8a07c834e3bcd414872719ba6e7c6936dd077c98e273537b833df0f0d1f75fb153292c2c8d93d7bede97270f771917308d5cedb3423b7f4f38cc671fcfe429d71e08440ca5f3f81930d17ed7058da07ca3460a1b5877fe36b2a65627b305aa874fb59caa32aef136326076e22f7661c916d0215a6c6b6b140ed86a97ab7721f1eb189c42936336dfa1f0df027c67b668f2a0a3b4e213423caaa03eb17c943a912122013f16ca05cc2a99f9afc7b31c85c5694396d1b4a3c028ac09c44b8a4430c7b1ede6dcbb336abf6dfb3fc9dbd0ef24b01da4e278114cb81a928731930bad795c1b39e0ab09c047bc9ce9f0fe32da6abad0e2bf7e5a30722392b7666b5831d69158f1773201f6fc7bb52e9f0da712f2af42a11ffd44f481a546ce0774fc7369dc7e7583de2f22d3e1ade747bab0c4af9b23ed6c0bb71944acc239f9616759ffb423670051ca340e2a81870331ea01c57609758b9bcea0778b23561bdfb204e05844c00f2577581d03a1951500000e1673ceaec0c5000001008d2f47cb08fd9c5885d06833b094f91a8ea02318318cc6b8d6ad77a8d2d3ff8779d34ac10c010100009c050467ced134bafebcdd91664bf11ffd667fd7d0686e5e3a50e8d6b39c73e3a9392814f525429e067ac0248000000000000000992354bf8096355c27bef22a91deeb17107895beff0f3728c42ee0581562fc7ed0a230645b1f5af6373cc8ac3a865934adf6d6f9a4e01c6d659ba585a60790802ed79f47c1ccbf8524fa10398ef91eb54a3e3e3ef13a0753bf5d05081157466f48d7758882e903cda3e93ece7c8e64719067ada30aec0f767d91c0678d9be28d0e6c20a25dca96d3af2942d34b93a69fcebcbb01df095803002f1fca52eb513b1308cfa0f747ce8c928e038f035a79672514570b832c2494e370b56fc1e13e901cfe7844b1b20000fe386f880c450ed587cc6a81e18ac79cafa85aed3877cc6258c7565ef49e5e419657937f0bb5392a7fcb4e7d326501f73700000000712e39fbfe4e013562095dad3ccc7e8faceefe878ea00652c0f488a0fb55e9f922e2a85acb65e3ff2c363725f3cb901425a1128999180187f869ca5db4748a3497c8b60000000000e156f44a8fdb4b28ea811a70d0e44dea33bed164a65afb60de379f1a098cca450a9c83097c6fe39959da79f3d4a78f917c0d3995bbdf07d0c6b5b2315c0303d0e398c3230d6eba87be68181fed1266381a2c7689c3c60702863fe71c60a519f6aea54f4d6023a9b1d95d0ed14ea286e2013ef87924ee1a851298f104f3b26f49f62f73dc1420de064b12295bcdf2c418688c8edc5d6a92c40ba9ea60e47bd64ab3dddfe3cb24c4de1d0dd802ed1f3312412522a0303bc011b55da32a852a9d4d1a537a375ed55e5c1dc9fe330000000000000000000000000000ee0af62e6dd80951e802f9bd94d83c47f47fbb84d797e49b65778974bb5a41101412d255efcd3488"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r4, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 17:04:02 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000005d80)={0x18, 0x9, &(0x7f0000000180)=@framed={{}, [@btf_id, @jmp={0x5, 0x0, 0x1}, @initr0, @jmp={0x5, 0x0, 0xd, 0x3, 0x9}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x6c, &(0x7f0000000240)=""/108, 0x40f00, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000005d40)={0x0, 0xb, 0x3, 0x80}, 0x10}, 0x78) 17:04:02 executing program 1: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000440)='ns/net\x00') close(r0) 17:04:02 executing program 3: r0 = perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0xc0189436, 0x0) 17:04:02 executing program 2: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) 17:04:02 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) close(r0) 17:04:02 executing program 5: bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000140)={@map}, 0x10) 17:04:02 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x800b}, {&(0x7f0000000140)="10c4645f01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:02 executing program 3: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x8901, 0x0) 17:04:02 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0xc020660b, 0x0) 17:04:02 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000002580)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=[{0x1010, 0x0, 0x0, "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"}, {0xf8, 0x0, 0x0, "fcb6805497003eaf45d1b4bbf5ebf8be0331de2ccea0659672aa0b16a1ea255e062e3238e6772008036605df673dbfe655f512ef9b0e7b7fee39756414385945d67e199474b401579f1a162947668bf8a8eaa79c7d33c37116ca448d8151799e76b878e77160c1ddf8a19a96e20112b8de4c27d5d6c7482c2831a2f6c6c88603f97e113cee8a358d2efeca5625b1c643de67931c2f919e56ab67f1210e2d7de7e44f96cf987a61c26cda0e8c64e06419d04f5ca0eb4dba5448e910a0df0d04a6aa787b6ac11cd27b1d0c07bd78c43af10bb88bd0b99bafcd85a0324239c9a149b0"}, {0xf00, 0x0, 0x0, "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"}], 0x2008}, 0x0) 17:04:02 executing program 3: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x8940, 0x0) 17:04:02 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000003e40)={&(0x7f0000003c80)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict={0x0, 0x0, 0x0, 0xb, 0x5}]}}, &(0x7f0000003d40)=""/234, 0x26, 0xea, 0x1}, 0x20) 17:04:02 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000005d80)={0x0, 0xa, &(0x7f0000000180)=@framed={{}, [@alu={0x7, 0x0, 0x8, 0x2, 0xb, 0x2, 0xfffffffffffffff0}, @exit, @jmp={0x5, 0x0, 0x1, 0x7, 0x0, 0x18}, @initr0, @call, @jmp={0x5, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x6c, &(0x7f0000000240)=""/108, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000005d40)={0x0, 0x0, 0x3}, 0x10}, 0x78) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000210c0)=@bpf_tracing={0x1a, 0xe, &(0x7f0000020f80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14e9}, [@generic={0x7, 0x1, 0x2, 0x4, 0x2}, @jmp={0x5, 0x1, 0x0, 0x5, 0x1, 0x18, 0x8}, @map={0x18, 0x3}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x94c9, 0x0, 0x0, 0x0, 0x6}, @alu={0x7, 0x0, 0x2, 0x2, 0x8, 0x1e, 0x10}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x2}]}, &(0x7f0000021000)='syzkaller\x00', 0x5, 0x0, 0x0, 0x41000, 0x1, [], 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000021040)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000021080)={0x4, 0x8, 0xc7f, 0x7}, 0x10, 0x17598}, 0x78) 17:04:02 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000003e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x40) 17:04:02 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) 17:04:02 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[@ip_ttl={{0x14}}], 0x18}, 0x0) 17:04:02 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x800f}, {&(0x7f0000000140)="10c4645f01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:02 executing program 0: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000104c0)={@map, 0xffffffffffffffff, 0x21}, 0x10) 17:04:02 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000003e40)={&(0x7f0000003c80)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict]}}, &(0x7f0000003d40)=""/234, 0x26, 0xea, 0x1}, 0x20) 17:04:02 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x2, 0xffffffffffffffff) 17:04:02 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x5411, 0xffffffffffffffff) 17:04:02 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) write$cgroup_int(r0, 0x0, 0x0) 17:04:02 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef={0x1}]}}, &(0x7f0000000080)=""/232, 0x26, 0xe8, 0x1}, 0x20) 17:04:02 executing program 3: r0 = perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000300)='freezer.state\x00') 17:04:02 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000009200)={0x0, 0x0, 0x0}, 0x0) 17:04:02 executing program 5: r0 = perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x8933, 0x0) 17:04:02 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000005d80)={0x18, 0x4, &(0x7f0000000180)=@framed={{}, [@jmp]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:04:02 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8023}, {&(0x7f0000000140)="10c4645f01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:02 executing program 3: socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000400)=""/151, 0x97}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000000)="7f7e8a04e1b16ba2183733dba5f07b83de84423d2eb8d91f5c41c77dbffc35106c7e3c8bdc35c3501fe4c91a105cd282060eb5d75cc9bb43057cdf0e1df10d9cd73a7e5b5032a234a7c40113b96d2c1bf3e7468f31b865c014fe4686f183eb11568d1d4b7dec1baacb707b09aec9dd1a7268fd3ac2444b78509784ae08ed99292f4df807d5a9f8fe", 0x88}, {&(0x7f00000000c0)="744c1b6df8b8226635b873b710e9aab3", 0x10}], 0x2, &(0x7f00000004c0)=ANY=[], 0xb0}, 0x0) 17:04:02 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x8901, 0xffffffffffffffff) 17:04:03 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000003e40)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 17:04:03 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000003400)={0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000003640)={0x0, 0x0, &(0x7f0000003540)=[{0x0}], 0x1, &(0x7f0000003580)=[@ip_retopts={{0x10}}, @ip_tos_u8={{0x11}}], 0x28}, 0x0) 17:04:03 executing program 3: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x8912, 0x0) 17:04:03 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg(r0, &(0x7f0000002880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2260}, 0x0) 17:04:03 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000003400)={0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000003640)={&(0x7f0000003440)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000003540)=[{0x0}], 0x1, &(0x7f0000003580)=[@ip_retopts={{0x10}}, @ip_tos_u8={{0x11}}], 0x28}, 0x20000005) 17:04:03 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000005d80)={0x18, 0xa, &(0x7f0000000180)=@framed={{}, [@alu={0x7, 0x0, 0x8, 0x2, 0xb, 0x2, 0xfffffffffffffff0}, @map_val={0x18, 0x1}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x3}, @exit, @jmp={0x5, 0x0, 0x0, 0x7, 0x0, 0x18}]}, &(0x7f0000000200)='GPL\x00', 0x1, 0x6c, &(0x7f0000000240)=""/108, 0x40f00, 0x11, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005d00)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000005d40)={0x0, 0xb, 0x3, 0x80}, 0x10}, 0x78) 17:04:03 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0x6, 0x0, 0x0, 0x9}, 0x40) 17:04:03 executing program 5: r0 = perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x2405, 0x0) 17:04:03 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8048}, {&(0x7f0000000140)="10c4645f01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:03 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x11, &(0x7f0000000380)=[@ip_ttl={{0x14}}], 0x18}, 0x0) 17:04:03 executing program 1: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f00000005c0)=@ax25={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x8}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @bcast, @default, @default]}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000640)="18c5891510591e2580868ba27767a13066c7224b163395c443a92a3366", 0x1d}, {&(0x7f0000000680)="aaa36be550ec3c4d72e6d67f1bfc6ea6089550f901cab5c4555b77e0a1b0e6eb079a2e4fae2e305c9063969add54fe0d66237fc636eccfc8ed94426893b503b85310e4392503", 0x46}, {&(0x7f0000000700)="c73d98b46de90065ff6517d94912ae482ec115d3b948a0729978fd94de9df4b7cd4831e82b8780fc9431b74bd8a924b843b22b87bea381801e20b5ee2234562cf1640d0514820a035b0d6bff43964d3fe8d8b831245dd3869be743e9bde100dccd8e1c28c223fe2e253a0e309f17451f3fa0d9eeeaafd05cede6d62e1d67848053e491", 0x83}, {&(0x7f00000007c0)="9c4c0577b8f6bec9be0d186780ac8baa92e78341fa60d8cfe0b2f4431fa92f85da2c90d4f49359a7bd4e1625a13d6a86a9c624c8ec07", 0x36}], 0x4, &(0x7f0000000880)=[{0x28, 0x3a, 0x6c8, "15b9fa6b71b0f150470e7cab9c3831b667a2314697"}, {0x48, 0x84, 0x0, "72a2689e80aa120b37cacec83a35fa26ddeb7b401b16ff034734a34c1e2fbbb074bb6849f67d1414f36d6c29b45c4c2e02f8843d"}, {0x38, 0x1a, 0x4, "2f16549e1f63e2ada6d996a0cd5eb1496ea44b9c77d01a4c6fd3eb424d20fb67d75b7e"}, {0x98, 0x107, 0xd122, "44a156506a73320909b31f8a5a923e3406863aec82aac9083a59f2e696e3be7daa25693805bf9c51341af0d27f768af4b78a35bf37f5c8a2dc877635cbc3a12e873045a45d07eb6d1bbd6c01d6e5d7732099564f39409e6991ac6c4ab06b8166ae9fe131270886bfd36a1055a86ea2b413e74f601222bff7ac9baa96b4531d641c9cad53b8"}, {0x108, 0x118, 0xfffffffd, "9a8c8393065601f53430e78d91c7e9240c4d8972d8fa35905c80105972afbfea454966d72a7b4ef08a140b9cb008da30cdfc3010621475bf05554ef9b7bdda990bd02642ce8b3950e99a22e4f0abc687c6b031f21d7149d1259fcd8c9c279fddb10ddf527a886e5d530c104537bb7e2f15f43306718c786535ad017727b184ba465a750f980be5cb810648fe274e4a0c7d376f657403a75d39f2a5ca8fba9b012fd5ac27db863fbb71ea091207d5a37b58c490494242f923b04787b9cb18038a0740616902318d87555fa629e2d7c1a5023cc11972376ec4a39fdc0c62f68bc006878ecce1f86473a6a9992dbc2ceef698a575"}, {0x70, 0x118, 0x5c, "36cc9c4939fe4a49bdb154e440046797dc37b935b318e18391ca28c340344e16ff4aad8af3f881c0595849876998eea855562be2b8c39df0c5ab75292056ab744ce0bf4d781fdfbf11f8360bb59be8037135cc5d5f2bff3754271d0cc54d8e2c"}], 0x2b8}, 0x20044080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x84192, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) r1 = socket$kcm(0x21, 0x0, 0x2) r2 = socket$kcm(0xa, 0x3, 0x73) sendmsg(r2, &(0x7f0000000800)={&(0x7f00000000c0)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000180)=[{0x18, 0x29, 0xb, "0f"}], 0x18}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, &(0x7f0000000580)={r1}) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x0, @mcast2, 0x9}, 0x80, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="3800000000000000290000000400000078040409"], 0x38}, 0x8000) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r3 = socket$kcm(0xa, 0x5, 0x0) socket$kcm(0x29, 0x7, 0x0) close(r3) r4 = socket$kcm(0xa, 0x3, 0x73) sendmsg(r4, &(0x7f0000000800)={&(0x7f00000000c0)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000180)=[{0x18, 0x29, 0xb, "0f"}], 0x18}, 0x0) sendmsg$kcm(r3, &(0x7f0000000380)={&(0x7f0000000280)=@pppol2tpin6={0x18, 0x1, {0x0, r3, 0x2, 0x4, 0x2, 0x4, {0xa, 0x4e24, 0x3, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x8}}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000300)="6bb2309836efc75d82aed868dbb378741fdd4c7d1c98e0998b99926e372f01720837ab4dae862f95adb6142720222a07b8b0ca0789dc5e4137b4c54472152c2657c32f459f852c81f8f7", 0x4a}, {&(0x7f0000000400)="efbdac6d2d649d5ad8127e231752f7951e56b5896d9215569a4af416c353dc0305abda1121fb4bd5e78ef9c8ee6ab77de1ebd4d21b3ae1b52fbd9b8918b943100b7d87b4fa08966c885702cdb6f4d8846716a1f13cd4bf15b20b0315cf02225bb1", 0x61}, {&(0x7f0000000480)="957c33491ef57e31b4ccb6c6d545451acf0e677651a138182c978806f6922bb80c9e452e935b1731b9916c7b7d165f263f9476e1bced8edac093e764c5439e689c80849ea2fc0402134afd787cb0e0287e2658c1fca447847266a5a2958ff49855f74dd20d0a7602d93fa063aa0f18fbe98ed321a5c63c0d2ce4621ce4af424f3cf4a62b3273c64889080fefe135d666c6331e23b319763adf555b14f64a7a2b4b0a3a0bf7702f4a7ec4739e75709201b99cbeb6c579240b460c095d6f653eb9b3", 0xc1}], 0x3, &(0x7f0000002e00)=ANY=[@ANYRESOCT=r4], 0x1380}, 0x8c0) socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r3, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r3, &(0x7f0000001a00)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f00000015c0)="c90477c45551f219de78f5d46a669a920ba991b2", 0x14}, {&(0x7f0000001600)="2ecce5a27a8d5e627ff06435717914bf5c1836533b9e57c3a2e60ffa3aca62a071fd351da14cadb8d5a05618f83d707684bc8c4660c1e57a497066781e6d60ba97e405566990954ca84d0f52032e59406e434559c47f55528b51401a55667b56c6c4f8e4dcd439d5e4d99b170fa83f4360124610c91009c1f196f9d3eea4", 0x7e}, {0x0}], 0x3, &(0x7f0000001740)=[{0xd8, 0xff, 0x6, "d729f85f3f4185ff5e186363e32ad05c29a291fb86b9d49f1b1177a46e30ca2628029aad4880efcc3ec8f8da0f3fd24559263e1ba02f06ed00fa9eba166067d740766e38f8575b414a8eebfcafbb32d817a018f10c3549edaf33944a02747560d6e2d174081349f2d5e42e976930069533e3e4fc16cb98c9e3a30cfd0c1c78e9c061a47cff0cbf19189786265c03af5383037b947aa95069123f2244dcf73fe838d191db307f909e572e3a831d84ab1cd7e8551801d303b67b5acb0fd604a0cf52034e70abba0d19"}, {0x50, 0x119, 0x0, "ae9fef1b3c3734601dbd9404b13d45533b5a9b15e0736e5168befb8bbd269ff053c7bcf00ff5a2c0d0ba28df0b09494bc59815d36bd3c3a61f78d8a32d"}, {0xa8, 0x110, 0x7ff, "e4ef71f88034d37b9e0034851265fff186537895b6fdce0563c24540a0848e4d911ace754995589ebed6fa121e45b6f03b32c13c6523ad95af2be42b7538a8eebb18a870a782883f644ea627c6fb2c276bcbb898fe04c2123ec495de6594f965ae851e995c6e9b684df5d31d91bf68d74f6bd3257d20a596637e3d45f71a1a4e9f2fe16ef295cde03e51cace4ca7034c2b9e8f"}], 0x1d0}, 0x800) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000100)=@nl=@unspec={0x871f000000000000, 0x2a77, 0xfc90009, 0x2}, 0x397, &(0x7f0000000040)=[{&(0x7f0000000280), 0xff8f}], 0x1, &(0x7f0000001280), 0x0, 0x438}, 0x7805) 17:04:03 executing program 2: socketpair(0x1d, 0x0, 0x0, &(0x7f0000000440)) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:04:03 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000003400)={0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000003640)={&(0x7f0000003440)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000003540)=[{0x0}], 0x1, &(0x7f0000003580)=[@ip_retopts={{0x10}}, @ip_tos_u8={{0x11}}], 0x28}, 0x0) 17:04:03 executing program 3: socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) recvmsg(r1, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000400)=""/151, 0x97}], 0x1}, 0x0) 17:04:03 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x5452, 0xffffffffffffffff) 17:04:03 executing program 3: perf_event_open$cgroup(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff801, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1238.706106] can: request_module (can-proto-0) failed. 17:04:03 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x10023) 17:04:03 executing program 0: prlimit64(0x0, 0x0, &(0x7f0000000040)={0x0, 0x7}, 0x0) [ 1238.763913] can: request_module (can-proto-0) failed. 17:04:04 executing program 3: openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) 17:04:04 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x804c}, {&(0x7f0000000140)="10c4645f01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:04 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) 17:04:04 executing program 3: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x8982, 0x0) 17:04:04 executing program 1: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f00000005c0)=@ax25={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x8}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @bcast, @default, @default]}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000640)="18c5891510591e2580868ba27767a13066c7224b163395c443a92a3366", 0x1d}, {&(0x7f0000000680)="aaa36be550ec3c4d72e6d67f1bfc6ea6089550f901cab5c4555b77e0a1b0e6eb079a2e4fae2e305c9063969add54fe0d66237fc636eccfc8ed94426893b503b85310e4392503", 0x46}, {&(0x7f0000000700)="c73d98b46de90065ff6517d94912ae482ec115d3b948a0729978fd94de9df4b7cd4831e82b8780fc9431b74bd8a924b843b22b87bea381801e20b5ee2234562cf1640d0514820a035b0d6bff43964d3fe8d8b831245dd3869be743e9bde100dccd8e1c28c223fe2e253a0e309f17451f3fa0d9eeeaafd05cede6d62e1d67848053e491", 0x83}, {&(0x7f00000007c0)="9c4c0577b8f6bec9be0d186780ac8baa92e78341fa60d8cfe0b2f4431fa92f85da2c90d4f49359a7bd4e1625a13d6a86a9c624c8ec07", 0x36}], 0x4, &(0x7f0000000880)=[{0x28, 0x3a, 0x6c8, "15b9fa6b71b0f150470e7cab9c3831b667a2314697"}, {0x48, 0x84, 0x0, "72a2689e80aa120b37cacec83a35fa26ddeb7b401b16ff034734a34c1e2fbbb074bb6849f67d1414f36d6c29b45c4c2e02f8843d"}, {0x38, 0x1a, 0x4, "2f16549e1f63e2ada6d996a0cd5eb1496ea44b9c77d01a4c6fd3eb424d20fb67d75b7e"}, {0x98, 0x107, 0xd122, "44a156506a73320909b31f8a5a923e3406863aec82aac9083a59f2e696e3be7daa25693805bf9c51341af0d27f768af4b78a35bf37f5c8a2dc877635cbc3a12e873045a45d07eb6d1bbd6c01d6e5d7732099564f39409e6991ac6c4ab06b8166ae9fe131270886bfd36a1055a86ea2b413e74f601222bff7ac9baa96b4531d641c9cad53b8"}, {0x108, 0x118, 0xfffffffd, "9a8c8393065601f53430e78d91c7e9240c4d8972d8fa35905c80105972afbfea454966d72a7b4ef08a140b9cb008da30cdfc3010621475bf05554ef9b7bdda990bd02642ce8b3950e99a22e4f0abc687c6b031f21d7149d1259fcd8c9c279fddb10ddf527a886e5d530c104537bb7e2f15f43306718c786535ad017727b184ba465a750f980be5cb810648fe274e4a0c7d376f657403a75d39f2a5ca8fba9b012fd5ac27db863fbb71ea091207d5a37b58c490494242f923b04787b9cb18038a0740616902318d87555fa629e2d7c1a5023cc11972376ec4a39fdc0c62f68bc006878ecce1f86473a6a9992dbc2ceef698a575"}, {0x70, 0x118, 0x5c, "36cc9c4939fe4a49bdb154e440046797dc37b935b318e18391ca28c340344e16ff4aad8af3f881c0595849876998eea855562be2b8c39df0c5ab75292056ab744ce0bf4d781fdfbf11f8360bb59be8037135cc5d5f2bff3754271d0cc54d8e2c"}], 0x2b8}, 0x20044080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x84192, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) r1 = socket$kcm(0x21, 0x0, 0x2) r2 = socket$kcm(0xa, 0x3, 0x73) sendmsg(r2, &(0x7f0000000800)={&(0x7f00000000c0)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000180)=[{0x18, 0x29, 0xb, "0f"}], 0x18}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, &(0x7f0000000580)={r1}) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x0, @mcast2, 0x9}, 0x80, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="3800000000000000290000000400000078040409"], 0x38}, 0x8000) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r3 = socket$kcm(0xa, 0x5, 0x0) socket$kcm(0x29, 0x7, 0x0) close(r3) r4 = socket$kcm(0xa, 0x3, 0x73) sendmsg(r4, &(0x7f0000000800)={&(0x7f00000000c0)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000180)=[{0x18, 0x29, 0xb, "0f"}], 0x18}, 0x0) sendmsg$kcm(r3, &(0x7f0000000380)={&(0x7f0000000280)=@pppol2tpin6={0x18, 0x1, {0x0, r3, 0x2, 0x4, 0x2, 0x4, {0xa, 0x4e24, 0x3, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x8}}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000300)="6bb2309836efc75d82aed868dbb378741fdd4c7d1c98e0998b99926e372f01720837ab4dae862f95adb6142720222a07b8b0ca0789dc5e4137b4c54472152c2657c32f459f852c81f8f7", 0x4a}, {&(0x7f0000000400)="efbdac6d2d649d5ad8127e231752f7951e56b5896d9215569a4af416c353dc0305abda1121fb4bd5e78ef9c8ee6ab77de1ebd4d21b3ae1b52fbd9b8918b943100b7d87b4fa08966c885702cdb6f4d8846716a1f13cd4bf15b20b0315cf02225bb1", 0x61}, {&(0x7f0000000480)="957c33491ef57e31b4ccb6c6d545451acf0e677651a138182c978806f6922bb80c9e452e935b1731b9916c7b7d165f263f9476e1bced8edac093e764c5439e689c80849ea2fc0402134afd787cb0e0287e2658c1fca447847266a5a2958ff49855f74dd20d0a7602d93fa063aa0f18fbe98ed321a5c63c0d2ce4621ce4af424f3cf4a62b3273c64889080fefe135d666c6331e23b319763adf555b14f64a7a2b4b0a3a0bf7702f4a7ec4739e75709201b99cbeb6c579240b460c095d6f653eb9b3", 0xc1}], 0x3, &(0x7f0000002e00)=ANY=[@ANYRESOCT=r4], 0x1380}, 0x8c0) socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r3, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r3, &(0x7f0000001a00)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f00000015c0)="c90477c45551f219de78f5d46a669a920ba991b2", 0x14}, {&(0x7f0000001600)="2ecce5a27a8d5e627ff06435717914bf5c1836533b9e57c3a2e60ffa3aca62a071fd351da14cadb8d5a05618f83d707684bc8c4660c1e57a497066781e6d60ba97e405566990954ca84d0f52032e59406e434559c47f55528b51401a55667b56c6c4f8e4dcd439d5e4d99b170fa83f4360124610c91009c1f196f9d3eea4", 0x7e}, {0x0}], 0x3, &(0x7f0000001740)=[{0xd8, 0xff, 0x6, "d729f85f3f4185ff5e186363e32ad05c29a291fb86b9d49f1b1177a46e30ca2628029aad4880efcc3ec8f8da0f3fd24559263e1ba02f06ed00fa9eba166067d740766e38f8575b414a8eebfcafbb32d817a018f10c3549edaf33944a02747560d6e2d174081349f2d5e42e976930069533e3e4fc16cb98c9e3a30cfd0c1c78e9c061a47cff0cbf19189786265c03af5383037b947aa95069123f2244dcf73fe838d191db307f909e572e3a831d84ab1cd7e8551801d303b67b5acb0fd604a0cf52034e70abba0d19"}, {0x50, 0x119, 0x0, "ae9fef1b3c3734601dbd9404b13d45533b5a9b15e0736e5168befb8bbd269ff053c7bcf00ff5a2c0d0ba28df0b09494bc59815d36bd3c3a61f78d8a32d"}, {0xa8, 0x110, 0x7ff, "e4ef71f88034d37b9e0034851265fff186537895b6fdce0563c24540a0848e4d911ace754995589ebed6fa121e45b6f03b32c13c6523ad95af2be42b7538a8eebb18a870a782883f644ea627c6fb2c276bcbb898fe04c2123ec495de6594f965ae851e995c6e9b684df5d31d91bf68d74f6bd3257d20a596637e3d45f71a1a4e9f2fe16ef295cde03e51cace4ca7034c2b9e8f"}], 0x1d0}, 0x800) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000100)=@nl=@unspec={0x871f000000000000, 0x2a77, 0xfc90009, 0x2}, 0x397, &(0x7f0000000040)=[{&(0x7f0000000280), 0xff8f}], 0x1, &(0x7f0000001280), 0x0, 0x438}, 0x7805) 17:04:04 executing program 3: r0 = perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x2405, &(0x7f0000000400)) 17:04:04 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) mkdirat$cgroup(r0, &(0x7f0000000280)='syz0\x00', 0x1ff) 17:04:04 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000002b40)={0x0, 0x0, &(0x7f00000029c0)=[{&(0x7f00000006c0)="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", 0x1000}, {&(0x7f00000017c0)="81ff528db4ecf43f0122092eb1bd241eb88d2154e5be6261493be7e0957fbea8e8399f46c4c205b26f635f5caba9a09a391913ea90307c6c6dbf2715e117635c960a6b769b592bdfadccc01eb1f9a8b9da7853a2adde7508381a7797ace3cb017ef9a5baac91daffd95b81dfb1dcc32ce6038e59a8807e537056b865918b76cbe6aa8c476ff226bcd85de492395f2f69577c3f7a51129ce24b35dd893dac310892bacdf8a9b5dd6662fb32bcbaca46759fccf4144ad37b2d79724e692b2a26ec779d4bea06f1280fca73e08a93e9ba4fe5de1702b3aa9b4d6d370c5694fe5274bb001377edc90e73b212e6483c17e5929331e264164330c12c561ea238b8bc3f7f7a5d560963e2efd801a161702a0624a8a926a97ad40d875ee573b8f37d1a05078db80f270a7a244739ee1859af4e553d9d3c0821c74ff849b8ad0a8d2a31b2ab561d233cd548d4b0129a706b00e37485bbf4fbad364a8b5a8a63e537e6e0a68804f16bf986cd8af9a4e35301cbe06af9d0cb649baea3daab0fe675363b929d98bd98eca55c158628224f3d52355250be81367b0168f4ed1f1a205af9587f7cb380f51b36f0c76f77763045274c62c70b989545dbb2595305fc0088d833bc7cdd3218e1dadda6d63b6686a2ce77e36e058143c2825b38ef38302bdc66316ec67231a1482fcf7d6c258783ad51daf61b3ab556cacb97780edd0acd460561942542d0a1b04d1dd2af33e8ef1393d3ff548492ebc767dff9a97195905c9317c82b81a5fc0ab4bad4005dbfd88d200bb77e0ba435591dcc540c4f864bdd664885bc83ad61f3d41e672291e6f43fbf134c8634d215f20c704db0b45f942104d9466473d849a9e8a2764cad64b814a35b059934a959d62a5be716c5e18578d3c073c9a399179027a160133e0b6b921fd6d6ccb7aca8291c22c983454f383054b692e85b29f7d1d42d47a1bae039d154a21159f50722a2faacf80089ef0ddc29f34ee1c0b15242d7b6b233ae86dcb1649b60a37f6b8bc0615931172cf4cb182e4543ca1991c8b2b5a917104c1cc2643b959bc543b2acf35acbb2c9a20210c05982e388d508ae0080a9fddb0a0fc788104bd734f237e5ec84c84b4c2181521a3ebabf77f1cf7df1b990eec31d511f23454d66ae0998a7afb54f0842386a156d8c7380737f1e1b23222c3f061f35cf87f54bda19ee6511783704e09379b0882df87b53cb0192291f55ee5f25b256c0054b0bfeee0d9981c37df52ad431201dac91bd610c27ecb980e1a5802f4fb4f9df272116b166e0a138577699aacbec15f9bc51898222d5d0e4fe65f67995e0bfa330372a17a45024a5081eb8a22b1dc670b834499a5de6721c29c736f2a56c420fa80a5d48b28b15edf07a915e4295fc13ecf638f8611858311d77df59397b311e4e8095014b4f0dca1aa996372b6c77bcbdbb124e4538cde2e3213a293fd248380dbc4aef206b4d8ab2dafd03d80a989fbccdc8b4670a19bfca2a9e86b3a82420922228c5f93591004df27f27f4492e8555b314d8e0abe0d77f33bc2dc9bb176748828eba28d5e9e7bb9b3a1c11ed7cd4e989711de98f165e9609b3137c68c41c01f8cfd75eec5a90fe4f98d1ba43b2531c13367f930aa4357e51f687940aae3db7493c6cb15c46d74d35b2d0b69a925f27adde995fc8d37657bf992a90c02bd40d08d7be5438c8dc544c15abd82a01c47c769c9defedf90c477f6a6507e33269ccbdce7d43b7bc9d7810defbd32ae515d01cd301e1c91b3d8f518ecf69ae271beac3c3f0a509427453e6fb24a872ac86d5e068f12a4221e1f7624b5017643ecb5fcf14075668dac78edb22c4194daf722c5b9e0ba173ae2540650dac89b4bbfc3a1c714820f2cb7b18fb42cb7a7fc05265d5ec4156c2e847aa6402cb44b7ae6a1bf178588b8c9e3aa331fc5e30da7c70e92b0a64c2d6d56a91b976452cd8768c20c1bd6454ce7b9b27e155d595ce8303d6c070c1a7dcde1321ed12b523d966f8a182c23f173bb9598586942ff1aa773ab038bdbb8bcc8069038c3cd206852287ab02c6ccff70400b7b375312db19ed245060d4d9507d571dcab471c802982f4dcf7a65a93771b0760271539c862490c4272ecaf56afd379d43f9402eb0cc090d37e6ce3ae1830173b328fb59bb7fa7e36c7345e5c575ee41da4a5f91046815dcbefff80c414fe82900af05766eded5f600a86972edc884038ec5cdc7315b5d587c89a35096b7609f9fd2c3504185c7a8f37315d3607824e8f2f7547b47ac9d0ed2fbd73791638d03f0409c2d37bb746b252d3fbe90586f815cde5b3c317913892d341b2bd0106088448ebc4e4fc478325ae875246f6e8e45c6c667087db9ee1625ff8569f739dd2b05a01407ff515fbcabb65ba2eaf713398c41b45dea0811bfbc3ef2e59175b43c043ea94dbf825a0c111d1faf5c16cfd7152f4bcf7a9f36ee1c203833c6aa0e566d62852b0bb5ec4c6105f9f9b4dba72fc8f9f9e8a63461470d639a7b52b1d585d3f5c9f6c8422b31ba16802d02b5f959334c538c19e754b4ec4431991e8e51428deff538bb062c92535a9de7f93a5c2fa96b150c5aa048a1b3ce26ad29aa66fd146dc1a0f216712d74508b8519b2f4eff02da12cff68a1b16bb664badda3ed78cfee1cfceef33272ef3aec027ab24584653c91b4927686d33a393595266a20fe5d7fa3758ae1eb3fe5cb3fbc9e7e35a1ed523b45030bc1b34ecb3195173ae9a6400892e2883e0b54eb1141dc2bdf808790086b59bfadbb7aad230ee62e8832b66b89a0e5386779fbebc7a3b5bb67df45f57b83d526350f7acdce81747ed7b1f7b86b04e19efea20daf8ce1e010a5bd2f437f18a80572ad8dce234411346d342cb65c28ea931d6e127fca1f2648d21ad8110fc7d07cebcad73480e37f9e43c07490865f2ea5070ba415c11e811776ab1cf7feb8f8d0eb53fb0cb804d459aab15fa1fc079b30ea646fcf7ec391aa6148a9f6549b716dfc23a913438a6c081b26a718ec875daba74c0e24b09c292fcbe5c7c22f7f216503d0f172e7472e5162dc46346ab2ff92676c867ca3ac225eaa6eaec32a46d4d1e73967c9891bd674ff1dd573b1a37ccbcab4b426639e910e3c23dc9e9584d98e254cdd50c349d240b8e271c72c36a3143318e1a8ede29e3f9d0a8f94c7c6d15e4bf1a73006f273c51cef24d4b1cad39a9f67696342f3f1e30c1d78bd2074829a8d14c70c35f6d819edd1c3d0588718fa652e584429c52f0848a7c16e6aba12f3a5dc2b5172b0b09bfc0e1e17bb5d8752d6f7dbf454303f966e1ad5a3dc56dacedbf528c44ef4e52c26cc187f7c2ac3adbd37b40106b2b8af00d97a589ae5add0923272d36afa16427fe61b9fc04b64b4982edec094708c21027459f46b78a044ff5c3852564abab7810e72b7b8673b279195244b0fcf4068ae9285b14a770d9fda092055a250d6ccc5a8831c84cb39eb4215aeb8540e358868ef0d0314dea3e56c7b1f6a8a1e7b35fbb4f3cabb9172cdc1983b183dc5c485863d48ad59e0c8199b07531bdd8308095f9b670e373c50b2498bd6726fc391f1fbbddd7710f7cdde5b52b63494d80b2bccb35e804f02fcc0a5e100d94e1121b8997461cb3bb146c5b6dfdc7c5210f3b83bfe134b0e50f37a6da1c7f2f4276c187b42049a9b9184bc6151c4aa75c8ae174765d340a8bdf4d870e8a5b5a62f048aea56109898252f365a4a06d84617e726e42c8fd7808579cb3fa4b23df39142e95c58f82b6790c84f7e6f625ea3130ecfe27605df539a1da750a472f971d86230639d05716fb138277b8da2dc50e428eb1a0d3382b9e6a7f8034ad99e1933fb37146f9ed8b7f638350fec29f142c01650af1007f98a718a4b327aa0d007b44d461ac277224adcf6769eb20a225f6b172761cc72b260587330852283f6c700e2b3780d5f92550c0d38ecb1555f8e4537900fd0308f1b8dc2979210791ad326e6484fa951f3052991210d8332c3232152da9a0b3c8e02dfc67add9788ca5ef14f91c3cb93db11dfae3f6b14d1cee567ed88089f17b6646e2b2324cbb5079e66acbb35c022f3b42a5881ec38f5daab7f48f15bad266820b01f9465b38e309d76202fcea69afa9293781ea86af524eda42c3ff87b70b389eee39e475964b68fe3a97ceab71ae2362d68f99d7869c1ee560489fd7c1c819b335ef55f308fa88f089428c49565ce6867b6392a761e43982f757b1e300e5e231baad163edadbd62cfe218c5080473722ab68aa76acdf61bc16ccf558d79308a8604880cc2fd1af1a0d3c5bae77ebc296df84d39a67725479dcda75bfb2ae35e8ef8504d9b69aa6ec3ce9f7f1dd3456dbe722f13b27b04384e5ce2fc42730d8577f752b9489b6f89e8a6d818e2b8956fcaf8618130b2664d66faae2d2bd9ca176292f7ca418740917659e845e51727ad314c8776db004ae0a992786e934072f6b0eafe63ec1243eccd37e265bd79621a6675d574412fe140912e5c2de1f1a94a850de6bf6f5dea4c59bca882fc150b440dab45f00c03d97f3efbf1e2bdf8c39f2a05d9e1422e0ff0f3e1eedf0d15b4a7cb69b9406508d5bf762f7855546ce653e132f5dedcb311d5db18d2d3165c76efeb6b2941c64c51d0709fc48fcae8570d8fd2062e1a643ece7ef2d06c5afee9e1c2ad8016ae9f4efe1a8beed2ee6938a2d165fc971245905842d5e217f9d3e1da96c4073d768dac6b84147db087175db7f709a4a9b48382b9869576a47465bee97bee9504c46bfadaa01008a58a9519eee2fb7e83042779662f1973bc8cbd2fd7259b7fa920a11586c90768b9767532b470c9df97eff5d371c7f1e221c086469b87d2f78195b036643ea8d1eda14c7b41e0e1536cfd0b8ed29023f127c1bd0388f9c478fa903e42523ae1c44799b27a797031d010a513a1402bf930b105b1adedf8acf212d71dda8e38e43d9b06763664c660ce6ccf96a54be0a5fd1ff04fff79ccffdb", 0xdc9}], 0x2}, 0x0) 17:04:04 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="2e00000022008151e00f80ecdb4cb904000af0007c5a685ea17d2037af15c40006586500dc2976d1008100a41151", 0x2e}], 0x1, 0x0, 0x0, 0xc000000}, 0x0) socket$kcm(0x2, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000200)=@generic={0x0, "c72ea94df17e720b9cff3726f2f3504ed1cd0c9ff7dccf7442174a67364297473d3e1d51b1679036d24ae383e94955dfe69b5386da224d68f76a7aa563f5772702e85610eb99073c1c46607ea2a3b97e438a289d70dbbe4897f172791385dc05ff81ae65662411daf6c00e6d7721fd077972062855cb339ebce47e700406"}, 0x80, 0x0}, 0x0) 17:04:04 executing program 3: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f00000005c0)=@ax25={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x8}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @bcast, @default, @default]}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000640)="18c5891510591e2580868ba27767a13066c7224b163395c443a92a3366", 0x1d}, {&(0x7f0000000680)="aaa36be550ec3c4d72e6d67f1bfc6ea6089550f901cab5c4555b77e0a1b0e6eb079a2e4fae2e305c9063969add54fe0d66237fc636eccfc8ed94426893b503b85310e4392503", 0x46}, {&(0x7f0000000700)="c73d98b46de90065ff6517d94912ae482ec115d3b948a0729978fd94de9df4b7cd4831e82b8780fc9431b74bd8a924b843b22b87bea381801e20b5ee2234562cf1640d0514820a035b0d6bff43964d3fe8d8b831245dd3869be743e9bde100dccd8e1c28c223fe2e253a0e309f17451f3fa0d9eeeaafd05cede6d62e1d67848053e491", 0x83}, {&(0x7f00000007c0)="9c4c0577b8f6bec9be0d186780ac8baa92e78341fa60d8cfe0b2f4431fa92f85da2c90d4f49359a7bd4e1625a13d6a86a9c624c8ec07", 0x36}], 0x4, &(0x7f0000000880)=[{0x28, 0x3a, 0x6c8, "15b9fa6b71b0f150470e7cab9c3831b667a2314697"}, {0x48, 0x84, 0x0, "72a2689e80aa120b37cacec83a35fa26ddeb7b401b16ff034734a34c1e2fbbb074bb6849f67d1414f36d6c29b45c4c2e02f8843d"}, {0x38, 0x1a, 0x4, "2f16549e1f63e2ada6d996a0cd5eb1496ea44b9c77d01a4c6fd3eb424d20fb67d75b7e"}, {0x98, 0x107, 0xd122, "44a156506a73320909b31f8a5a923e3406863aec82aac9083a59f2e696e3be7daa25693805bf9c51341af0d27f768af4b78a35bf37f5c8a2dc877635cbc3a12e873045a45d07eb6d1bbd6c01d6e5d7732099564f39409e6991ac6c4ab06b8166ae9fe131270886bfd36a1055a86ea2b413e74f601222bff7ac9baa96b4531d641c9cad53b8"}, {0x108, 0x118, 0xfffffffd, "9a8c8393065601f53430e78d91c7e9240c4d8972d8fa35905c80105972afbfea454966d72a7b4ef08a140b9cb008da30cdfc3010621475bf05554ef9b7bdda990bd02642ce8b3950e99a22e4f0abc687c6b031f21d7149d1259fcd8c9c279fddb10ddf527a886e5d530c104537bb7e2f15f43306718c786535ad017727b184ba465a750f980be5cb810648fe274e4a0c7d376f657403a75d39f2a5ca8fba9b012fd5ac27db863fbb71ea091207d5a37b58c490494242f923b04787b9cb18038a0740616902318d87555fa629e2d7c1a5023cc11972376ec4a39fdc0c62f68bc006878ecce1f86473a6a9992dbc2ceef698a575"}, {0x70, 0x118, 0x5c, "36cc9c4939fe4a49bdb154e440046797dc37b935b318e18391ca28c340344e16ff4aad8af3f881c0595849876998eea855562be2b8c39df0c5ab75292056ab744ce0bf4d781fdfbf11f8360bb59be8037135cc5d5f2bff3754271d0cc54d8e2c"}], 0x2b8}, 0x20044080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x84192, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) r1 = socket$kcm(0x21, 0x0, 0x2) r2 = socket$kcm(0xa, 0x3, 0x73) sendmsg(r2, &(0x7f0000000800)={&(0x7f00000000c0)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000180)=[{0x18, 0x29, 0xb, "0f"}], 0x18}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, &(0x7f0000000580)={r1}) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x0, @mcast2, 0x9}, 0x80, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="3800000000000000290000000400000078040409"], 0x38}, 0x8000) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r3 = socket$kcm(0xa, 0x5, 0x0) socket$kcm(0x29, 0x7, 0x0) close(r3) r4 = socket$kcm(0xa, 0x3, 0x73) sendmsg(r4, &(0x7f0000000800)={&(0x7f00000000c0)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000180)=[{0x18, 0x29, 0xb, "0f"}], 0x18}, 0x0) sendmsg$kcm(r3, &(0x7f0000000380)={&(0x7f0000000280)=@pppol2tpin6={0x18, 0x1, {0x0, r3, 0x2, 0x4, 0x2, 0x4, {0xa, 0x4e24, 0x3, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x8}}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000300)="6bb2309836efc75d82aed868dbb378741fdd4c7d1c98e0998b99926e372f01720837ab4dae862f95adb6142720222a07b8b0ca0789dc5e4137b4c54472152c2657c32f459f852c81f8f7", 0x4a}, {&(0x7f0000000400)="efbdac6d2d649d5ad8127e231752f7951e56b5896d9215569a4af416c353dc0305abda1121fb4bd5e78ef9c8ee6ab77de1ebd4d21b3ae1b52fbd9b8918b943100b7d87b4fa08966c885702cdb6f4d8846716a1f13cd4bf15b20b0315cf02225bb1", 0x61}, {&(0x7f0000000480)="957c33491ef57e31b4ccb6c6d545451acf0e677651a138182c978806f6922bb80c9e452e935b1731b9916c7b7d165f263f9476e1bced8edac093e764c5439e689c80849ea2fc0402134afd787cb0e0287e2658c1fca447847266a5a2958ff49855f74dd20d0a7602d93fa063aa0f18fbe98ed321a5c63c0d2ce4621ce4af424f3cf4a62b3273c64889080fefe135d666c6331e23b319763adf555b14f64a7a2b4b0a3a0bf7702f4a7ec4739e75709201b99cbeb6c579240b460c095d6f653eb9b3", 0xc1}], 0x3, &(0x7f0000002e00)=ANY=[@ANYRESOCT=r4], 0x1380}, 0x8c0) socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r3, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r3, &(0x7f0000001a00)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f00000015c0)="c90477c45551f219de78f5d46a669a920ba991b2", 0x14}, {&(0x7f0000001600)="2ecce5a27a8d5e627ff06435717914bf5c1836533b9e57c3a2e60ffa3aca62a071fd351da14cadb8d5a05618f83d707684bc8c4660c1e57a497066781e6d60ba97e405566990954ca84d0f52032e59406e434559c47f55528b51401a55667b56c6c4f8e4dcd439d5e4d99b170fa83f4360124610c91009c1f196f9d3eea4", 0x7e}, {0x0}], 0x3, &(0x7f0000001740)=[{0xd8, 0xff, 0x6, "d729f85f3f4185ff5e186363e32ad05c29a291fb86b9d49f1b1177a46e30ca2628029aad4880efcc3ec8f8da0f3fd24559263e1ba02f06ed00fa9eba166067d740766e38f8575b414a8eebfcafbb32d817a018f10c3549edaf33944a02747560d6e2d174081349f2d5e42e976930069533e3e4fc16cb98c9e3a30cfd0c1c78e9c061a47cff0cbf19189786265c03af5383037b947aa95069123f2244dcf73fe838d191db307f909e572e3a831d84ab1cd7e8551801d303b67b5acb0fd604a0cf52034e70abba0d19"}, {0x50, 0x119, 0x0, "ae9fef1b3c3734601dbd9404b13d45533b5a9b15e0736e5168befb8bbd269ff053c7bcf00ff5a2c0d0ba28df0b09494bc59815d36bd3c3a61f78d8a32d"}, {0xa8, 0x110, 0x7ff, "e4ef71f88034d37b9e0034851265fff186537895b6fdce0563c24540a0848e4d911ace754995589ebed6fa121e45b6f03b32c13c6523ad95af2be42b7538a8eebb18a870a782883f644ea627c6fb2c276bcbb898fe04c2123ec495de6594f965ae851e995c6e9b684df5d31d91bf68d74f6bd3257d20a596637e3d45f71a1a4e9f2fe16ef295cde03e51cace4ca7034c2b9e8f"}], 0x1d0}, 0x800) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000100)=@nl=@unspec={0x871f000000000000, 0x2a77, 0xfc90009, 0x2}, 0x397, &(0x7f0000000040)=[{&(0x7f0000000280), 0xff8f}], 0x1, &(0x7f0000001280), 0x0, 0x438}, 0x7805) 17:04:04 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8060}, {&(0x7f0000000140)="10c4645f01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:04 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000005d80)={0x18, 0x3, &(0x7f0000000180)=@framed, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:04:04 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f0000000200), 0x10, 0x0, 0x0, 0x0, 0x4}, 0x0) 17:04:04 executing program 3: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f00000005c0)=@ax25={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x8}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @bcast, @default, @default]}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000640)="18c5891510591e2580868ba27767a13066c7224b163395c443a92a3366", 0x1d}, {&(0x7f0000000680)="aaa36be550ec3c4d72e6d67f1bfc6ea6089550f901cab5c4555b77e0a1b0e6eb079a2e4fae2e305c9063969add54fe0d66237fc636eccfc8ed94426893b503b85310e4392503", 0x46}, {&(0x7f0000000700)="c73d98b46de90065ff6517d94912ae482ec115d3b948a0729978fd94de9df4b7cd4831e82b8780fc9431b74bd8a924b843b22b87bea381801e20b5ee2234562cf1640d0514820a035b0d6bff43964d3fe8d8b831245dd3869be743e9bde100dccd8e1c28c223fe2e253a0e309f17451f3fa0d9eeeaafd05cede6d62e1d67848053e491", 0x83}, {&(0x7f00000007c0)="9c4c0577b8f6bec9be0d186780ac8baa92e78341fa60d8cfe0b2f4431fa92f85da2c90d4f49359a7bd4e1625a13d6a86a9c624c8ec07", 0x36}], 0x4, &(0x7f0000000880)=[{0x28, 0x3a, 0x6c8, "15b9fa6b71b0f150470e7cab9c3831b667a2314697"}, {0x48, 0x84, 0x0, "72a2689e80aa120b37cacec83a35fa26ddeb7b401b16ff034734a34c1e2fbbb074bb6849f67d1414f36d6c29b45c4c2e02f8843d"}, {0x38, 0x1a, 0x4, "2f16549e1f63e2ada6d996a0cd5eb1496ea44b9c77d01a4c6fd3eb424d20fb67d75b7e"}, {0x98, 0x107, 0xd122, "44a156506a73320909b31f8a5a923e3406863aec82aac9083a59f2e696e3be7daa25693805bf9c51341af0d27f768af4b78a35bf37f5c8a2dc877635cbc3a12e873045a45d07eb6d1bbd6c01d6e5d7732099564f39409e6991ac6c4ab06b8166ae9fe131270886bfd36a1055a86ea2b413e74f601222bff7ac9baa96b4531d641c9cad53b8"}, {0x108, 0x118, 0xfffffffd, "9a8c8393065601f53430e78d91c7e9240c4d8972d8fa35905c80105972afbfea454966d72a7b4ef08a140b9cb008da30cdfc3010621475bf05554ef9b7bdda990bd02642ce8b3950e99a22e4f0abc687c6b031f21d7149d1259fcd8c9c279fddb10ddf527a886e5d530c104537bb7e2f15f43306718c786535ad017727b184ba465a750f980be5cb810648fe274e4a0c7d376f657403a75d39f2a5ca8fba9b012fd5ac27db863fbb71ea091207d5a37b58c490494242f923b04787b9cb18038a0740616902318d87555fa629e2d7c1a5023cc11972376ec4a39fdc0c62f68bc006878ecce1f86473a6a9992dbc2ceef698a575"}, {0x70, 0x118, 0x5c, "36cc9c4939fe4a49bdb154e440046797dc37b935b318e18391ca28c340344e16ff4aad8af3f881c0595849876998eea855562be2b8c39df0c5ab75292056ab744ce0bf4d781fdfbf11f8360bb59be8037135cc5d5f2bff3754271d0cc54d8e2c"}], 0x2b8}, 0x20044080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x84192, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) r1 = socket$kcm(0x21, 0x0, 0x2) r2 = socket$kcm(0xa, 0x3, 0x73) sendmsg(r2, &(0x7f0000000800)={&(0x7f00000000c0)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000180)=[{0x18, 0x29, 0xb, "0f"}], 0x18}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, &(0x7f0000000580)={r1}) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x0, @mcast2, 0x9}, 0x80, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="3800000000000000290000000400000078040409"], 0x38}, 0x8000) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r3 = socket$kcm(0xa, 0x5, 0x0) socket$kcm(0x29, 0x7, 0x0) close(r3) r4 = socket$kcm(0xa, 0x3, 0x73) sendmsg(r4, &(0x7f0000000800)={&(0x7f00000000c0)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000180)=[{0x18, 0x29, 0xb, "0f"}], 0x18}, 0x0) sendmsg$kcm(r3, &(0x7f0000000380)={&(0x7f0000000280)=@pppol2tpin6={0x18, 0x1, {0x0, r3, 0x2, 0x4, 0x2, 0x4, {0xa, 0x4e24, 0x3, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x8}}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000300)="6bb2309836efc75d82aed868dbb378741fdd4c7d1c98e0998b99926e372f01720837ab4dae862f95adb6142720222a07b8b0ca0789dc5e4137b4c54472152c2657c32f459f852c81f8f7", 0x4a}, {&(0x7f0000000400)="efbdac6d2d649d5ad8127e231752f7951e56b5896d9215569a4af416c353dc0305abda1121fb4bd5e78ef9c8ee6ab77de1ebd4d21b3ae1b52fbd9b8918b943100b7d87b4fa08966c885702cdb6f4d8846716a1f13cd4bf15b20b0315cf02225bb1", 0x61}, {&(0x7f0000000480)="957c33491ef57e31b4ccb6c6d545451acf0e677651a138182c978806f6922bb80c9e452e935b1731b9916c7b7d165f263f9476e1bced8edac093e764c5439e689c80849ea2fc0402134afd787cb0e0287e2658c1fca447847266a5a2958ff49855f74dd20d0a7602d93fa063aa0f18fbe98ed321a5c63c0d2ce4621ce4af424f3cf4a62b3273c64889080fefe135d666c6331e23b319763adf555b14f64a7a2b4b0a3a0bf7702f4a7ec4739e75709201b99cbeb6c579240b460c095d6f653eb9b3", 0xc1}], 0x3, &(0x7f0000002e00)=ANY=[@ANYRESOCT=r4], 0x1380}, 0x8c0) socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r3, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r3, &(0x7f0000001a00)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f00000015c0)="c90477c45551f219de78f5d46a669a920ba991b2", 0x14}, {&(0x7f0000001600)="2ecce5a27a8d5e627ff06435717914bf5c1836533b9e57c3a2e60ffa3aca62a071fd351da14cadb8d5a05618f83d707684bc8c4660c1e57a497066781e6d60ba97e405566990954ca84d0f52032e59406e434559c47f55528b51401a55667b56c6c4f8e4dcd439d5e4d99b170fa83f4360124610c91009c1f196f9d3eea4", 0x7e}, {0x0}], 0x3, &(0x7f0000001740)=[{0xd8, 0xff, 0x6, "d729f85f3f4185ff5e186363e32ad05c29a291fb86b9d49f1b1177a46e30ca2628029aad4880efcc3ec8f8da0f3fd24559263e1ba02f06ed00fa9eba166067d740766e38f8575b414a8eebfcafbb32d817a018f10c3549edaf33944a02747560d6e2d174081349f2d5e42e976930069533e3e4fc16cb98c9e3a30cfd0c1c78e9c061a47cff0cbf19189786265c03af5383037b947aa95069123f2244dcf73fe838d191db307f909e572e3a831d84ab1cd7e8551801d303b67b5acb0fd604a0cf52034e70abba0d19"}, {0x50, 0x119, 0x0, "ae9fef1b3c3734601dbd9404b13d45533b5a9b15e0736e5168befb8bbd269ff053c7bcf00ff5a2c0d0ba28df0b09494bc59815d36bd3c3a61f78d8a32d"}, {0xa8, 0x110, 0x7ff, "e4ef71f88034d37b9e0034851265fff186537895b6fdce0563c24540a0848e4d911ace754995589ebed6fa121e45b6f03b32c13c6523ad95af2be42b7538a8eebb18a870a782883f644ea627c6fb2c276bcbb898fe04c2123ec495de6594f965ae851e995c6e9b684df5d31d91bf68d74f6bd3257d20a596637e3d45f71a1a4e9f2fe16ef295cde03e51cace4ca7034c2b9e8f"}], 0x1d0}, 0x800) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000100)=@nl=@unspec={0x871f000000000000, 0x2a77, 0xfc90009, 0x2}, 0x397, &(0x7f0000000040)=[{&(0x7f0000000280), 0xff8f}], 0x1, &(0x7f0000001280), 0x0, 0x438}, 0x7805) 17:04:04 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8068}, {&(0x7f0000000140)="10c4645f01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:04 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="2e00000022008151e00f80ecdb4cb904000af0007c5a685ea17d2037af15c40006586500dc2976d1008100a41151", 0x2e}], 0x1, 0x0, 0x0, 0xc000000}, 0x0) socket$kcm(0x2, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000200)=@generic={0x0, "c72ea94df17e720b9cff3726f2f3504ed1cd0c9ff7dccf7442174a67364297473d3e1d51b1679036d24ae383e94955dfe69b5386da224d68f76a7aa563f5772702e85610eb99073c1c46607ea2a3b97e438a289d70dbbe4897f172791385dc05ff81ae65662411daf6c00e6d7721fd077972062855cb339ebce47e700406"}, 0x80, 0x0}, 0x0) 17:04:05 executing program 1: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f00000005c0)=@ax25={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x8}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @bcast, @default, @default]}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000640)="18c5891510591e2580868ba27767a13066c7224b163395c443a92a3366", 0x1d}, {&(0x7f0000000680)="aaa36be550ec3c4d72e6d67f1bfc6ea6089550f901cab5c4555b77e0a1b0e6eb079a2e4fae2e305c9063969add54fe0d66237fc636eccfc8ed94426893b503b85310e4392503", 0x46}, {&(0x7f0000000700)="c73d98b46de90065ff6517d94912ae482ec115d3b948a0729978fd94de9df4b7cd4831e82b8780fc9431b74bd8a924b843b22b87bea381801e20b5ee2234562cf1640d0514820a035b0d6bff43964d3fe8d8b831245dd3869be743e9bde100dccd8e1c28c223fe2e253a0e309f17451f3fa0d9eeeaafd05cede6d62e1d67848053e491", 0x83}, {&(0x7f00000007c0)="9c4c0577b8f6bec9be0d186780ac8baa92e78341fa60d8cfe0b2f4431fa92f85da2c90d4f49359a7bd4e1625a13d6a86a9c624c8ec07", 0x36}], 0x4, &(0x7f0000000880)=[{0x28, 0x3a, 0x6c8, "15b9fa6b71b0f150470e7cab9c3831b667a2314697"}, {0x48, 0x84, 0x0, "72a2689e80aa120b37cacec83a35fa26ddeb7b401b16ff034734a34c1e2fbbb074bb6849f67d1414f36d6c29b45c4c2e02f8843d"}, {0x38, 0x1a, 0x4, "2f16549e1f63e2ada6d996a0cd5eb1496ea44b9c77d01a4c6fd3eb424d20fb67d75b7e"}, {0x98, 0x107, 0xd122, "44a156506a73320909b31f8a5a923e3406863aec82aac9083a59f2e696e3be7daa25693805bf9c51341af0d27f768af4b78a35bf37f5c8a2dc877635cbc3a12e873045a45d07eb6d1bbd6c01d6e5d7732099564f39409e6991ac6c4ab06b8166ae9fe131270886bfd36a1055a86ea2b413e74f601222bff7ac9baa96b4531d641c9cad53b8"}, {0x108, 0x118, 0xfffffffd, "9a8c8393065601f53430e78d91c7e9240c4d8972d8fa35905c80105972afbfea454966d72a7b4ef08a140b9cb008da30cdfc3010621475bf05554ef9b7bdda990bd02642ce8b3950e99a22e4f0abc687c6b031f21d7149d1259fcd8c9c279fddb10ddf527a886e5d530c104537bb7e2f15f43306718c786535ad017727b184ba465a750f980be5cb810648fe274e4a0c7d376f657403a75d39f2a5ca8fba9b012fd5ac27db863fbb71ea091207d5a37b58c490494242f923b04787b9cb18038a0740616902318d87555fa629e2d7c1a5023cc11972376ec4a39fdc0c62f68bc006878ecce1f86473a6a9992dbc2ceef698a575"}, {0x70, 0x118, 0x5c, "36cc9c4939fe4a49bdb154e440046797dc37b935b318e18391ca28c340344e16ff4aad8af3f881c0595849876998eea855562be2b8c39df0c5ab75292056ab744ce0bf4d781fdfbf11f8360bb59be8037135cc5d5f2bff3754271d0cc54d8e2c"}], 0x2b8}, 0x20044080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x84192, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) r1 = socket$kcm(0x21, 0x0, 0x2) r2 = socket$kcm(0xa, 0x3, 0x73) sendmsg(r2, &(0x7f0000000800)={&(0x7f00000000c0)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000180)=[{0x18, 0x29, 0xb, "0f"}], 0x18}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, &(0x7f0000000580)={r1}) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x0, @mcast2, 0x9}, 0x80, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="3800000000000000290000000400000078040409"], 0x38}, 0x8000) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r3 = socket$kcm(0xa, 0x5, 0x0) socket$kcm(0x29, 0x7, 0x0) close(r3) r4 = socket$kcm(0xa, 0x3, 0x73) sendmsg(r4, &(0x7f0000000800)={&(0x7f00000000c0)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000180)=[{0x18, 0x29, 0xb, "0f"}], 0x18}, 0x0) sendmsg$kcm(r3, &(0x7f0000000380)={&(0x7f0000000280)=@pppol2tpin6={0x18, 0x1, {0x0, r3, 0x2, 0x4, 0x2, 0x4, {0xa, 0x4e24, 0x3, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x8}}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000300)="6bb2309836efc75d82aed868dbb378741fdd4c7d1c98e0998b99926e372f01720837ab4dae862f95adb6142720222a07b8b0ca0789dc5e4137b4c54472152c2657c32f459f852c81f8f7", 0x4a}, {&(0x7f0000000400)="efbdac6d2d649d5ad8127e231752f7951e56b5896d9215569a4af416c353dc0305abda1121fb4bd5e78ef9c8ee6ab77de1ebd4d21b3ae1b52fbd9b8918b943100b7d87b4fa08966c885702cdb6f4d8846716a1f13cd4bf15b20b0315cf02225bb1", 0x61}, {&(0x7f0000000480)="957c33491ef57e31b4ccb6c6d545451acf0e677651a138182c978806f6922bb80c9e452e935b1731b9916c7b7d165f263f9476e1bced8edac093e764c5439e689c80849ea2fc0402134afd787cb0e0287e2658c1fca447847266a5a2958ff49855f74dd20d0a7602d93fa063aa0f18fbe98ed321a5c63c0d2ce4621ce4af424f3cf4a62b3273c64889080fefe135d666c6331e23b319763adf555b14f64a7a2b4b0a3a0bf7702f4a7ec4739e75709201b99cbeb6c579240b460c095d6f653eb9b3", 0xc1}], 0x3, &(0x7f0000002e00)=ANY=[@ANYRESOCT=r4], 0x1380}, 0x8c0) socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r3, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r3, &(0x7f0000001a00)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f00000015c0)="c90477c45551f219de78f5d46a669a920ba991b2", 0x14}, {&(0x7f0000001600)="2ecce5a27a8d5e627ff06435717914bf5c1836533b9e57c3a2e60ffa3aca62a071fd351da14cadb8d5a05618f83d707684bc8c4660c1e57a497066781e6d60ba97e405566990954ca84d0f52032e59406e434559c47f55528b51401a55667b56c6c4f8e4dcd439d5e4d99b170fa83f4360124610c91009c1f196f9d3eea4", 0x7e}, {0x0}], 0x3, &(0x7f0000001740)=[{0xd8, 0xff, 0x6, "d729f85f3f4185ff5e186363e32ad05c29a291fb86b9d49f1b1177a46e30ca2628029aad4880efcc3ec8f8da0f3fd24559263e1ba02f06ed00fa9eba166067d740766e38f8575b414a8eebfcafbb32d817a018f10c3549edaf33944a02747560d6e2d174081349f2d5e42e976930069533e3e4fc16cb98c9e3a30cfd0c1c78e9c061a47cff0cbf19189786265c03af5383037b947aa95069123f2244dcf73fe838d191db307f909e572e3a831d84ab1cd7e8551801d303b67b5acb0fd604a0cf52034e70abba0d19"}, {0x50, 0x119, 0x0, "ae9fef1b3c3734601dbd9404b13d45533b5a9b15e0736e5168befb8bbd269ff053c7bcf00ff5a2c0d0ba28df0b09494bc59815d36bd3c3a61f78d8a32d"}, {0xa8, 0x110, 0x7ff, "e4ef71f88034d37b9e0034851265fff186537895b6fdce0563c24540a0848e4d911ace754995589ebed6fa121e45b6f03b32c13c6523ad95af2be42b7538a8eebb18a870a782883f644ea627c6fb2c276bcbb898fe04c2123ec495de6594f965ae851e995c6e9b684df5d31d91bf68d74f6bd3257d20a596637e3d45f71a1a4e9f2fe16ef295cde03e51cace4ca7034c2b9e8f"}], 0x1d0}, 0x800) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000100)=@nl=@unspec={0x871f000000000000, 0x2a77, 0xfc90009, 0x2}, 0x397, &(0x7f0000000040)=[{&(0x7f0000000280), 0xff8f}], 0x1, &(0x7f0000001280), 0x0, 0x438}, 0x7805) 17:04:05 executing program 5: openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = getpid() syz_open_procfs$namespace(r0, 0x0) 17:04:05 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f000000ab80)={0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f000000c340)={0x0, 0x0, &(0x7f000000c240)=[{&(0x7f000000ac00)="1b", 0x1}], 0x1}, 0x0) 17:04:05 executing program 3: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f00000005c0)=@ax25={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x8}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @bcast, @default, @default]}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000640)="18c5891510591e2580868ba27767a13066c7224b163395c443a92a3366", 0x1d}, {&(0x7f0000000680)="aaa36be550ec3c4d72e6d67f1bfc6ea6089550f901cab5c4555b77e0a1b0e6eb079a2e4fae2e305c9063969add54fe0d66237fc636eccfc8ed94426893b503b85310e4392503", 0x46}, {&(0x7f0000000700)="c73d98b46de90065ff6517d94912ae482ec115d3b948a0729978fd94de9df4b7cd4831e82b8780fc9431b74bd8a924b843b22b87bea381801e20b5ee2234562cf1640d0514820a035b0d6bff43964d3fe8d8b831245dd3869be743e9bde100dccd8e1c28c223fe2e253a0e309f17451f3fa0d9eeeaafd05cede6d62e1d67848053e491", 0x83}, {&(0x7f00000007c0)="9c4c0577b8f6bec9be0d186780ac8baa92e78341fa60d8cfe0b2f4431fa92f85da2c90d4f49359a7bd4e1625a13d6a86a9c624c8ec07", 0x36}], 0x4, &(0x7f0000000880)=[{0x28, 0x3a, 0x6c8, "15b9fa6b71b0f150470e7cab9c3831b667a2314697"}, {0x48, 0x84, 0x0, "72a2689e80aa120b37cacec83a35fa26ddeb7b401b16ff034734a34c1e2fbbb074bb6849f67d1414f36d6c29b45c4c2e02f8843d"}, {0x38, 0x1a, 0x4, "2f16549e1f63e2ada6d996a0cd5eb1496ea44b9c77d01a4c6fd3eb424d20fb67d75b7e"}, {0x98, 0x107, 0xd122, "44a156506a73320909b31f8a5a923e3406863aec82aac9083a59f2e696e3be7daa25693805bf9c51341af0d27f768af4b78a35bf37f5c8a2dc877635cbc3a12e873045a45d07eb6d1bbd6c01d6e5d7732099564f39409e6991ac6c4ab06b8166ae9fe131270886bfd36a1055a86ea2b413e74f601222bff7ac9baa96b4531d641c9cad53b8"}, {0x108, 0x118, 0xfffffffd, "9a8c8393065601f53430e78d91c7e9240c4d8972d8fa35905c80105972afbfea454966d72a7b4ef08a140b9cb008da30cdfc3010621475bf05554ef9b7bdda990bd02642ce8b3950e99a22e4f0abc687c6b031f21d7149d1259fcd8c9c279fddb10ddf527a886e5d530c104537bb7e2f15f43306718c786535ad017727b184ba465a750f980be5cb810648fe274e4a0c7d376f657403a75d39f2a5ca8fba9b012fd5ac27db863fbb71ea091207d5a37b58c490494242f923b04787b9cb18038a0740616902318d87555fa629e2d7c1a5023cc11972376ec4a39fdc0c62f68bc006878ecce1f86473a6a9992dbc2ceef698a575"}, {0x70, 0x118, 0x5c, "36cc9c4939fe4a49bdb154e440046797dc37b935b318e18391ca28c340344e16ff4aad8af3f881c0595849876998eea855562be2b8c39df0c5ab75292056ab744ce0bf4d781fdfbf11f8360bb59be8037135cc5d5f2bff3754271d0cc54d8e2c"}], 0x2b8}, 0x20044080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x84192, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) r1 = socket$kcm(0x21, 0x0, 0x2) r2 = socket$kcm(0xa, 0x3, 0x73) sendmsg(r2, &(0x7f0000000800)={&(0x7f00000000c0)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000180)=[{0x18, 0x29, 0xb, "0f"}], 0x18}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, &(0x7f0000000580)={r1}) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x0, @mcast2, 0x9}, 0x80, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="3800000000000000290000000400000078040409"], 0x38}, 0x8000) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r3 = socket$kcm(0xa, 0x5, 0x0) socket$kcm(0x29, 0x7, 0x0) close(r3) r4 = socket$kcm(0xa, 0x3, 0x73) sendmsg(r4, &(0x7f0000000800)={&(0x7f00000000c0)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000180)=[{0x18, 0x29, 0xb, "0f"}], 0x18}, 0x0) sendmsg$kcm(r3, &(0x7f0000000380)={&(0x7f0000000280)=@pppol2tpin6={0x18, 0x1, {0x0, r3, 0x2, 0x4, 0x2, 0x4, {0xa, 0x4e24, 0x3, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x8}}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000300)="6bb2309836efc75d82aed868dbb378741fdd4c7d1c98e0998b99926e372f01720837ab4dae862f95adb6142720222a07b8b0ca0789dc5e4137b4c54472152c2657c32f459f852c81f8f7", 0x4a}, {&(0x7f0000000400)="efbdac6d2d649d5ad8127e231752f7951e56b5896d9215569a4af416c353dc0305abda1121fb4bd5e78ef9c8ee6ab77de1ebd4d21b3ae1b52fbd9b8918b943100b7d87b4fa08966c885702cdb6f4d8846716a1f13cd4bf15b20b0315cf02225bb1", 0x61}, {&(0x7f0000000480)="957c33491ef57e31b4ccb6c6d545451acf0e677651a138182c978806f6922bb80c9e452e935b1731b9916c7b7d165f263f9476e1bced8edac093e764c5439e689c80849ea2fc0402134afd787cb0e0287e2658c1fca447847266a5a2958ff49855f74dd20d0a7602d93fa063aa0f18fbe98ed321a5c63c0d2ce4621ce4af424f3cf4a62b3273c64889080fefe135d666c6331e23b319763adf555b14f64a7a2b4b0a3a0bf7702f4a7ec4739e75709201b99cbeb6c579240b460c095d6f653eb9b3", 0xc1}], 0x3, &(0x7f0000002e00)=ANY=[@ANYRESOCT=r4], 0x1380}, 0x8c0) socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r3, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r3, &(0x7f0000001a00)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f00000015c0)="c90477c45551f219de78f5d46a669a920ba991b2", 0x14}, {&(0x7f0000001600)="2ecce5a27a8d5e627ff06435717914bf5c1836533b9e57c3a2e60ffa3aca62a071fd351da14cadb8d5a05618f83d707684bc8c4660c1e57a497066781e6d60ba97e405566990954ca84d0f52032e59406e434559c47f55528b51401a55667b56c6c4f8e4dcd439d5e4d99b170fa83f4360124610c91009c1f196f9d3eea4", 0x7e}, {0x0}], 0x3, &(0x7f0000001740)=[{0xd8, 0xff, 0x6, "d729f85f3f4185ff5e186363e32ad05c29a291fb86b9d49f1b1177a46e30ca2628029aad4880efcc3ec8f8da0f3fd24559263e1ba02f06ed00fa9eba166067d740766e38f8575b414a8eebfcafbb32d817a018f10c3549edaf33944a02747560d6e2d174081349f2d5e42e976930069533e3e4fc16cb98c9e3a30cfd0c1c78e9c061a47cff0cbf19189786265c03af5383037b947aa95069123f2244dcf73fe838d191db307f909e572e3a831d84ab1cd7e8551801d303b67b5acb0fd604a0cf52034e70abba0d19"}, {0x50, 0x119, 0x0, "ae9fef1b3c3734601dbd9404b13d45533b5a9b15e0736e5168befb8bbd269ff053c7bcf00ff5a2c0d0ba28df0b09494bc59815d36bd3c3a61f78d8a32d"}, {0xa8, 0x110, 0x7ff, "e4ef71f88034d37b9e0034851265fff186537895b6fdce0563c24540a0848e4d911ace754995589ebed6fa121e45b6f03b32c13c6523ad95af2be42b7538a8eebb18a870a782883f644ea627c6fb2c276bcbb898fe04c2123ec495de6594f965ae851e995c6e9b684df5d31d91bf68d74f6bd3257d20a596637e3d45f71a1a4e9f2fe16ef295cde03e51cace4ca7034c2b9e8f"}], 0x1d0}, 0x800) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000100)=@nl=@unspec={0x871f000000000000, 0x2a77, 0xfc90009, 0x2}, 0x397, &(0x7f0000000040)=[{&(0x7f0000000280), 0xff8f}], 0x1, &(0x7f0000001280), 0x0, 0x438}, 0x7805) 17:04:05 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x806c}, {&(0x7f0000000140)="10c4645f01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:05 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="2e00000022008151e00f80ecdb4cb904000af0007c5a685ea17d2037af15c40006586500dc2976d1008100a41151", 0x2e}], 0x1, 0x0, 0x0, 0xc000000}, 0x0) socket$kcm(0x2, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000200)=@generic={0x0, "c72ea94df17e720b9cff3726f2f3504ed1cd0c9ff7dccf7442174a67364297473d3e1d51b1679036d24ae383e94955dfe69b5386da224d68f76a7aa563f5772702e85610eb99073c1c46607ea2a3b97e438a289d70dbbe4897f172791385dc05ff81ae65662411daf6c00e6d7721fd077972062855cb339ebce47e700406"}, 0x80, 0x0}, 0x0) 17:04:05 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000005d80)={0x0, 0x8, &(0x7f0000000180)=@framed={{}, [@alu={0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffff0}, @exit, @jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0x18}, @call, @jmp={0x5, 0x0, 0x0, 0x3, 0x9}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x11, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005d00)={0x0, 0x5}, 0x8, 0x10, 0x0}, 0x78) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 17:04:05 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000004c40)={0x0, 0x0, &(0x7f0000004b40)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x40012040) 17:04:05 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000005d80)={0x18, 0xa, &(0x7f0000000180)=@framed={{}, [@alu={0x7, 0x0, 0x8, 0x2, 0xb, 0x2, 0xfffffffffffffff0}, @map_val={0x18, 0x1}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x3}, @exit, @jmp={0x5, 0x0, 0x1, 0x7, 0x1, 0x18}]}, &(0x7f0000000200)='GPL\x00', 0x1, 0x6c, &(0x7f0000000240)=""/108, 0x40f00, 0x11, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005d00)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000005d40)={0x0, 0xb, 0x3, 0x80}, 0x10}, 0x78) [ 1240.177340] ieee802154 phy0 wpan0: encryption failed: -22 [ 1240.183028] ieee802154 phy1 wpan1: encryption failed: -22 17:04:05 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@ip_ttl={{0x14}}], 0x20000398}, 0x0) 17:04:05 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="2e00000022008151e00f80ecdb4cb904000af0007c5a685ea17d2037af15c40006586500dc2976d1008100a41151", 0x2e}], 0x1, 0x0, 0x0, 0xc000000}, 0x0) socket$kcm(0x2, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000200)=@generic={0x0, "c72ea94df17e720b9cff3726f2f3504ed1cd0c9ff7dccf7442174a67364297473d3e1d51b1679036d24ae383e94955dfe69b5386da224d68f76a7aa563f5772702e85610eb99073c1c46607ea2a3b97e438a289d70dbbe4897f172791385dc05ff81ae65662411daf6c00e6d7721fd077972062855cb339ebce47e700406"}, 0x80, 0x0}, 0x0) 17:04:05 executing program 3: perf_event_open$cgroup(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0d00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:04:05 executing program 1: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f00000005c0)=@ax25={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x8}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @bcast, @default, @default]}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000640)="18c5891510591e2580868ba27767a13066c7224b163395c443a92a3366", 0x1d}, {&(0x7f0000000680)="aaa36be550ec3c4d72e6d67f1bfc6ea6089550f901cab5c4555b77e0a1b0e6eb079a2e4fae2e305c9063969add54fe0d66237fc636eccfc8ed94426893b503b85310e4392503", 0x46}, {&(0x7f0000000700)="c73d98b46de90065ff6517d94912ae482ec115d3b948a0729978fd94de9df4b7cd4831e82b8780fc9431b74bd8a924b843b22b87bea381801e20b5ee2234562cf1640d0514820a035b0d6bff43964d3fe8d8b831245dd3869be743e9bde100dccd8e1c28c223fe2e253a0e309f17451f3fa0d9eeeaafd05cede6d62e1d67848053e491", 0x83}, {&(0x7f00000007c0)="9c4c0577b8f6bec9be0d186780ac8baa92e78341fa60d8cfe0b2f4431fa92f85da2c90d4f49359a7bd4e1625a13d6a86a9c624c8ec07", 0x36}], 0x4, &(0x7f0000000880)=[{0x28, 0x3a, 0x6c8, "15b9fa6b71b0f150470e7cab9c3831b667a2314697"}, {0x48, 0x84, 0x0, "72a2689e80aa120b37cacec83a35fa26ddeb7b401b16ff034734a34c1e2fbbb074bb6849f67d1414f36d6c29b45c4c2e02f8843d"}, {0x38, 0x1a, 0x4, "2f16549e1f63e2ada6d996a0cd5eb1496ea44b9c77d01a4c6fd3eb424d20fb67d75b7e"}, {0x98, 0x107, 0xd122, "44a156506a73320909b31f8a5a923e3406863aec82aac9083a59f2e696e3be7daa25693805bf9c51341af0d27f768af4b78a35bf37f5c8a2dc877635cbc3a12e873045a45d07eb6d1bbd6c01d6e5d7732099564f39409e6991ac6c4ab06b8166ae9fe131270886bfd36a1055a86ea2b413e74f601222bff7ac9baa96b4531d641c9cad53b8"}, {0x108, 0x118, 0xfffffffd, "9a8c8393065601f53430e78d91c7e9240c4d8972d8fa35905c80105972afbfea454966d72a7b4ef08a140b9cb008da30cdfc3010621475bf05554ef9b7bdda990bd02642ce8b3950e99a22e4f0abc687c6b031f21d7149d1259fcd8c9c279fddb10ddf527a886e5d530c104537bb7e2f15f43306718c786535ad017727b184ba465a750f980be5cb810648fe274e4a0c7d376f657403a75d39f2a5ca8fba9b012fd5ac27db863fbb71ea091207d5a37b58c490494242f923b04787b9cb18038a0740616902318d87555fa629e2d7c1a5023cc11972376ec4a39fdc0c62f68bc006878ecce1f86473a6a9992dbc2ceef698a575"}, {0x70, 0x118, 0x5c, "36cc9c4939fe4a49bdb154e440046797dc37b935b318e18391ca28c340344e16ff4aad8af3f881c0595849876998eea855562be2b8c39df0c5ab75292056ab744ce0bf4d781fdfbf11f8360bb59be8037135cc5d5f2bff3754271d0cc54d8e2c"}], 0x2b8}, 0x20044080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x84192, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) r1 = socket$kcm(0x21, 0x0, 0x2) r2 = socket$kcm(0xa, 0x3, 0x73) sendmsg(r2, &(0x7f0000000800)={&(0x7f00000000c0)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000180)=[{0x18, 0x29, 0xb, "0f"}], 0x18}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, &(0x7f0000000580)={r1}) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x0, @mcast2, 0x9}, 0x80, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="3800000000000000290000000400000078040409"], 0x38}, 0x8000) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r3 = socket$kcm(0xa, 0x5, 0x0) socket$kcm(0x29, 0x7, 0x0) close(r3) r4 = socket$kcm(0xa, 0x3, 0x73) sendmsg(r4, &(0x7f0000000800)={&(0x7f00000000c0)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000180)=[{0x18, 0x29, 0xb, "0f"}], 0x18}, 0x0) sendmsg$kcm(r3, &(0x7f0000000380)={&(0x7f0000000280)=@pppol2tpin6={0x18, 0x1, {0x0, r3, 0x2, 0x4, 0x2, 0x4, {0xa, 0x4e24, 0x3, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x8}}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000300)="6bb2309836efc75d82aed868dbb378741fdd4c7d1c98e0998b99926e372f01720837ab4dae862f95adb6142720222a07b8b0ca0789dc5e4137b4c54472152c2657c32f459f852c81f8f7", 0x4a}, {&(0x7f0000000400)="efbdac6d2d649d5ad8127e231752f7951e56b5896d9215569a4af416c353dc0305abda1121fb4bd5e78ef9c8ee6ab77de1ebd4d21b3ae1b52fbd9b8918b943100b7d87b4fa08966c885702cdb6f4d8846716a1f13cd4bf15b20b0315cf02225bb1", 0x61}, {&(0x7f0000000480)="957c33491ef57e31b4ccb6c6d545451acf0e677651a138182c978806f6922bb80c9e452e935b1731b9916c7b7d165f263f9476e1bced8edac093e764c5439e689c80849ea2fc0402134afd787cb0e0287e2658c1fca447847266a5a2958ff49855f74dd20d0a7602d93fa063aa0f18fbe98ed321a5c63c0d2ce4621ce4af424f3cf4a62b3273c64889080fefe135d666c6331e23b319763adf555b14f64a7a2b4b0a3a0bf7702f4a7ec4739e75709201b99cbeb6c579240b460c095d6f653eb9b3", 0xc1}], 0x3, &(0x7f0000002e00)=ANY=[@ANYRESOCT=r4], 0x1380}, 0x8c0) socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r3, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r3, &(0x7f0000001a00)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f00000015c0)="c90477c45551f219de78f5d46a669a920ba991b2", 0x14}, {&(0x7f0000001600)="2ecce5a27a8d5e627ff06435717914bf5c1836533b9e57c3a2e60ffa3aca62a071fd351da14cadb8d5a05618f83d707684bc8c4660c1e57a497066781e6d60ba97e405566990954ca84d0f52032e59406e434559c47f55528b51401a55667b56c6c4f8e4dcd439d5e4d99b170fa83f4360124610c91009c1f196f9d3eea4", 0x7e}, {0x0}], 0x3, &(0x7f0000001740)=[{0xd8, 0xff, 0x6, "d729f85f3f4185ff5e186363e32ad05c29a291fb86b9d49f1b1177a46e30ca2628029aad4880efcc3ec8f8da0f3fd24559263e1ba02f06ed00fa9eba166067d740766e38f8575b414a8eebfcafbb32d817a018f10c3549edaf33944a02747560d6e2d174081349f2d5e42e976930069533e3e4fc16cb98c9e3a30cfd0c1c78e9c061a47cff0cbf19189786265c03af5383037b947aa95069123f2244dcf73fe838d191db307f909e572e3a831d84ab1cd7e8551801d303b67b5acb0fd604a0cf52034e70abba0d19"}, {0x50, 0x119, 0x0, "ae9fef1b3c3734601dbd9404b13d45533b5a9b15e0736e5168befb8bbd269ff053c7bcf00ff5a2c0d0ba28df0b09494bc59815d36bd3c3a61f78d8a32d"}, {0xa8, 0x110, 0x7ff, "e4ef71f88034d37b9e0034851265fff186537895b6fdce0563c24540a0848e4d911ace754995589ebed6fa121e45b6f03b32c13c6523ad95af2be42b7538a8eebb18a870a782883f644ea627c6fb2c276bcbb898fe04c2123ec495de6594f965ae851e995c6e9b684df5d31d91bf68d74f6bd3257d20a596637e3d45f71a1a4e9f2fe16ef295cde03e51cace4ca7034c2b9e8f"}], 0x1d0}, 0x800) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000100)=@nl=@unspec={0x871f000000000000, 0x2a77, 0xfc90009, 0x2}, 0x397, &(0x7f0000000040)=[{&(0x7f0000000280), 0xff8f}], 0x1, &(0x7f0000001280), 0x0, 0x438}, 0x7805) 17:04:05 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8074}, {&(0x7f0000000140)="10c4645f01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:05 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) recvmsg(r1, &(0x7f0000009200)={0x0, 0x0, 0x0}, 0x0) 17:04:05 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f000000ab80)={0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f000000c340)={&(0x7f000000abc0)={0x2, 0x0, @private}, 0x10, &(0x7f000000c240)=[{&(0x7f000000ac00)="1b", 0x1}, {&(0x7f000000acc0)="d2", 0x1}, {&(0x7f000000ad00)="11", 0x1}], 0x3, &(0x7f000000c300)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote}}}], 0x20}, 0x0) 17:04:05 executing program 0: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f000000c380)={0xffffffffffffffff}, 0xc) 17:04:05 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000006000)={0x18, 0x2, &(0x7f0000005e00)=@raw=[@btf_id], &(0x7f0000005e40)='GPL\x00', 0x3, 0xdc, &(0x7f0000005e80)=""/220, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:04:05 executing program 3: r0 = perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x40049409, &(0x7f0000000400)) 17:04:05 executing program 2: r0 = perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0xc0045878, 0x0) 17:04:06 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@typedef={0x1, 0x0, 0x0, 0x8, 0x1}]}, {0x0, [0x6f]}}, &(0x7f0000000080)=""/232, 0x27, 0xe8, 0x1}, 0x20) 17:04:06 executing program 0: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) 17:04:06 executing program 3: perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0x60, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xb1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x9858, 0x0, 0x0, 0xf}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:04:06 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x0, 0x1, 0x0, &(0x7f0000000600)=[0x0], 0x1}, 0x20) 17:04:06 executing program 0: r0 = perf_event_open$cgroup(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, r0, 0x0) 17:04:06 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000017c0)={0xffffffffffffffff}) sendmsg(r0, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001b40)=[{&(0x7f0000001800)="b5", 0x1}], 0x1}, 0x0) 17:04:06 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x807a}, {&(0x7f0000000140)="10c4645f01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:06 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array]}}, &(0x7f0000000100)=""/200, 0x32, 0xc8, 0x1}, 0x20) 17:04:06 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef]}}, &(0x7f0000000080)=""/232, 0x26, 0xe8, 0x1}, 0x20) 17:04:06 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000003400)={0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000003640)={0x0, 0x0, 0x0}, 0x0) 17:04:06 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1, 0xc9}, 0x40) 17:04:06 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000005d80)={0x0, 0x3, &(0x7f0000000180)=@framed, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000210c0)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000021000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) 17:04:06 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000240)) 17:04:06 executing program 2: syz_open_procfs$namespace(0x0, &(0x7f0000000400)='ns/user\x00') 17:04:06 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f000000ab80)={0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f000000c340)={0x0, 0x0, &(0x7f000000c240)=[{0x0}, {&(0x7f000000acc0)="d2", 0x1}], 0x2}, 0x0) 17:04:06 executing program 1: r0 = perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000300)='freez\"r.state\x00') 17:04:06 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x80c8}, {&(0x7f0000000140)="10c4645f01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:06 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$TUNSETVNETBE(r0, 0x400454de, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000300)={0xffffffffffffffff, 0x0, 0x1, 0x400, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x19, 0x4, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x1, [], 0x0, 0xffffffffffffffff, 0x0, 0x20000}, 0x40) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x43, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x2900, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x29, 0x1, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r3) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x4) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000380)="1e10fc8d3ac840536829d9f6942894e77a098a325eeca47837ab2888e5a91f3e2641b251567270f4e4a6bf8cb8c034d3dbfb42edd88d098a37e69b5a28a8bf9e7cc679fa4e4aca3e5ef4a7e2149cf7f8b97fb8bb7779c29f55a11bab15b284981eab84b75921835199653a22cbf8bdfdf161b7f4fadd60eeaade83005eb7f5905605d40ca016c4a3034a12fc993083f8a94cffbc50aa84afe656915ab553d94cc132437181", 0xa5}, {&(0x7f0000000480)="bd7d60eddda6256cc5f9f42b91465859cc4aaee330e3296dabb9322615063ee394526a98dd576be838898a84f7777257cf89a94fe89c9655859116b06a0c90af496ba09953b8d57aa0786db579c261e53a2c7fa204705b53dad31026a83481c7bdc8ba42c12a2afe6bded9938fb8c464a2478a3ee642587f32a07dc3e491ee6baae63a06eb32edcd27558d7283a15ab439b15440321a", 0x96}, {&(0x7f0000000200)="f7a2a420b6616a78d799ab45ac811f4e05a0ed0723766922ff0a1956f4f706eb9fef5fbf52b9e1ad3bf588b5fc9ad201c9ace8f876edaf79d81bd16eb0d4c3f8e5db32ac3fc1a758218d556c073b6e0a3af966cfba03b99945e8ef492568bbdfbcb7a84be5f8b80956bb844586dd948c2a726119824fd55c9f4d9351c9f40cd1567bd03cd706691996ae2467f3ff5c74be08a9235edb9990ee50df1aab2c628452fb3501afc09a4af4dd40668365d207a6ff45eb04df8e1a", 0xb8}, {&(0x7f0000000580)="8534cb12246a7f150a992475054a03796db50e7bbdb64b79368348212b5ecb64783b440a4e1859536d65c0fd9633b83fce11d86690e041db5dfaa98fe7f95b625a491944f1820f5cc06be270291aeaf77b51f317a0ad9e84b8bdad5a24f78f5423bf6f2074ef214c03baa80f87cd84c272777848a051da122bb710b7d20ff3ea83925c887cdf4dad46af6b7d057ead2872847577c742f8d8ccddc2ba50a5214aa6178ceb5560cb541c2294507acb885a710a02084d7726d3784aa3", 0xbb}, {&(0x7f0000000640)="f06c3f98ac443242ec04d68d6efca8791b12644554fec198fa546756f73dd3902cecf38805056003efa8897dc0d27a4dc5645f899958391895022b33274c49289f0cf057ff1e719dba8e88dd02f89e140ac6e2c28e760fc55304c40e5802d8f40e2d7b303779ad5e70afc8c32fce26b8530f5431f64cda1a2b2e7b40585de33e39efb1fa1f990640004234cece3bb4e28ce99707d614fdc76b521d77154dd8c5a3a78089234ff939f26e029a5712def4b5d6db513f77ddeec22a9a157645222ae424b2cbeff61488e6c30ed04790aefa3d4cf8fc7e7710d0185cbfee02aab4514bc62e6e69e6198e2d483b91e95067", 0xef}, {0x0}], 0x6, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], 0x120}, 0x20000041) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000740)={0x2, 0x70, 0x9, 0xc, 0x2, 0x0, 0x0, 0x7f, 0x0, 0x876b30d2887865bd, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_config_ext={0x9, 0x2}, 0x4, 0x4, 0x0, 0x1, 0x20000000000003, 0x5, 0xfff}) sendmsg$kcm(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000a00)=[{0x0}, {&(0x7f0000000940)="9d791d6358b51cdcd8d38931271462df2b154d1ef87326969ab8160ac5539e501e187c3eb714caa3028584193cb2e7b618e0f94d7e61012bed6d20aad7596eb38929d15549fcc96212abe1a4f80adb3fe3cc12bd76cb9abbfc9d21a4086fb56302fe1a16f014f59c37e9497067e6fef00e786354120f2864ee75f870", 0x7c}], 0x2, &(0x7f0000003900)=ANY=[], 0x1570}, 0x4000000) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, 0x0, 0x0) socket$kcm(0x10, 0x2, 0x0) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2e00000010008108040f80ecdb4cb9460a480e0a10000000e3bd6efb250009000e00030040fe00ff050005001201", 0x2e}], 0x1}, 0x0) 17:04:06 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x8912, 0xffffffffffffffff) 17:04:06 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7ff}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x43408) close(r0) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f0000000400)={&(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @loopback={0x11000000, 0x7ffff000}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000000)="be", 0x1238c}], 0x1, 0x0, 0x0, 0x1238c}, 0x60) 17:04:06 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000003e40)={&(0x7f0000003c80)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xd, 0xd, 0x2, [@datasec={0x0, 0x0, 0x0, 0xf, 0x1, [], "b3"}]}}, &(0x7f0000003d40)=""/234, 0x2a, 0xea, 0x1}, 0x20) 17:04:06 executing program 3: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000001780)={&(0x7f0000000040)=@name, 0x10, 0x0, 0x0, 0x0, 0xd0010100}, 0x0) 17:04:06 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) recvmsg(r1, &(0x7f0000003240)={0x0, 0x0, 0x0}, 0x140) 17:04:06 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x1, &(0x7f00000001c0)=@raw=[@alu], &(0x7f0000000200)='GPL\x00', 0xfd, 0xaf, &(0x7f0000000240)=""/175, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:04:06 executing program 0: r0 = perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x5450, 0x0) 17:04:06 executing program 1: syz_open_procfs$namespace(0x0, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000600)) 17:04:06 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f000000ab80)={0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f000000c340)={&(0x7f000000abc0)={0x2, 0x0, @private}, 0x10, &(0x7f000000c240)=[{&(0x7f000000ac00)="1b", 0x1}, {&(0x7f000000acc0)="d2", 0x1}, {&(0x7f000000ad00)="11", 0x1}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, &(0x7f000000c300)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote}}}], 0x20}, 0x0) 17:04:06 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8100}, {&(0x7f0000000140)="10c4645f01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:06 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xd, 0xd, 0x2, [@datasec={0x0, 0x0, 0x0, 0xf, 0x1, [], "b8"}]}}, &(0x7f0000000100)=""/200, 0x2a, 0xc8, 0x1}, 0x20) 17:04:07 executing program 3: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000140)) socketpair(0x1d, 0x4, 0x0, &(0x7f0000000440)) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) [ 1241.919852] can: request_module (can-proto-0) failed. 17:04:07 executing program 0: openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000080)='devices.allow\x00', 0x2, 0x0) [ 1241.957217] can: request_module (can-proto-0) failed. 17:04:07 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000003400)) 17:04:07 executing program 3: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80ffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:04:07 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000006000)={0x18, 0x1, &(0x7f0000005e00)=@raw=[@alu={0x4}], &(0x7f0000005e40)='GPL\x00', 0x3, 0xdc, &(0x7f0000005e80)=""/220, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:04:07 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x7, 0x0, 0x0, 0x0, 0x1000}, 0x40) 17:04:07 executing program 3: perf_event_open$cgroup(&(0x7f0000020ec0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:04:07 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0xbf00}, {&(0x7f0000000140)="10c4645f01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:07 executing program 0: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000c00)={&(0x7f0000000bc0)='\x00'}, 0x10) 17:04:07 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, 0x0) 17:04:07 executing program 1: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00'}, 0x10) 17:04:07 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000f80)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000001280)) 17:04:07 executing program 2: r0 = perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='&{(-\x00') 17:04:07 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x1}, 0x40) 17:04:07 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000780)={&(0x7f0000000500)={0x2, 0x0, @multicast1}, 0x10, 0x0}, 0x0) 17:04:07 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) write$cgroup_int(r0, &(0x7f0000000040), 0x12) 17:04:07 executing program 1: socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000400)=""/151, 0x97}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000000)="7f7e8a04e1b16ba2183733dba5f07b83de84423d2eb8d91f5c41c77dbffc35106c7e3c8bdc35c3501fe4c91a105cd282060eb5d75cc9bb43057cdf0e1df10d9cd73a7e5b5032a234a7c40113b96d2c1bf3e7468f31b865c014fe4686f183eb11568d1d4b7dec1baacb707b09aec9dd1a7268fd3ac2444b78509784ae08ed99292f4df807d5a9f8fe", 0x88}, {&(0x7f00000000c0)="744c1b6df8b8226635b873b710e9aa", 0xf}], 0x2, &(0x7f00000004c0)=ANY=[], 0xb0}, 0x0) 17:04:07 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000210c0)=@bpf_tracing={0x1a, 0x3, &(0x7f0000020f80)=@framed, &(0x7f0000021000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:04:07 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) close(r1) 17:04:07 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="2fc4645f01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:07 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x8001}, 0x40) 17:04:07 executing program 0: socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000400)=""/151, 0x97}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=ANY=[], 0xb0}, 0x0) 17:04:07 executing program 3: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x8903, 0x0) 17:04:08 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000080)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) 17:04:08 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000005d80)={0x0, 0x3, &(0x7f0000000180)=@framed, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:04:08 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_read_part_table(0xfdffffff, 0x0, 0x0) 17:04:08 executing program 3: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0) [ 1242.781219] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1242.781219] 17:04:08 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)={[{@huge_within_size='huge=within_size'}, {@gid={'gid', 0x3d, 0xee01}}, {@nr_inodes={'nr_inodes'}}, {@huge_always='huge=always'}], [{@fsuuid={'fsuuid'}}]}) 17:04:08 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@bridge_newvlan={0x18, 0x70, 0x1}, 0x18}}, 0x0) 17:04:08 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x30, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x193242, 0x0) r1 = memfd_create(&(0x7f00000002c0)='/s\xcb\x9cF2\x1d\b\x00\xca\xdc[\x17\x8b\xb2\xf7W\xf0\xfb\xff\xff\xff\xff\xff\xff\xffvelindf\xda\xf7\xe7VP]\x87\xbb\xbd\tJP\x98\rM\xea\x90r\r\xa6R\xb4\xb8\xa1\x98\xb43\xa6,\xe2x\x12\xfaw\xaa\xef\x96\xfbi\xf8\x00\bbQ\xd8gC\xb2-\xa1\xe6\xdfs\xb5\xab\x06\x00\x00\x00\xe93\xf2\xd6\x03\'\xaa(\x8f\xaf\f7\xfa\xcf\xaf\xd6\x1fK\xe0\xf3g\x81\xf3o$\x03\x89\xf7\xb6\xed\xd0\xd2\x18j\x8f\x9b\xd1\x8a\xdaX;\xb6\xf4\'y\x17\x7f\xc5\x90\xcc\xe9\xdc\xa7\a\xe2J8x\xad/\xba\xb1m\x11\x03J\x7f\xe4m\xe6Ne7\xeeJ\xd9}\xb0$O_\xf6\xb6\x1cePR\xcf\x1c\xbd\x03\x9a\xca\xc1_\xfb\xd0n\xc0\xc6\x04\xa8\x9c\xf5\xa7\xde\xf8&\x1d\xadUg\xb5S5\xefD\x04\x160\xafy\x02\\\xcb1\x8f\xaeh\x8c~8\x9f\xf3\xd5\x0f\xef\xb0\x0fZ\xfd\x05\xed\xfd\x82\xbd*\x192\x06\xcb1t\xd0\x7f\x8c\x9f?\xd4x0\\\x1b\xe2Po\xef\xe1\xc4J\xcbz\x17\a\xf6\xac\xc1y\xe1\x8f\x17\\\xbcp\xaa\xa6\xc6\xd5\r\xbb\x8d\x83e\xa1\xb1e\xc1\x88\xfe\xb8=\x1d\xc1(\xb7\xb7\"\xb8\x143r\xd5gL\xd2\xf7;#\xb4\x10d\xe9\xed\x19\xa3y\xe1\x80k\xbb;\xf7U\x13U\x0e\xd1{\xcb\xa6H\n\x7f,B\x93\xe4`d\x95zL\xee[w\x06(\xb1\x84\x11\xd9\x04\x99\x01\x192\xe3\xa88~4\x99\xd0U\xcd\xfa\x1d%e*\x02\xa0\x9b^\xa6\xcf9W\x9d\xcd \xb8K\xbe\xb1-\xad\xaay\x1ee\xba\b\xe8\x12\xa0\xb6Z7\x8f\x05j\x8a\xe9\xdf\x1c\xa0\xfc\x90\xb9\x00\x14', 0x0) ftruncate(r1, 0x40000) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x2008000fffffffe) 17:04:08 executing program 3: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000040)) [ 1242.918531] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1242.918531] [ 1242.951385] tmpfs: Bad mount option fsuuid [ 1242.957279] tmpfs: Bad mount option fsuuid 17:04:08 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="5fc4645f01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:08 executing program 2: request_key(&(0x7f0000000240)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f00000002c0)='fd', 0xfffffffffffffffd) [ 1243.214548] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1243.214548] [ 1243.296341] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1243.296341] 17:04:08 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x80000001}, 0x1c) 17:04:08 executing program 3: syz_mount_image$romfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000240)="04", 0x1}], 0x0, 0x0) 17:04:08 executing program 1: syz_mount_image$fuse(&(0x7f0000000000)='fuse\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 17:04:08 executing program 2: syz_mount_image$fuse(&(0x7f0000000000)='fuse\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000,user_id=', @ANYRESDEC, @ANYBLOB='@']) 17:04:08 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="bfc4645f01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:08 executing program 5: syz_mount_image$romfs(&(0x7f00000001c0)='romfs\x00', 0x0, 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f00000003c0)={[], [{@uid_gt={'uid>', 0xee00}}]}) execveat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0) 17:04:09 executing program 2: syz_mount_image$romfs(&(0x7f00000001c0)='romfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000240)="04", 0x1}], 0x0, &(0x7f00000003c0)) 17:04:09 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x1c) 17:04:09 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f00000000c0)={'batadv0\x00'}) 17:04:09 executing program 0: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r3, 0x29, 0x36, &(0x7f00000000c0)=ANY=[], 0x8) connect$inet6(r3, &(0x7f00000003c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x4240a2a0) r4 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x100000, 0x0) [ 1243.811995] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1243.811995] 17:04:09 executing program 1: add_key$keyring(&(0x7f0000001a40)='keyring\x00', &(0x7f0000001a80)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) 17:04:09 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)={[{@huge_within_size='huge=within_size'}, {@gid={'gid', 0x3d, 0xee01}}, {@nr_inodes={'nr_inodes'}}], [{@fsuuid={'fsuuid'}}]}) 17:04:09 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/psched\x00') r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendfile(r2, r1, 0x0, 0xf6c1) 17:04:09 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000d00)='tmpfs\x00', &(0x7f0000000d40)='./file1\x00', 0x8, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001200)) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0x0) [ 1244.035198] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1244.035198] [ 1244.086650] tmpfs: Bad mount option fsuuid [ 1244.101998] tmpfs: Bad mount option fsuuid 17:04:09 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000d40)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000001380)='./file1\x00', 0x0, 0x0, 0x0, 0x0) 17:04:09 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c40a5f01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:09 executing program 1: inotify_add_watch(0xffffffffffffffff, 0x0, 0x10000082) 17:04:09 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)={[], [{@fsuuid={'fsuuid'}}]}) [ 1244.319641] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1244.319641] 17:04:09 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_INTERFACE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x0, 0x1}, 0x14}}, 0x0) sendmsg$NL802154_CMD_SET_ACKREQ_DEFAULT(0xffffffffffffffff, 0x0, 0x0) 17:04:09 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000009c0)={0x18, 0x5, &(0x7f0000000740)=ANY=[], &(0x7f0000000780)='GPL\x00', 0x7fffffff, 0xf6, &(0x7f0000000840)=""/246, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:04:09 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x1d, 0x2, &(0x7f0000000000)=@raw=[@map_val={0x18, 0x0, 0x2, 0x0, 0x1}], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 1244.441582] tmpfs: Bad mount option fsuuid [ 1244.449119] tmpfs: Bad mount option fsuuid [ 1244.483272] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1244.483272] 17:04:09 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f00000002c0), 0x10) 17:04:09 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4255f01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:09 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x20, &(0x7f0000000000)="4a016cf5b605071e6a1542c71b91687467330103a4e700d4b3b2c94c46cf9966", 0x20) 17:04:09 executing program 5: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000002480)=ANY=[@ANYBLOB="28000000140001000000000000000000010011000100c9252a"], 0x28}}, 0x0) 17:04:09 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x0, 0x0, &(0x7f00000000c0)) 17:04:09 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ifreq(r0, 0x8917, &(0x7f00000003c0)={'veth1_to_bridge\x00', @ifru_data=0x0}) 17:04:10 executing program 3: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x1, &(0x7f0000000600)=[{0x0}], 0x0, 0x0) 17:04:10 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x2, 0x4}, 0x40) 17:04:10 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/psched\x00') r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendfile(r2, r1, 0x0, 0xf6c1) ftruncate(0xffffffffffffffff, 0x0) fanotify_init(0x0, 0x0) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setxattr$security_capability(0x0, 0x0, 0x0, 0x0, 0x0) rt_sigqueueinfo(0x0, 0x0, 0x0) 17:04:10 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_INTERFACE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x0, 0x1}, 0x14}}, 0x0) 17:04:10 executing program 0: syz_mount_image$romfs(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{0x0, 0x0, 0x3}], 0x0, 0x0) 17:04:10 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x48, 0x0, &(0x7f00000000c0)) 17:04:10 executing program 3: mkdir(&(0x7f0000000000)='./file1\x00', 0x0) creat(&(0x7f0000000140)='./file1/file0\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000040)='./file1/file0\x00', &(0x7f0000000080)='autofs\x00', 0x0, 0x0) [ 1244.991133] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1244.991133] 17:04:10 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c42e5f01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:10 executing program 3: clock_getres(0x0, &(0x7f00000000c0)) [ 1245.082798] autofs4:pid:5382:autofs_fill_super: called with bogus options [ 1245.100275] autofs4:pid:5388:autofs_fill_super: called with bogus options 17:04:10 executing program 2: syz_mount_image$romfs(&(0x7f00000001c0)='romfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)) 17:04:10 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=@gettfilter={0x24, 0x2e, 0x4}, 0x24}}, 0x0) 17:04:10 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$sock(r0, &(0x7f0000000980)=[{{&(0x7f0000000380)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, 0x0}}], 0x1, 0x0) 17:04:10 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'macvlan1\x00', &(0x7f00000000c0)=@ethtool_pauseparam={0x13}}) 17:04:10 executing program 0: mount$9p_fd(0x0, 0x0, 0x0, 0x47aedb61f642aac6, 0x0) 17:04:10 executing program 3: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000800)='/dev/nvram\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000940)={r0, 0x0}, 0x20) [ 1245.299458] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1245.299458] 17:04:10 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000c00)={'wpan1\x00'}) 17:04:10 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001ac0)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @dev, 0xfff}, 0x1c, &(0x7f00000007c0)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, &(0x7f0000000880)=[@rthdrdstopts={{0x18}}, @dstopts_2292={{0x18}}, @hoplimit={{0x14}}], 0x48}, 0x0) 17:04:10 executing program 5: mkdir(&(0x7f0000000000)='./file1\x00', 0x0) creat(&(0x7f0000000140)='./file1/file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000040)='./file1/file0\x00', &(0x7f0000000080)='autofs\x00', 0x0, 0x0) 17:04:10 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x4a, 0x0, &(0x7f00000000c0)) [ 1245.484094] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1245.484094] 17:04:10 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c42f5f01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:10 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001740), 0xa000, &(0x7f0000001800)) 17:04:10 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r0, 0x29, 0x37, &(0x7f0000000000), 0x8) 17:04:10 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000009c0)={0x18, 0x5, &(0x7f0000000740)=ANY=[], &(0x7f0000000780)='GPL\x00', 0x0, 0xf6, &(0x7f0000000840)=""/246, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:04:10 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x21, 0x1, &(0x7f0000000540)=@raw=[@func], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 1245.658920] autofs4:pid:5437:autofs_fill_super: called with bogus options [ 1245.692826] autofs4:pid:5444:autofs_fill_super: called with bogus options 17:04:10 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) accept4$inet6(r0, 0x0, 0x0, 0x80400) 17:04:10 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_mreq(r0, 0x29, 0x0, 0x0, 0x0) 17:04:10 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x1600bd7f, 0x0, &(0x7f00000000c0)) 17:04:11 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x4c, 0x0, &(0x7f00000000c0)) [ 1245.827228] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1245.827228] 17:04:11 executing program 1: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x8}, 0xc) 17:04:11 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001ac0)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @dev}, 0x1c, 0x0, 0x0, &(0x7f0000000880)=[@rthdrdstopts={{0x18}}], 0x18}, 0x0) 17:04:11 executing program 2: inotify_add_watch(0xffffffffffffffff, 0x0, 0x60000030) [ 1245.953453] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1245.953453] [ 1245.982159] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 17:04:11 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4bf5f01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:11 executing program 0: r0 = creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000600)='nl80211\x00', r0) sendmsg$NL80211_CMD_DISCONNECT(r0, &(0x7f0000000780)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x24, 0x0, 0x0, 0x70bd26, 0x25dfdbfe, {{}, {@void, @void}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x32}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x3a}]}, 0x24}, 0x1, 0x0, 0x0, 0x801}, 0x20000000) sendmsg$NL80211_CMD_DEL_PMKSA(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x74, r1, 0x2, 0x70bd2a, 0x25dfdbfd, {{}, {@void, @val={0xc, 0x99, {0x1, 0x14}}}}, [@NL80211_ATTR_PMK_LIFETIME={0x8, 0x11f, 0x4}, @NL80211_ATTR_PMK_REAUTH_THRESHOLD={0x5, 0x120, 0x56}, @NL80211_ATTR_SSID={0x1a, 0x34, @random="065d77acc11a595850b75b34744a04557bd411a5adaf"}, @NL80211_ATTR_SSID={0x4}, @NL80211_ATTR_SSID={0xb, 0x34, @random="cad7a000e85563"}, @NL80211_ATTR_MAC={0xa, 0x6, @from_mac}, @NL80211_ATTR_SSID={0x9, 0x34, @random="4536cdbdf2"}]}, 0x74}, 0x1, 0x0, 0x0, 0x24040091}, 0x10000880) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x0, &(0x7f0000000140)=0xfffffffffffffffd, 0xd) mlock(&(0x7f0000480000/0x2000)=nil, 0x2000) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mbind(&(0x7f0000196000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x0) madvise(&(0x7f0000a4f000/0x4000)=nil, 0x4000, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mprotect(&(0x7f0000fee000/0xf000)=nil, 0xf000, 0x1000007) exit_group(0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') readv(r2, &(0x7f00000012c0)=[{&(0x7f0000001400)=""/4110, 0x100e}], 0x1) 17:04:11 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) execveat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x1000) 17:04:11 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xa000, &(0x7f0000001800)) 17:04:11 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @empty}}}, 0x90) 17:04:11 executing program 3: syz_mount_image$romfs(&(0x7f00000001c0)='romfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f00000003c0)) 17:04:11 executing program 1: syz_mount_image$romfs(&(0x7f00000001c0)='romfs\x00', 0x0, 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f00000003c0)) [ 1246.201347] MTD: Attempt to mount non-MTD device "/dev/loop3" [ 1246.220909] romfs: VFS: Can't find a romfs filesystem on dev loop3. 17:04:11 executing program 5: sendmsg$NL802154_CMD_NEW_SEC_LEVEL(0xffffffffffffffff, 0x0, 0x97ece0d5b10fe05e) 17:04:11 executing program 2: syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', 0x0, 0x0, 0x0, &(0x7f0000000600), 0x0, &(0x7f0000000680)={[{@nodots='nodots'}]}) syz_mount_image$tmpfs(&(0x7f0000000d00)='tmpfs\x00', &(0x7f0000000d40)='./file1\x00', 0x0, 0x0, &(0x7f0000001140), 0x0, &(0x7f0000001200)) [ 1246.258825] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1246.258825] [ 1246.316182] MTD: Attempt to mount non-MTD device "/dev/loop3" [ 1246.348658] romfs: VFS: Can't find a romfs filesystem on dev loop3. 17:04:11 executing program 3: openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', 0x0, 0x0, 0x0, &(0x7f0000000600), 0x0, &(0x7f0000000680)) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000b00), 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000d00)='tmpfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001200)) 17:04:11 executing program 5: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000002480)=ANY=[@ANYBLOB="28000000140001000000000000000000010011000100c9252a"], 0x28}}, 0x0) 17:04:11 executing program 0: setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0x0) r0 = add_key(&(0x7f0000000a80)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0x0) openat$incfs(0xffffffffffffffff, &(0x7f0000000c80)='.pending_reads\x00', 0x5d1cc1, 0x1) syz_mount_image$tmpfs(&(0x7f0000000d00)='tmpfs\x00', &(0x7f0000000d40)='./file1\x00', 0x8, 0x2, &(0x7f0000001140)=[{&(0x7f0000000e40)}, {0x0}], 0x100826, &(0x7f0000001200)={[], [{@uid_lt={'uid<'}}]}) keyctl$unlink(0x9, 0x0, r0) lsetxattr$trusted_overlay_upper(&(0x7f0000001380)='./file1\x00', &(0x7f00000013c0)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) [ 1246.500312] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1246.500312] 17:04:11 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4640201000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:11 executing program 5: r0 = add_key$keyring(&(0x7f0000001a40)='keyring\x00', &(0x7f0000001a80)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000001ac0)='keyring\x00', &(0x7f0000001b00)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r0, r1) 17:04:11 executing program 0: execveat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0) 17:04:11 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) unshare(0x48020200) mkdir(&(0x7f00000002c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f00000018c0)='./file0\x00', &(0x7f0000000380)='hugetlbfs\x00', 0x0, 0x0) syz_genetlink_get_family_id$smc(&(0x7f0000000140)='SMC_PNETID\x00', 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) renameat(r0, &(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000000)='./file0\x00') 17:04:12 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000240)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x80) syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) unshare(0x48020200) mkdir(&(0x7f00000002c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f00000018c0)='./file0\x00', &(0x7f0000000380)='hugetlbfs\x00', 0x0, 0x0) unshare(0x20020000) r0 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) renameat(r0, &(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000000)='./file0\x00') mount(&(0x7f0000000040)=@loop={'/dev/loop', 0x0}, &(0x7f00000003c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000200)='ocfs2\x00', 0x49, 0x0) sendmsg$NL80211_CMD_PEER_MEASUREMENT_START(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000440), 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 17:04:12 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000400)={0x0, {{0x2, 0x0, @dev}}, {{0x2, 0x0, @broadcast}}}, 0x108) [ 1246.802769] IPVS: ftp: loaded support on port[0] = 21 17:04:12 executing program 3: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x498a01) 17:04:12 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x5, 0x0, &(0x7f00000000c0)) [ 1246.912471] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1246.912471] 17:04:12 executing program 3: syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', 0x0, 0x0, 0x2, &(0x7f0000000600)=[{0x0}, {0x0}], 0x0, &(0x7f0000000680)={[{@dots='dots'}, {@nodots='nodots'}, {@fat=@nfs_nostale_ro='nfs=nostale_ro'}], [{@subj_user={'subj_user', 0x3d, 'wg2\x00'}}, {@obj_role={'obj_role', 0x3d, 'wg2\x00'}}]}) add_key(&(0x7f0000000a80)='cifs.spnego\x00', &(0x7f0000000ac0)={'syz', 0x3}, &(0x7f0000000b00), 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000d00)='tmpfs\x00', &(0x7f0000000d40)='./file1\x00', 0x8, 0x3, &(0x7f0000001140)=[{0x0}, {&(0x7f0000001000)}, {0x0}], 0x0, &(0x7f0000001200)) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000001380)='./file1\x00', 0x0, 0x0, 0x0, 0x0) 17:04:12 executing program 2: syz_mount_image$romfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[{0x0}], 0x0, 0x0) [ 1247.057181] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1247.057181] 17:04:12 executing program 5: syz_mount_image$fuse(&(0x7f0000000000)='fuse\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000,user_id=', @ANYRESDEC]) 17:04:12 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4640301000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:12 executing program 0: add_key$keyring(&(0x7f0000001ac0)='keyring\x00', &(0x7f0000001b00)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) [ 1247.215099] IPVS: ftp: loaded support on port[0] = 21 [ 1247.237143] print_req_error: I/O error, dev loop1, sector 0 [ 1247.245959] (syz-executor.1,5623,0):ocfs2_get_sector:1833 ERROR: status = -5 [ 1247.302167] (syz-executor.1,5623,0):ocfs2_sb_probe:782 ERROR: status = -5 [ 1247.359001] (syz-executor.1,5623,0):ocfs2_fill_super:1023 ERROR: superblock probe failed! 17:04:12 executing program 3: openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x20180, 0x0) [ 1247.435616] (syz-executor.1,5623,0):ocfs2_fill_super:1225 ERROR: status = -5 17:04:12 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/psched\x00') r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendfile(r1, r0, 0x0, 0xf6c1) fanotify_init(0x0, 0x0) 17:04:12 executing program 5: r0 = add_key$keyring(&(0x7f0000001ac0)='keyring\x00', &(0x7f0000001b00)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, 0x0, r0) [ 1247.613469] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1247.613469] [ 1247.737953] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1247.737953] [ 1247.882895] print_req_error: I/O error, dev loop1, sector 0 [ 1247.888881] (syz-executor.1,5633,0):ocfs2_get_sector:1833 ERROR: status = -5 [ 1247.904087] (syz-executor.1,5633,0):ocfs2_sb_probe:782 ERROR: status = -5 [ 1247.935521] IPVS: ftp: loaded support on port[0] = 21 [ 1247.940847] (syz-executor.1,5633,0):ocfs2_fill_super:1023 ERROR: superblock probe failed! [ 1247.958808] (syz-executor.1,5633,0):ocfs2_fill_super:1225 ERROR: status = -5 17:04:14 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000240)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x80) syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) unshare(0x48020200) mkdir(&(0x7f00000002c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f00000018c0)='./file0\x00', &(0x7f0000000380)='hugetlbfs\x00', 0x0, 0x0) unshare(0x20020000) r0 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) renameat(r0, &(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000000)='./file0\x00') mount(&(0x7f0000000040)=@loop={'/dev/loop', 0x0}, &(0x7f00000003c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000200)='ocfs2\x00', 0x49, 0x0) sendmsg$NL80211_CMD_PEER_MEASUREMENT_START(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000440), 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 17:04:14 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)={[{@huge_within_size='huge=within_size'}, {@gid={'gid', 0x3d, 0xee01}}, {@nr_inodes={'nr_inodes'}}, {@huge_always='huge=always'}]}) 17:04:14 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x22, 0x0, 0x0) 17:04:14 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='veth1_vlan\x00', 0x10) connect$inet(r0, &(0x7f0000000680)={0x2, 0x0, @local}, 0x10) 17:04:14 executing program 2: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) execveat(r0, &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0) 17:04:14 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4640401000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:14 executing program 3: mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='upperdir=./r=./fil?1,lowerdir=.']) 17:04:14 executing program 2: setresgid(0xee01, 0xffffffffffffffff, 0xee00) [ 1249.694369] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1249.694369] 17:04:14 executing program 0: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptp0\x00', 0x0, 0x0) ioctl$PTP_PIN_GETFUNC(r0, 0xc0603d06, &(0x7f0000000240)) 17:04:14 executing program 3: openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x52b02, 0x0) [ 1249.748375] overlayfs: missing 'workdir' 17:04:15 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000040)='nl802154\x00', 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CCA_ED_LEVEL(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000180)={0x0}}, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000240)='nbd\x00', r0) [ 1249.905952] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1249.905952] 17:04:15 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000080)={0x0, {{0x2, 0x0, @loopback}}}, 0x90) [ 1249.969348] print_req_error: I/O error, dev loop1, sector 0 [ 1249.975254] (syz-executor.1,5743,0):ocfs2_get_sector:1833 ERROR: status = -5 [ 1249.982566] (syz-executor.1,5743,0):ocfs2_sb_probe:782 ERROR: status = -5 [ 1250.094796] (syz-executor.1,5743,0):ocfs2_fill_super:1023 ERROR: superblock probe failed! [ 1250.117365] IPVS: ftp: loaded support on port[0] = 21 [ 1250.161378] (syz-executor.1,5743,0):ocfs2_fill_super:1225 ERROR: status = -5 17:04:15 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000240)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x80) syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) unshare(0x48020200) mkdir(&(0x7f00000002c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f00000018c0)='./file0\x00', &(0x7f0000000380)='hugetlbfs\x00', 0x0, 0x0) unshare(0x20020000) r0 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) renameat(r0, &(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000000)='./file0\x00') mount(&(0x7f0000000040)=@loop={'/dev/loop', 0x0}, &(0x7f00000003c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000200)='ocfs2\x00', 0x49, 0x0) sendmsg$NL80211_CMD_PEER_MEASUREMENT_START(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000440), 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 17:04:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'veth1_virt_wifi\x00'}) 17:04:15 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4640501000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:15 executing program 0: r0 = semget$private(0x0, 0x1, 0x0) semtimedop(r0, &(0x7f0000000280)=[{0x0, 0x5}, {0x0, 0x1}], 0x2, &(0x7f00000002c0)) 17:04:15 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000080)={0x0, {{0x2, 0x0, @loopback}}, 0x0, 0x1, [{{0x2, 0x0, @dev}}]}, 0x110) 17:04:15 executing program 5: mount(0x0, 0x0, &(0x7f0000000380)='cpuset\x00', 0x80400, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x7fff, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x380000, @loopback}, 0x1c) 17:04:15 executing program 3: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x80040, 0x0) 17:04:15 executing program 3: msgsnd(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x40, 0x0) 17:04:16 executing program 0: r0 = gettid() kcmp$KCMP_EPOLL_TFD(r0, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x0) 17:04:16 executing program 3: semtimedop(0x0, &(0x7f0000000280)=[{0x0, 0x0, 0x1800}], 0x1, 0x0) [ 1250.784689] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1250.784689] 17:04:16 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[], 0x3c}}, 0x0) 17:04:16 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000080)="ec6397a7e6abd5ee29", 0x9}], 0x0, 0x0) [ 1250.911891] IPVS: ftp: loaded support on port[0] = 21 [ 1250.969073] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1250.969073] 17:04:16 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000240)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x80) syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) unshare(0x48020200) mkdir(&(0x7f00000002c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f00000018c0)='./file0\x00', &(0x7f0000000380)='hugetlbfs\x00', 0x0, 0x0) unshare(0x20020000) r0 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) renameat(r0, &(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000000)='./file0\x00') mount(&(0x7f0000000040)=@loop={'/dev/loop', 0x0}, &(0x7f00000003c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000200)='ocfs2\x00', 0x49, 0x0) sendmsg$NL80211_CMD_PEER_MEASUREMENT_START(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000440), 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) 17:04:16 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)=ANY=[]) 17:04:16 executing program 0: syz_genetlink_get_family_id$gtp(&(0x7f00000004c0)='gtp\x00', 0xffffffffffffffff) 17:04:16 executing program 2: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x28701, 0x0) 17:04:16 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4640601000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:16 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x884}, 0x40) 17:04:16 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000640)=[{0x0}, {&(0x7f0000000300), 0x0, 0xfffffffffffffff9}], 0x0, &(0x7f00000007c0)={[{@nr_inodes={'nr_inodes', 0x3d, [0x70, 0x70, 0x0, 0x5, 0x0, 0x0]}}, {@uid={'uid'}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x38, 0x38, 0x0, 0x0, 0x0, 0x66, 0x63], 0x2d, [0x38, 0x0, 0x0, 0x35], 0x2d, [0x65, 0x65, 0x0, 0x39], 0x2d, [0x34, 0x0, 0x0, 0x65], 0x2d, [0x0, 0x34, 0x0, 0x0, 0x0, 0x1, 0x0, 0x35]}}}]}) 17:04:16 executing program 0: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x5, &(0x7f0000000640)=[{&(0x7f0000000100)='\v', 0x1, 0x4}, {&(0x7f00000001c0)="ea", 0x1}, {&(0x7f0000000200)='(', 0x1}, {&(0x7f0000000300)="eb942a5c266954dc", 0x8, 0xfffffffffffffff9}, {&(0x7f0000000400)="f6", 0x1}], 0x0, 0x0) 17:04:16 executing program 3: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f0000000100)="0b19f759ab", 0x5}], 0x0, 0x0) 17:04:16 executing program 5: r0 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffa000/0x4000)=nil) shmat(r0, &(0x7f0000ffa000/0x1000)=nil, 0x6000) [ 1251.444394] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1251.444394] [ 1251.540118] IPVS: ftp: loaded support on port[0] = 21 17:04:16 executing program 5: r0 = gettid() rt_tgsigqueueinfo(0x0, r0, 0x0, &(0x7f0000000040)) 17:04:16 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000005d80)={0x0, 0x0, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 1251.691685] tmpfs: Bad value 'pp' for mount option 'nr_inodes' [ 1251.699458] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1251.699458] [ 1251.767746] print_req_error: I/O error, dev loop1, sector 0 [ 1251.773718] (syz-executor.1,5891,0):ocfs2_get_sector:1833 ERROR: status = -5 [ 1251.846340] tmpfs: Bad value 'pp' for mount option 'nr_inodes' [ 1251.863347] (syz-executor.1,5891,0):ocfs2_sb_probe:782 ERROR: status = -5 [ 1251.945152] (syz-executor.1,5891,0):ocfs2_fill_super:1023 ERROR: superblock probe failed! [ 1251.979639] (syz-executor.1,5891,0):ocfs2_fill_super:1225 ERROR: status = -5 17:04:17 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4640701000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:17 executing program 3: syz_mount_image$ext4(&(0x7f00000003c0)='ext2\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x1, &(0x7f0000000940)=[{0x0, 0x0, 0xffffffff}], 0x0, &(0x7f0000000a40)) 17:04:17 executing program 0: shmget$private(0x0, 0x4000, 0x78001e24, &(0x7f0000002000/0x4000)=nil) 17:04:17 executing program 5: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptp0\x00', 0x0, 0x0) ioctl$PTP_CLOCK_GETCAPS(r0, 0x80503d01, &(0x7f0000000180)) 17:04:17 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername(r0, 0x0, &(0x7f0000000a80)) 17:04:17 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f00000002c0)={'batadv_slave_1\x00'}) [ 1252.199060] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 17:04:17 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_TDLS_MGMT(r0, &(0x7f0000001340)={&(0x7f0000001240)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001300)={&(0x7f00000012c0)={0x20, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @val={0xc}}}}, 0x20}}, 0x0) 17:04:17 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00', 0xffffffffffffffff) sendmsg$IPVS_CMD_SET_DEST(r0, &(0x7f00000001c0)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}]}, 0x28}}, 0x0) 17:04:17 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[@rdma_dest={0x18}], 0x18}, 0x24000000) [ 1252.348585] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1252.348585] 17:04:17 executing program 0: perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:04:17 executing program 5: mremap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffa000/0x4000)=nil) 17:04:17 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x4}, {&(0x7f0000000140)="10c4645f01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) [ 1252.560425] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1252.560425] 17:04:17 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4640801000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:17 executing program 1: shmget$private(0x0, 0x1000, 0x7a00, &(0x7f0000ffd000/0x1000)=nil) 17:04:17 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_TESTMODE(r0, &(0x7f00000011c0)={0x0, 0x0, &(0x7f0000001180)={0x0}}, 0x0) sendmsg$NL80211_CMD_NEW_MPATH(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x20, 0x0, 0x20adc4bd484ac8f3, 0x0, 0x0, {{}, {@void, @val={0xc}}}}, 0x20}}, 0x0) 17:04:17 executing program 5: shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000001000)=""/255) 17:04:17 executing program 2: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f0000000300)="eb", 0x1}], 0x0, 0x0) 17:04:17 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x3148800, &(0x7f00000001c0)) 17:04:18 executing program 3: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040), 0x8) 17:04:18 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB="4c000000090601"], 0x4c}}, 0x0) 17:04:18 executing program 1: bpf$ITER_CREATE(0x21, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000e80)='ethtool\x00', 0xffffffffffffffff) 17:04:18 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', 0x0, 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)) [ 1252.904888] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1252.904888] 17:04:18 executing program 2: socketpair(0xa, 0x1, 0x7, &(0x7f0000000000)) 17:04:18 executing program 3: bpf$ITER_CREATE(0x21, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f0000000e00)={0x0, 0x0, &(0x7f0000000dc0)={0x0}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000e80)='ethtool\x00', r0) [ 1253.021031] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1253.021031] [ 1253.072171] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.5'. 17:04:18 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4640901000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:18 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_CCA_ED_LEVEL(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000180)={0x0}}, 0x0) 17:04:18 executing program 0: openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x101081, 0x0) 17:04:18 executing program 1: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)='M', 0x1, 0x10001}], 0x0, 0x0) [ 1253.164071] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.5'. 17:04:18 executing program 3: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000040)='nl802154\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) sendmsg$IEEE802154_SET_MACPARAMS(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000800}, 0x0) 17:04:18 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000340)=@ipv6_newaddrlabel={0x38, 0x48, 0x67deab93dc3d4a65, 0x0, 0x0, {0xa, 0x0, 0x1}, [@IFAL_ADDRESS={0x14, 0x1, @rand_addr=' \x01\x00'}, @IFAL_LABEL={0x8}]}, 0x38}}, 0x0) 17:04:18 executing program 5: semop(0xffffffffffffffff, &(0x7f0000002540)=[{}], 0x1) 17:04:18 executing program 3: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x2a4843, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00', r0) 17:04:18 executing program 0: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x2840083, &(0x7f0000000180)=ANY=[]) [ 1253.474638] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1253.474638] 17:04:18 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 17:04:18 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000400)={[{@gid={'gid'}}, {@nr_blocks={'nr_blocks', 0x3d, [0x37]}}, {@huge_advise='huge=advise'}]}) 17:04:18 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_CCA_ED_LEVEL(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) [ 1253.684654] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1253.684654] 17:04:19 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4640a01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:19 executing program 1: getresgid(&(0x7f0000000000), &(0x7f0000000080), 0x0) 17:04:19 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x70, 0x1, &(0x7f0000000240)=[{&(0x7f0000000140), 0x0, 0x7e0000000}], 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC, @ANYBLOB, @ANYRESDEC]) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) 17:04:19 executing program 2: openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x22000, 0x0) 17:04:19 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000300)={0x10}, 0x40) 17:04:19 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_TESTMODE(r0, &(0x7f00000011c0)={0x0, 0x0, &(0x7f0000001180)={0x0}}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_TDLS_MGMT(r1, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)={0x0}}, 0x0) 17:04:19 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000400)={[{@gid={'gid'}}, {@nr_blocks={'nr_blocks', 0x3d, [0x37]}}, {@uid={'uid'}}]}) 17:04:19 executing program 1: semtimedop(0x0, &(0x7f0000000280)=[{0x0, 0x5}, {0x0, 0x2f9, 0x1800}], 0x2, &(0x7f00000002c0)) 17:04:19 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_DEL(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x14, 0xa, 0x6, 0x201}, 0x14}}, 0x0) 17:04:19 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) read$ptp(r0, &(0x7f0000000040)=""/231, 0xe7) 17:04:19 executing program 0: r0 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_LOCK(r0, 0xb) [ 1254.100665] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1254.100665] 17:04:19 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x7e0000000}], 0x0, &(0x7f0000000280)=ANY=[@ANYRESDEC=0x0, @ANYBLOB]) [ 1254.285953] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1254.285953] 17:04:19 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4640b01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:19 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240), 0x0, 0x0) 17:04:19 executing program 3: r0 = semget$private(0x0, 0x1, 0x0) semtimedop(r0, &(0x7f0000000280)=[{0x0, 0x5}, {0x1, 0x0, 0x1800}], 0x2, &(0x7f00000002c0)) 17:04:19 executing program 5: openat$ptp0(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptp0\x00', 0x101400, 0x0) 17:04:19 executing program 2: semtimedop(0x0, &(0x7f0000000280)=[{}], 0x1, &(0x7f00000002c0)) [ 1254.456564] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 17:04:19 executing program 3: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000440)='/dev/hwrng\x00', 0x12400, 0x0) 17:04:19 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[{@nr_inodes={'nr_inodes', 0x3d, [0x70, 0x70]}}]}) 17:04:19 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_MESH(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f00000000c0)={0xffffffffffffff37, 0x0, 0x0, 0x0, 0x0, {}, [@BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x4d}]}, 0xffffff35}}, 0x0) 17:04:19 executing program 0: syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000600)=[{&(0x7f0000000140), 0x0, 0x9}, {&(0x7f0000000240)="ba634a55b52b4c38f29a5be8b9524bcc942506885e791621708d9427b6c1c8cad3c412e45d8a89e42753188da4289f59c1aa141001e9637790fc", 0x3a}, {&(0x7f0000000340)}, {&(0x7f00000003c0), 0x0, 0x5}, {0x0, 0x0, 0xe1f9}], 0x1b024, &(0x7f0000000980)=ANY=[@ANYBLOB]) 17:04:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r0, 0x0, 0x0, 0x0) [ 1254.605482] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 17:04:19 executing program 1: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x274083, 0x0) [ 1254.681148] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1254.681148] 17:04:19 executing program 3: syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f0000000240)="ba", 0x1}], 0x0, &(0x7f0000000980)=ANY=[]) [ 1254.829439] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1254.829439] [ 1254.846191] tmpfs: Bad value 'pp' for mount option 'nr_inodes' 17:04:20 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4640c01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:20 executing program 2: syz_genetlink_get_family_id$net_dm(&(0x7f00000003c0)='NET_DM\x00', 0xffffffffffffffff) 17:04:20 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f00000013c0)=[{{0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000080)="6a1c92d5779019e7a96e2e171f953b", 0xf}, {0x0}, {&(0x7f0000000180)="12", 0x1}], 0x3}}], 0x1, 0x0) 17:04:20 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a0900000065002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x48}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0xc5e]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x800008000}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1254.889824] tmpfs: Bad value 'pp' for mount option 'nr_inodes' 17:04:20 executing program 5: semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000000)=""/146) 17:04:20 executing program 2: shmget(0x1, 0x1000, 0x0, &(0x7f0000ffb000/0x1000)=nil) 17:04:20 executing program 0: r0 = epoll_create1(0x0) r1 = socket$packet(0x11, 0x2, 0x300) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) 17:04:20 executing program 3: syz_mount_image$ext4(&(0x7f00000003c0)='ext2\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x804002, &(0x7f0000000a40)) 17:04:20 executing program 3: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbd2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000180)=ANY=[]) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x20002000, &(0x7f0000000000/0x2000)=nil}) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@text64={0x40, &(0x7f0000000180)="c4c235aa1066ba2100b000ee440f07b9800000c00f3235000400000f30b8010000000f01d9b90e020000b805000000ba008000000f30420f38c9ee420f928e00000000c48181c6080066bad104b0e3ee", 0x50}], 0x1, 0x0, &(0x7f0000000240), 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) syz_kvm_setup_cpu$x86(r2, r5, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000040)=[@textreal={0x8, &(0x7f0000000000)="f2c7850700000f01730a66ed2e670f01c86426660f38dbde0f01c3660f2377ecb809008ec5660f3882ac0600", 0x2c}], 0x1, 0x0, 0x0, 0x0) 17:04:20 executing program 5: socketpair(0x0, 0x40ed7fbbc63d4b06, 0x0, 0x0) [ 1255.240527] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1255.240527] 17:04:20 executing program 2: r0 = semget$private(0x0, 0x1, 0x0) semtimedop(r0, &(0x7f0000000280)=[{}], 0x1, 0x0) 17:04:20 executing program 0: r0 = shmget(0x0, 0x3000, 0x80, &(0x7f0000ffa000/0x3000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) shmctl$SHM_STAT(r0, 0xd, &(0x7f0000000000)) shmctl$SHM_INFO(r0, 0xe, &(0x7f0000000040)=""/120) shmctl$SHM_UNLOCK(r0, 0xc) shmctl$SHM_STAT(r0, 0xd, &(0x7f00000000c0)=""/4096) shmctl$SHM_STAT(r0, 0xd, &(0x7f00000010c0)=""/187) r1 = shmget$private(0x0, 0x1000, 0x400, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_STAT(r1, 0xd, &(0x7f0000001180)=""/4096) r2 = shmget(0x3, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r2, 0xd, &(0x7f0000002180)=""/135) shmctl$IPC_STAT(r2, 0x2, &(0x7f0000002240)=""/202) [ 1255.445263] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1255.445263] 17:04:20 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4640d01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:20 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a0900000065002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x48}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0xc5e]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x800008000}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 17:04:20 executing program 5: shmget$private(0x0, 0x4000, 0x32412f4aaf2ad6f4, &(0x7f0000ffa000/0x4000)=nil) 17:04:20 executing program 2: r0 = semget$private(0x0, 0x1, 0x0) semtimedop(r0, &(0x7f0000000280)=[{}], 0x1, 0x0) 17:04:20 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$nl80211(&(0x7f0000000300)='nl80211\x00', r0) 17:04:21 executing program 5: r0 = fanotify_init(0x0, 0x0) fanotify_mark(r0, 0x5, 0x1002, 0xffffffffffffffff, 0x0) [ 1255.908576] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1255.908576] 17:04:21 executing program 2: r0 = semget$private(0x0, 0x1, 0x0) semtimedop(r0, &(0x7f0000000280)=[{}], 0x1, 0x0) 17:04:21 executing program 0: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[{@nr_blocks={'nr_blocks', 0x3d, [0x0]}}]}) [ 1256.070138] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1256.070138] 17:04:21 executing program 3: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbd2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000180)=ANY=[]) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x20002000, &(0x7f0000000000/0x2000)=nil}) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@text64={0x40, &(0x7f0000000180)="c4c235aa1066ba2100b000ee440f07b9800000c00f3235000400000f30b8010000000f01d9b90e020000b805000000ba008000000f30420f38c9ee420f928e00000000c48181c6080066bad104b0e3ee", 0x50}], 0x1, 0x0, &(0x7f0000000240), 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) syz_kvm_setup_cpu$x86(r2, r5, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000040)=[@textreal={0x8, &(0x7f0000000000)="f2c7850700000f01730a66ed2e670f01c86426660f38dbde0f01c3660f2377ecb809008ec5660f3882ac0600", 0x2c}], 0x1, 0x0, 0x0, 0x0) 17:04:21 executing program 5: r0 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffa000/0x4000)=nil) shmat(r0, &(0x7f0000ffd000/0x3000)=nil, 0x7000) 17:04:21 executing program 2: r0 = semget$private(0x0, 0x1, 0x0) semtimedop(r0, &(0x7f0000000280)=[{}], 0x1, 0x0) 17:04:21 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4640e01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:21 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f00000013c0)=[{{0x0, 0x0, &(0x7f0000000380)=[{0x0}, {&(0x7f0000000100)='*', 0x1}, {&(0x7f0000000180)="12", 0x1}], 0x3}}], 0x1, 0x0) [ 1256.718249] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1256.718249] 17:04:22 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a0900000065002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x48}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0xc5e]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x800008000}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 17:04:22 executing program 5: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbd2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000180)=ANY=[]) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x20002000, &(0x7f0000000000/0x2000)=nil}) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@text64={0x40, &(0x7f0000000180)="c4c235aa1066ba2100b000ee440f07b9800000c00f3235000400000f30b8010000000f01d9b90e020000b805000000ba008000000f30420f38c9ee420f928e00000000c48181c6080066bad104b0e3ee", 0x50}], 0x1, 0x0, &(0x7f0000000240), 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) syz_kvm_setup_cpu$x86(r2, r5, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000040)=[@textreal={0x8, &(0x7f0000000000)="f2c7850700000f01730a66ed2e670f01c86426660f38dbde0f01c3660f2377ecb809008ec5660f3882ac0600", 0x2c}], 0x1, 0x0, 0x0, 0x0) 17:04:22 executing program 2: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbd2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000180)=ANY=[]) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x20002000, &(0x7f0000000000/0x2000)=nil}) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@text64={0x40, &(0x7f0000000180)="c4c235aa1066ba2100b000ee440f07b9800000c00f3235000400000f30b8010000000f01d9b90e020000b805000000ba008000000f30420f38c9ee420f928e00000000c48181c6080066bad104b0e3ee", 0x50}], 0x1, 0x0, &(0x7f0000000240), 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) syz_kvm_setup_cpu$x86(r2, r5, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000040)=[@textreal={0x8, &(0x7f0000000000)="f2c7850700000f01730a66ed2e670f01c86426660f38dbde0f01c3660f2377ecb809008ec5660f3882ac0600", 0x2c}], 0x1, 0x0, 0x0, 0x0) 17:04:22 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='tmpfs\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d706f6c3d70673a3518"]) [ 1256.867676] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1256.867676] 17:04:22 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4640f01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) [ 1257.037861] tmpfs: Bad value 'pg:5J' for mount option 'mpol' 17:04:22 executing program 0: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x2088004, &(0x7f0000000400)={[{@huge_advise='huge=advise'}]}) 17:04:22 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a0900000065002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x48}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0xc5e]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x800008000}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1257.248025] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1257.248025] 17:04:22 executing program 3: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbd2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000180)=ANY=[]) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x20002000, &(0x7f0000000000/0x2000)=nil}) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@text64={0x40, &(0x7f0000000180)="c4c235aa1066ba2100b000ee440f07b9800000c00f3235000400000f30b8010000000f01d9b90e020000b805000000ba008000000f30420f38c9ee420f928e00000000c48181c6080066bad104b0e3ee", 0x50}], 0x1, 0x0, &(0x7f0000000240), 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) syz_kvm_setup_cpu$x86(r2, r5, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000040)=[@textreal={0x8, &(0x7f0000000000)="f2c7850700000f01730a66ed2e670f01c86426660f38dbde0f01c3660f2377ecb809008ec5660f3882ac0600", 0x2c}], 0x1, 0x0, 0x0, 0x0) 17:04:22 executing program 0: openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x101400, 0x0) [ 1257.406129] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1257.406129] 17:04:22 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4641001000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:22 executing program 0: getgroups(0x1, &(0x7f0000000100)=[0x0]) 17:04:22 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a0900000065002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x48}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5e]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1257.772454] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1257.772454] 17:04:23 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x0, 0x0) write$vhost_msg_v2(r0, 0x0, 0x0) [ 1257.875762] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1257.875762] 17:04:24 executing program 5: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbd2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000180)=ANY=[]) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x20002000, &(0x7f0000000000/0x2000)=nil}) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@text64={0x40, &(0x7f0000000180)="c4c235aa1066ba2100b000ee440f07b9800000c00f3235000400000f30b8010000000f01d9b90e020000b805000000ba008000000f30420f38c9ee420f928e00000000c48181c6080066bad104b0e3ee", 0x50}], 0x1, 0x0, &(0x7f0000000240), 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) syz_kvm_setup_cpu$x86(r2, r5, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000040)=[@textreal={0x8, &(0x7f0000000000)="f2c7850700000f01730a66ed2e670f01c86426660f38dbde0f01c3660f2377ecb809008ec5660f3882ac0600", 0x2c}], 0x1, 0x0, 0x0, 0x0) 17:04:25 executing program 2: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbd2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000180)=ANY=[]) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x20002000, &(0x7f0000000000/0x2000)=nil}) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@text64={0x40, &(0x7f0000000180)="c4c235aa1066ba2100b000ee440f07b9800000c00f3235000400000f30b8010000000f01d9b90e020000b805000000ba008000000f30420f38c9ee420f928e00000000c48181c6080066bad104b0e3ee", 0x50}], 0x1, 0x0, &(0x7f0000000240), 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) syz_kvm_setup_cpu$x86(r2, r5, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000040)=[@textreal={0x8, &(0x7f0000000000)="f2c7850700000f01730a66ed2e670f01c86426660f38dbde0f01c3660f2377ecb809008ec5660f3882ac0600", 0x2c}], 0x1, 0x0, 0x0, 0x0) 17:04:25 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4641101000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:25 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB]) 17:04:25 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000140)="0f", 0x1, 0x7e0000000}], 0x0, 0x0) 17:04:25 executing program 3: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbd2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000180)=ANY=[]) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x20002000, &(0x7f0000000000/0x2000)=nil}) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@text64={0x40, &(0x7f0000000180)="c4c235aa1066ba2100b000ee440f07b9800000c00f3235000400000f30b8010000000f01d9b90e020000b805000000ba008000000f30420f38c9ee420f928e00000000c48181c6080066bad104b0e3ee", 0x50}], 0x1, 0x0, &(0x7f0000000240), 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) syz_kvm_setup_cpu$x86(r2, r5, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000040)=[@textreal={0x8, &(0x7f0000000000)="f2c7850700000f01730a66ed2e670f01c86426660f38dbde0f01c3660f2377ecb809008ec5660f3882ac0600", 0x2c}], 0x1, 0x0, 0x0, 0x0) 17:04:25 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_CCA_ED_LEVEL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_SET_MACPARAMS(r1, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={0x0}}, 0x0) [ 1259.977141] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1259.977141] 17:04:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', 0x0, 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@init_itable='init_itable'}]}) 17:04:25 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4641201000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:25 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000240)={0x64, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @empty}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @loopback}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}]}, 0x64}, 0x1, 0x0, 0x0, 0x20801}, 0x0) 17:04:25 executing program 0: openat$incfs(0xffffffffffffffff, &(0x7f0000000280)='.pending_reads\x00', 0x0, 0x0) 17:04:25 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280)='ethtool\x00', 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000007140)={&(0x7f0000000240), 0xc, &(0x7f0000007100)={&(0x7f00000002c0)={0xe94, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0xe80, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_MASK={0x6d, 0x5, "52ce132ce6ce5fdbc5ebf979c5b3c12a9d96c3eef41dd9c8a4ab72981c014087f33a8a6e546c644eb9f3fbf83542d559ee597408510c17672b335c54d3fdf8ef47fd1bfb0dcf2c5f8d03c2e7dd3f2079266bfc58f70c2c35bf2b50b317e6b9b379aecc8b865abb30dc"}, @ETHTOOL_A_BITSET_BITS={0x44, 0x3, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '[\xed!&\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_SIZE={0x8}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x3d4, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0xee, 0x4, "b3067bdb87f7432a8e4956b279016462f2e00b751948b17aa5b56586db549536e8c02c84ff39e9a196136fa0ce299ec4050fc0097b395f9013bcf1a032df5f4fd2114bd7dcaa22de00f1457a9119337eeb420f28dd884a711b42e4071b9f4033e9d08c1ec9e72243a17ac8c33d82fa44606f3ce50c346b50cbc8248c177c0aedb0de69951b75171ec21c5323354fa996663bf52909ee9e61a6308fac673c8c265e52eedb98c95b189a3b33253a172bf0bb54774f6405e5fdaccf8e85f6428cbafbee07cee5bb8d99a816710c478198677bb51b1a920fdf4baa50a54f058c92b7aa72320ad85d7b9cb475"}, @ETHTOOL_A_BITSET_BITS={0x1c, 0x3, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '-$\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}]}, @ETHTOOL_A_BITSET_VALUE={0xec, 0x4, "bb67d0f6f144a12a70257ddc0f9afcfb1515633ffe9f1e5e2b208933f1c3b742bec0f4d528dde5ac43b92c38183fc74a0f461c06cee8b3711ccb0cc85be32af2af0a32b110c1719897f38cd87f1b4d5fbd3b34439ec94989463c0c0b3e522cdc4aab9d19f66cbca0dddc35a2d626ccff1e6b4fc1b869598edee58f36d47e3d455b066e90e476de7ec1cc13978b8414bdcdb461377da77017a0a2c6fb7bcbb63c958bc5544edc118c13948b3441c86cdf7b98623ad1aac77dccf35e88c7cb1a665ce87e7477e836ea32b27df15e87e250dabe5f9363900a59c8b3581d3e042e63e6084938babbc7fa"}, @ETHTOOL_A_BITSET_MASK={0xc7, 0x5, "8f506be1eaf87504ddf7b7048caa2554987cf0d1aaac7e7b15af0d592094381ecdbc8dd0fc896ee7481d238928df2bde7194aa8282d9bd41c1ee062cc40c9221ec00d169e345848b560883d66740bee61b3af600f355d49560bc819ab6c0cfd6bfb2e9f235c0fa6674ea99fb567fb88b9067a86fb6d9f8044f24dddb73f4cb6ad72c16344c342d650d8bc97ca13bb2972f48397dfc637da9098c6e3d3561471f5619f07de56f8229f07098f54bfeda9badf24618257d7961af8cb6e0d5b0cb08ea8024"}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_VALUE={0x12, 0x4, "67316035dc73064191cb0c6c3adc"}, @ETHTOOL_A_BITSET_MASK={0xef, 0x5, "3f781f05c3f23d719555dab7702ce0c62d4221e374ede0021291542bbb9d13f45550df97c8038ad43944bf88992c237d377e6b53c2ef875c30a6c19b4953385fcc6c1ca6da14374da9b541d3525de849f2261f374fb9c10d76232626090b2375a2ba74c58d8248e1725ffe198fd65d54c229133332ca491f35e45f77639fbf7a19bae826059c91e41017d86519b586a67d0bafb47916637a44670e64b883ac95ec0b09751112125044f6b5b97b7ae13f8e5583ca4c311b25587a06904572110524222ef630f4c1886324cdca1a27fa6a2e7a5bc446c2eaf5c9c2eb1302f8e4352bc2d1c5d38ab77e2c45b0"}, @ETHTOOL_A_BITSET_MASK={0x0, 0x5, "130fe8ad57c3aa4dee35f02e97ce1d530ad66d56a50a1ccf81f29b0e186ad32fadd97e12f7075a9486f8ceed55e2ae95ef3990dbfbaa6a0361fd8da1985ceee4951b2a04373ec47b308fb3f44cf2422f66b5712127dcce42d5220108ccd5c9b939cba2ee1de4c32c9088a6bb32b559cde3ae462407eebf59eb3288b1bcfd3a313919d20a1071cd49738ab5b0b68694bc97a1c4f5bdf6ffaa404dca428268ba9536ce43854859bec64d3bdc67deec41aa97"}, @ETHTOOL_A_BITSET_VALUE={0x0, 0x4, "bc0cf6"}, @ETHTOOL_A_BITSET_VALUE={0x0, 0x4, "95fb38da0963813205ec85e2285b4162a292ae147af238c6244c847f18572171449048bdd6e2f21335b5538ba95516554df19a3b5e4ecccc5f134a17da0ebfe2cfe2c25180804217b4e4e183d07b0dac"}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0xe8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_BITS={0xa8, 0x3, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '\xdd-({^^*\x00'}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '*-\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '\\{&\'-({\xf4}\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '&\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}]}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_BITS={0x20, 0x3, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}]}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x3d0, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x3b, 0x5, "80a4f7296a606348860d7b0d93f58e076f96b735a37f2715bfa86fe15601ed702dd25906af23269191ffc2c9b7240bc04604864fa92ff0"}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_BITS={0x98, 0x3, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '!%\x00'}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, ':\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '-\x00'}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, '-,.\'@\x00'}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '-\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '}\xa2\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '@\\\x00'}]}]}, @ETHTOOL_A_BITSET_VALUE={0x102, 0x4, "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"}, @ETHTOOL_A_BITSET_VALUE={0xff, 0x4, "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"}, @ETHTOOL_A_BITSET_VALUE={0xe1, 0x4, "63a74d6f7e201be9a63f4380e7e8833bd0da169b1a37e4f830148d8ef1a968aca935f7d36173707458b5e869d0b0b790f799dfd5a5d36f779abc8dbd9ba599dceb254b6f318d8d05df0fc05f6a61c4f82e882e91495e80852db4504e3a01d97571b6b693a79e2260bb17b6a9c33411cd9cf1a26518f5b34c0c394599a7ae61f1422eaca3ce925a7af9e71a325d1aa0588e8d3a21a1efcf1d4c520f3b7c0fbd0f7494a476e4f93709a1194f31f4d49289e5d2cec4ced7d50a2456b16da5bd72c05b56d5628b6bffba629e8057348a30d02aa64c077900d1cace64868b02"}, @ETHTOOL_A_BITSET_SIZE={0x8}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x214, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_BITS={0x60, 0x3, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, '-@][%\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '+\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x4}]}, @ETHTOOL_A_BITSET_BITS={0xb8, 0x3, 0x0, 0x1, [{0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, ',!\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '\xb3/\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x12, 0x2, '[@-*@.-+\xf5,-)}\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '\xb6\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, ')\x00'}]}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x0, 0x2, '\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}]}, @ETHTOOL_A_BITSET_MASK={0xde, 0x5, "ec97abd5a1ad74ad2f7a7c16434e22925d3bd4368fe0d87993fd440a3674f1b96e353c7bd21037f1adb25e44a28894e516118bb3bbcc91de492a7b085110ea25a31a44f5ba5198150daf9186e1023a3f7d0d6f0509f8fe4889cb3ee6d38c56d0beecf6c47249110a6b3b9ce516062310f283e25e575cef352bc0e8e0c5a30770fae34774699f492fed56e4f1282ff1436e15ffef6ac3f5c8613e5a14de7008516754f4cb4772c941e7930067aea62b8cde6e6ca54b48797a6f504ab5ce2296509cb33447c539514371732bcdede91859f67a090228f275f05747"}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x2ac, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x110, 0x3, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '}+\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, '/^&\'^\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x10, 0x2, '@$.$!#/@//[\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '-\x00'}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, ',\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '&\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}]}, @ETHTOOL_A_BITSET_VALUE={0x35, 0x4, "94ca22d004ff1472d5543dfeb6792fbf3e817f8681044b975d2ec4ce145dfff298ff00209a75cfd1f2850813515375ab82"}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_VALUE={0x54, 0x4, "8ad0982160bc1c64285ff47a94bbb256dcd0219fb27e354443e4a60c84b8aac9441e0bdf6cecfcb9e42785ff7400768af18ba3392ce2550afb2ab7d66097dc95e5ffc5e42de44ceaf35b1c84a63e5d65"}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_MASK={0xff, 0x5, "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"}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}]}, 0xe94}}, 0x0) [ 1260.270759] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1260.270759] [ 1260.398626] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1260.398626] 17:04:26 executing program 5: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbd2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000180)=ANY=[]) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x20002000, &(0x7f0000000000/0x2000)=nil}) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@text64={0x40, &(0x7f0000000180)="c4c235aa1066ba2100b000ee440f07b9800000c00f3235000400000f30b8010000000f01d9b90e020000b805000000ba008000000f30420f38c9ee420f928e00000000c48181c6080066bad104b0e3ee", 0x50}], 0x1, 0x0, &(0x7f0000000240), 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) syz_kvm_setup_cpu$x86(r2, r5, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000040)=[@textreal={0x8, &(0x7f0000000000)="f2c7850700000f01730a66ed2e670f01c86426660f38dbde0f01c3660f2377ecb809008ec5660f3882ac0600", 0x2c}], 0x1, 0x0, 0x0, 0x0) 17:04:26 executing program 2: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbd2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000180)=ANY=[]) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x20002000, &(0x7f0000000000/0x2000)=nil}) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@text64={0x40, &(0x7f0000000180)="c4c235aa1066ba2100b000ee440f07b9800000c00f3235000400000f30b8010000000f01d9b90e020000b805000000ba008000000f30420f38c9ee420f928e00000000c48181c6080066bad104b0e3ee", 0x50}], 0x1, 0x0, &(0x7f0000000240), 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) syz_kvm_setup_cpu$x86(r2, r5, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000040)=[@textreal={0x8, &(0x7f0000000000)="f2c7850700000f01730a66ed2e670f01c86426660f38dbde0f01c3660f2377ecb809008ec5660f3882ac0600", 0x2c}], 0x1, 0x0, 0x0, 0x0) 17:04:26 executing program 0: bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='.\x00'}, 0x10) 17:04:26 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4641301000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:26 executing program 1: set_mempolicy(0x4003, &(0x7f0000001080)=0x20, 0x95) 17:04:26 executing program 3: pselect6(0x40, &(0x7f0000000000)={0x7}, 0x0, 0x0, 0x0, 0x0) 17:04:26 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000002480)={0x0, 0x0, &(0x7f0000002440)={0x0}}, 0x0) 17:04:26 executing program 3: syz_mount_image$romfs(0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0), 0x0, 0x0) 17:04:26 executing program 1: pipe2(&(0x7f0000000000), 0x100800) r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, 0x0) keyctl$link(0xb, r0, 0xffffffffffffffff) 17:04:26 executing program 0: openat$cgroup_root(0xffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) socket$nl_route(0x10, 0x3, 0x0) epoll_create(0x1ff) getgroups(0x0, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) [ 1261.321784] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1261.321784] 17:04:26 executing program 1: pipe2(&(0x7f0000002ac0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, 0x0) 17:04:26 executing program 0: syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x402080) [ 1261.600198] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1261.600198] 17:04:27 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000002500)={&(0x7f0000000080)=@abs={0x0, 0x0, 0x3}, 0x8, &(0x7f00000023c0)=[{&(0x7f00000000c0)="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", 0x1000}, {&(0x7f00000010c0)="2da933311297dfd1fb4431482ef156495755f576cce4da6f98dba601bfd54f16df22661f7fc1a98f35f9257285f074966248eb40ac3cdb60b77fb3d18d91438fe703fff5318bec4fae17ac99f9d347ed350e239cc9028a83a125f2550eadebc8c43464c256afa46474d08e14025cf1ad12eacdecb0aba4390e75fcdfa568cfb5ec6c8002612fbf07601e0860df", 0x8d}, {&(0x7f0000001180)="bbeb45811be7912be28d4e7368e50d55533e8407adb2c96018b631be022ecf9e9569e360d6b63cada9942acdb4971940599563867946c83087d08bed7accddbc1afb5c8154b7adbde0c60f703d0c0677731d902cbff52daa77809ebb", 0x5c}, {&(0x7f0000001200)="450a6dd75913b1b25b2fea098f01f89362207fecd9e42862bc74d9e245c3c5dd8cc90dbbcfd1a3c09371ab9d448b412b26112bf5e1c8c547d6a24897eb15e2ee8fd223c48c2f699416518c39dafa9168abc6dcdbb6ab1a705d159282206f48d08213089085361f5d9c7d10b17013413ec183ba7dd24698c692936bd067aa111001452803e64cbdc04b3d3fa2fd3cb04d977e0db99a3a877f060ebe096b71f10331ef9178e255808356b4563c6c96a5752eb163d66650d890bc17cf1377b003bbdeb397fbc8e541f415bf2c44d40b2423321e5d56d2cafc2ff371b265482934", 0xdf}, {&(0x7f0000001300)="201b9fff2729c976a1311c6f43ed681f53f278e6e358dbef981a7840222742b6b2114ef372e3163175bf78dd7ee41064f4ccb59d4cd3118becdb1b84b98e880bbb67896170eb3f5f71263301447540ee84d177673f25eee03a8f1f14573a6b5b7d95405628f9e1ea47d84bfb192e89a71f5606136cc7bb44ed450d701090b08ccf5aeb2f20076b1d40bdee11fcd5fd2b4639a31d15f059e1af59df62698b951779314ab720085f6d396c903cfa28f023ab4782a8f64df64462b227eeb147b0e0694e65d715e83685c28f97fcb481eb34ee86a96d42d0326d60f03540de92ab3dd5ff9f68da5c31e1092522249bcb8012185a52778aa668e64d404730fdd1351cec49067e6f363d686e920bb0f8e9ad1329227ccfbf2f89e77f0111218a9fa95365d50d60770f3a693d0c825e4d777b803ab9be01bcd3fccd6234c2a7ac1c79794755a36bd9fa7ca6b6b990b29df9e81d6f41e0cf29a1730feb5ea000de018f3b4a06262f14fd05b4f0aacc2c1acfad88ecaa553584d270618902a6dbda5f39f77e7969b8c5c7f6a54d7d47060373b12f79a93f1492dd7c44ff8680b3ee899e0ae7160b46dea962047ff3e4218d909cc10c5af910fff7aaa8042581732b89fb14e83876eb3d0c9e827d3dacb9565d0e8cbc20f97f4873fec807e3ffe0cc3694f3c574bcc8cbde4d421ed104777ea01665bba846382f6cf09cb271d034359c10a916fea70f37d5e3a8884b7df87d944f42d587838efd7545fb72d904fdb429d83e8b0c77fd5315e4df24eb98b796b9510c2acb25e5f033260a7db4bc861a2c2b137b029ffff5d2922812363fe6cadf3bd7d01a1f9f9acd6b2f0cfee2c47344a208380f4108f8f318154107cee4ed4721e32dc3ec0a88f0ec9dce68ebef535d855f9a3b9dc8199b03e52002e025bfeac32ec33416b68cd753e281690100958b7f6c96020aaf00d13ced6b3388c5282e7723dc5e7d4a6bcc8a9d939f083b5bf8ec1a574db12109e0e1f28050209ba1b4311b6aef4be2b3f8518bc78badbd4906e9dee7a7501a87b4913f85f6f4fbb5ca62da2c6992d2b924c0fd9cfe346e0214b79096056067408fda290942adca5c26c0bcf098a79d5c2d19465bb0392e3f2d75b9903b5f997733fa088b0ad6b97e9f5ec7c53579bacd858245d0592c774942f7270cca33004222143030a0d958519b3f436dcd7929a65eb8e06959673cb7fffb2821d6988ed6d835dac117aedbae2157cc2ab5de003881db971753295984979b86b83a236319c35a2aa951c73867cfddbf19583c5a9b15686619e3a98d4239640b83669ff0b0087e099c111b9ffa7da8eeae76d2345173e0274c0c3467c7b869c22a038e924771817a4860cb230b0981d8c4ad8335f379416bf5272bfafadbabb094d3a711aaa99e9f090e92b030fa36628726bbe2f703f990c506a9e28554d449f038af707c1c2840f0801fc1fe9fd5c4ea90155f5eeb38df4f8ab5d854583aa9f56784e4aafbb097840869908c4eba31d989baa70d75fb02eb8aeaa3ef1292243b82fd44991bc8a116d4d1ab1760a7b2cf5202636c33bfc7a100d50ff46244554214ddb1fe8a07412be752e4d10742d1afa56595041bd3a8b4c6146305875fe2d8a2b231161c61ff83b00ac012d5a3c551de20149740cdd7df66d7e26592e258c2b958312c2d3e7a9c59ca746c7e103426a2063abd1c388a087fd68fe39d86e1fdf07fca276989222f1bf021aee99b9785160d1783340f50e3334f1f8091691b1362759cd1f75f626dd54debe5be096fe4ab8933e9fe8b1f080a0f283caf67cc6492d6bbb433f164c44eccd110fc77b1a86d821b3c06babcdff9bc7abaebba2c129cb11e4040ddb92f6f26578d8573a498414a37ddfb86782331c5b297752da2d92aa3415c9eb481f8df869f6d51edbf8dce54b7695919649f4b42d3bfcef03eb830b943f3475dc8094fcb3235b51e35eeeab13adf18d062f16515921246c1d20c0e3edcc9ff235fb28a7f9202634f2517525c80b699613159af27540209fdaf9085de6337ac71fe78b9be297da4d650263be2fe90e40da7d40495817368a6310bbf31dc13f3f6faa2b75a85b03a6ab197dcf0b74c0200a175587474b9496f54d1a97a27dadd5eb9a1ab6cb7ee5d50827450bc10b2395d794617628f2449ca8cd6849b3a3c6808283024aa0aa6e59e164336c6272f945b3e70f8b6948a7abea1b53600c98cbd81021caa1cc7833cc37fd995d2a59882abd2e05b6a2133393507784052f5e17b9b8f86b6e2f6adcdd8b4c9950c9b45552f7a88a2c20bf4429bddf73d3ed1d492990ae4bf0d41739593dbcece8f172f2b26ac53bf281f8a6f5f149c73cf5b358fb0546b5af5a2e0cd789b5cc7b64c51c5010fe99c2e6fa595888ba71597f69c7f3a78062a5a3eb4aabccd0292e94b96f67313fe4dc8b38bc1f9196504ede1889725398e26e86789b53955d6705535f8e69baac0b61a5f0c101d42544a0d07d3ae0283517f18874a5c0fc132f2be1168a8b53d1f798dd149d1b6133bcc81e83ef0b4fad2108bcf0e347df02fdcbf595674f210a706b38ea72cc79b06c201ee90b9b78a59601a647d251144b8c34d83fd9b0e64356cc99c59ec57d7e14f32a39cf7e519a82e4650df3ca919b302733cf36d9aa49a96df1ea6149a3d46a051c0ce36b9f4c95474d3086cf4434b7a587bd78e4e7903a13ac72c2dc2a57880ecd0570ce4551c7917b6a5fd14f755e6aaac57bb07d386300d8d170d6f51c5000912eb0646faef703c9bc192551559fccc004fb5e3dac348fe1a0da5e874fdbbd6dc92f3be7d62c97ffe69aaf6e803173eccf959fa179ea4b8fbae4b884664154c1e341b464e353f491dc35c353595b1cbc4a035df5b3279d31a90470c9f461155f5bed9a62df7dea20a752021dd4e1ecb12cd4c9888fe6892ff37b46688af61b9d24c4c6f95c7028b64c911de5e77f67a4ef0915b2ce3ced5d3aeec79e3ee33ea28605c54b010a123b8faaa6fcb279e60e4ddfa702b300bbe6a99aac97f9e4f3cb0a4fc95cac845a08504442ade730dc7805529742aec7fe8fe4ec70ea9794b43e53858906b231f69bd03f0ac9c3b4a25855203dfc5b1879a4aefdb058c37a8db8c27f24b8e8a6827ba5aefc239e7d19b4e671a80ce9db17c31de5c704c5297cda092e9bfc799d08971b0a181b7428dd30507b8a0113c8be9096dc8be925bd272735caaae6571934699c826e6e50d1a629ee3362b30eb63aeefb34be7dd4a2ca76744dbade5868db888c54c140e322f5ceceb31eca47bbf912ecc6f3987e13b0054a9f38526afe7cf1cb4710a3df90496b1b9e8f62f4ce2619875e65432a985fe4efcf314acacfb552030beaeacd5ac4453d0169a74299d736d89b0bdab98a9879ed491f5433bbcdacc9f179af95b5da89225970c3dd17cd348b2cbe031a075fb583a0cb4cd8b07e46524600bc66cc7ce418047bdc5d8edbcc2aa5bc78eeb6dedc17c371c88f3f7d77a8699f5b88eabe4cff9c297e6256987cdcff52c09d938926a84210e4a231185849dd29fbbc6ab12a52ee162c369d398b69e7247f9372f5d2b12eb0ebd8b53418e0681bf1379057fca2f637e34967f215ea63878abe5162c4da42a311aa028ff6f82086040d9172df61d27b5712e84a8c62eaec112ca080ceee0aaae4f6efabdfad8c3573d9e1f08faaea30a23cb67e37d673db76e534623cbcdff362b6f950025f5ab1ce9e3744a9e83dc4e47267f16e5673c5df5bd2ba1032c77449152cca8e88eab8d0bca64bb54eb6c1af3abcebb128106a04a5a152ff5de942cd43f5de19d5a902a58271bc3ece99539979c60da93529d43f9f957f02f9dd5f7cd67fba5b66c1a26ef2c4b51cabced624d93b262712450189308ca5c89cb8e8d5f2cc6ef8b12fad3a016a1b9e894f84bfbc90c0fd34bab7c19070a904bfebf4c86e2d2919ca64b0e82435db4af2ff2b1bf44269e316a0c0ef7bb5491a6bd7bf2089dbd3a7b4e69725f7d8164946825f9cecb1c59ddccf255b3d8a7b8c0e0ddef4f42b7f55867af65039f9e0e13a780bcebdb57042bc29656b20f119264a45c097cb71200aca44d22c488b5e40702f82f218f1d85b370dc8866168adc8e7931c1d4d4de08db327c4b902519178d34191bbf50e4fa7458c8326f47cab965487093c9db7bea70838c449a4ff1c6e8ddd5c378b7a0f65684aec3d3dd2669c0dffe42e593f1800b51014a19a63eaac045384a206bda692f6729c6bf99b3ea265cb1319e0a6d7e0289bf4974f0b05d8120d8cb5edcff0ea256f32b731612faf3f448c6d602ad7133335772e8e1d54c1192bb8524739f943cf76ed9faef311f31e64c7aa4b71ca125ca5fc49ca3a0238b6954621772248b09707b734b9810ebe9b5766f1ddf51a1f7b06bad1c5eeb4ce7a143a05823da6e94caaea99d32fcca20ffb53d473e1de60aad82aacfb88edbc2c722919ffbd870a7e41df907dbb50389323312cf498e8d07bcd11d627d4481fab52fa2f0597da43689f38e16983108f737e2698ab90eded338af05d08e4fc4670952945f30bff951ad3afa97e073bd93e71301320eb7c5eb01a098a64828c4ed9c2d456865a9d6e847aff607454741d7378ac99ded13c3f8daf53590235408d59376a5dc6cc67f00082a0aa4891fa63c164dac0abcbd9d6933814b538fdafee4892edf6237dd40c4d177516c40d105eae78989ed20195500571e5d064641fcdb1f499a0d56198dc575e3f2cd670029ee19f6b48edd62b09e04431c89ed51f880e201723929ef24eda22c85b527ef364aa6eec9832ab47714dfd930edfae7acf912b075816ddd4f5017bb7a66244a35993dba2b2e5d3554bf11567d76893f4a6baf2c02deeca36b59f91184f509360461d7a57ee5a84fd50ce6eff72db4a744af78f3cd45e1bd39a16a8e6215e121b368c412cf4b71316b9d9fcffe834dc57abf8b17359050946b36c78906af3025b73d1e5e021a476d850965933f1b215dd576f153491a81e7871bc00d647c5bdcba5046263f81575736028c4cc45a954f088311dac664abb2132117f6542979f89adde2cc137354b8e891c51c91f8abeb924b2231aaf4c78a48bc291ddef6b93167598c50e8a47bd51b1785be57e37dc4824ac6e555908eec04079130b7329be745edc8a8d775e69b2358451515668a7300c9062b123d22bef16f82b8d3201e191993458c542c9d0f0219b0dc581e0647d59eed9fd19d53e93fc53a84a21586752800e21f49e12f8e9a1cc5a72de3e0561da6a578fda1c016e3a0bb8f8d2a2a7fc74365b53b0c62c8c8e723145e1ba4bde37b8b55b2ca24e2d850bb98d7d939504facf39ee77f1fde9b2707e5ec84f3b11f6d6cc14e5b97eca30ffcf4a9d84c2a540c595add02285fbbc0cbc5ddf2cc1f44c3a3da86704050a9e43d86e4a4cd52e3ef97130dd41c719e15c1b09c9c513ee5360b2734781c2aa13040bc23d640edc2cad5ecce97078b8222b15ead014bc206facf322d556afbd524419063e0022400989873f0114d2b553888dd84470c9accce1ba80b0f52265ff5d097825637905ee7539018335677be488ee0bf1a611bf538dcdf9aab462bd477fda2a9c01e3036ef95a12daf0003884409560e90667ef50b01545872d1547c3d484a5c55d217a1c3946ffb2856372ac279eb7c8711d678daf3da37a9eab119dfa29e7b8265da562135b6830f0078a1eaa6380f611983bbfed8f57cd4228b3895388cdaf6baf713f712eba6f6aa6cf889fff3215e7f91d9cd00279fbfc06200254e2edabf", 0x1000}, {&(0x7f0000002300)="08d57226f7a1abee48b33c0a316a48126f07cca45d6887a8659fc85fcdc1087b04950d427ce6a23406c480d745341563b41e1e064f7f8fa7422f15db09de05134d210fb384aca1fe617105eaf8300ba712725ed89cc4614c6d2edd06fe3fa777ae9a2f1b5fc73bb82511628f2d41cadb8019fd84e0bd9f34e8666cd7784bc9748189c58415816242", 0xffffffffffffff52}], 0x6, &(0x7f0000002440)=[@cred, @cred, @cred, @rights], 0x98}, 0x0) 17:04:27 executing program 1: syz_mount_image$romfs(0x0, 0x0, 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000000740)="f7", 0x1}], 0x0, 0x0) 17:04:27 executing program 3: kexec_load(0x0, 0x1, &(0x7f00000005c0)=[{0x0}], 0x3e0000) 17:04:27 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_SET_DEBUG(r0, 0x2288, &(0x7f00000001c0)) 17:04:27 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4641401000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:27 executing program 5: set_mempolicy(0x3, &(0x7f0000001240)=0x2, 0x9) 17:04:27 executing program 2: syz_mount_image$romfs(&(0x7f0000000000)='romfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x224f000, &(0x7f00000011c0)) 17:04:27 executing program 3: keyctl$link(0xc, 0x0, 0xffffffffffffffff) 17:04:27 executing program 3: rt_sigtimedwait(&(0x7f0000000180), 0x0, &(0x7f00000001c0)={0x77359400}, 0x8) 17:04:27 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x2) sendmsg$nl_route(r0, &(0x7f0000002480)={&(0x7f00000023c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000002440)={0x0}}, 0x0) 17:04:27 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, 0x0, 0x0) 17:04:27 executing program 2: r0 = add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x6, r0, 0xffffffffffffffff) [ 1262.315615] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1262.315615] 17:04:27 executing program 1: openat$tun(0xffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x502c1, 0x0) 17:04:27 executing program 5: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x8000, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 17:04:27 executing program 0: io_setup(0x8, &(0x7f0000000600)=0x0) pipe2$9p(&(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) io_submit(r0, 0x1, &(0x7f0000000a00)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5, 0x2, r2, 0x0, 0xffffffffffffff36}]) r3 = syz_open_dev$sg(&(0x7f0000000100)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_SCSI_RESET(r3, 0x2286, 0x816d000) dup2(r2, r1) syz_open_dev$ttys(0xc, 0x2, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0xa, &(0x7f00000003c0)=0x871, 0x4) bind$inet(r4, &(0x7f0000000440)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x20024ffc, &(0x7f0000000200)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000180), 0x4) sendto$inet(r4, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x6d) close(r4) [ 1262.478410] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1262.478410] 17:04:27 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4641501000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:27 executing program 2: r0 = add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0xb, r0, 0xffffffffffffffff) 17:04:27 executing program 1: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)={0xe, 0x0, 0x0, 0x1}, 0x40) bpf$MAP_CREATE(0x0, 0x0, 0x0) 17:04:28 executing program 5: r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x44000) read$FUSE(r0, 0x0, 0x0) 17:04:28 executing program 0: io_setup(0x8, &(0x7f0000000600)=0x0) pipe2$9p(&(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) io_submit(r0, 0x1, &(0x7f0000000a00)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5, 0x2, r2, 0x0, 0xffffffffffffff36}]) r3 = syz_open_dev$sg(&(0x7f0000000100)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_SCSI_RESET(r3, 0x2286, 0x816d000) dup2(r2, r1) syz_open_dev$ttys(0xc, 0x2, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0xa, &(0x7f00000003c0)=0x871, 0x4) bind$inet(r4, &(0x7f0000000440)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x20024ffc, &(0x7f0000000200)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000180), 0x4) sendto$inet(r4, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x6d) close(r4) [ 1262.856201] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1262.856201] [ 1262.998890] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1262.998890] 17:04:28 executing program 3: syz_mount_image$romfs(&(0x7f00000006c0)='romfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a00)) 17:04:28 executing program 1: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)={0xe, 0x0, 0x0, 0x1}, 0x40) bpf$MAP_CREATE(0x0, 0x0, 0x0) 17:04:28 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_SET_DEBUG(r0, 0x2201, &(0x7f00000001c0)) 17:04:28 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000180)={0x0, @hci, @tipc, @ax25={0x3, @null}}) 17:04:28 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4641601000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:28 executing program 0: io_setup(0x8, &(0x7f0000000600)=0x0) pipe2$9p(&(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) io_submit(r0, 0x1, &(0x7f0000000a00)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5, 0x2, r2, 0x0, 0xffffffffffffff36}]) r3 = syz_open_dev$sg(&(0x7f0000000100)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_SCSI_RESET(r3, 0x2286, 0x816d000) dup2(r2, r1) syz_open_dev$ttys(0xc, 0x2, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0xa, &(0x7f00000003c0)=0x871, 0x4) bind$inet(r4, &(0x7f0000000440)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x20024ffc, &(0x7f0000000200)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000180), 0x4) sendto$inet(r4, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x6d) close(r4) 17:04:28 executing program 3: request_key(&(0x7f0000000140)='keyring\x00', &(0x7f00000005c0)={'syz', 0x1}, &(0x7f0000000600)='\x00', 0xfffffffffffffffe) 17:04:28 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[], 0x28}}, 0x0) 17:04:28 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000500), 0x0, &(0x7f0000000580)={[{@fat=@codepage={'codepage', 0x3d, '874'}, 0x63}]}) 17:04:28 executing program 5: prctl$PR_SET_IO_FLUSHER(0x39, 0x1) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0) 17:04:28 executing program 1: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)={0xe, 0x0, 0x0, 0x1}, 0x40) bpf$MAP_CREATE(0x0, 0x0, 0x0) 17:04:28 executing program 2: socket(0x0, 0xc, 0x0) [ 1263.316999] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1263.316999] [ 1263.419604] FAT-fs (loop3): Unrecognized mount option "codepage=874c" or missing value [ 1263.521039] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1263.521039] [ 1263.544347] FAT-fs (loop3): Unrecognized mount option "codepage=874c" or missing value 17:04:28 executing program 0: io_setup(0x8, &(0x7f0000000600)=0x0) pipe2$9p(&(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) io_submit(r0, 0x1, &(0x7f0000000a00)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5, 0x2, r2, 0x0, 0xffffffffffffff36}]) r3 = syz_open_dev$sg(&(0x7f0000000100)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_SCSI_RESET(r3, 0x2286, 0x816d000) dup2(r2, r1) syz_open_dev$ttys(0xc, 0x2, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0xa, &(0x7f00000003c0)=0x871, 0x4) bind$inet(r4, &(0x7f0000000440)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x20024ffc, &(0x7f0000000200)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000180), 0x4) sendto$inet(r4, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x6d) close(r4) 17:04:28 executing program 2: set_mempolicy(0x1, 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xbd4) 17:04:28 executing program 1: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)={0xe, 0x0, 0x0, 0x1}, 0x40) bpf$MAP_CREATE(0x0, 0x0, 0x0) 17:04:28 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000001f00)={0x5, 0xac, 0x2, 0x5}, 0x40) 17:04:28 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4641701000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:28 executing program 5: syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x0, 0x0) 17:04:28 executing program 1: syz_open_dev$char_usb(0xc, 0xb4, 0x0) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x81) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[@ANYBLOB='\t'], 0x191) close(r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 17:04:28 executing program 2: syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000040)='NLBL_UNLBL\x00', 0xffffffffffffffff) sendmsg$NL80211_CMD_ADD_TX_TS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180), 0xc, &(0x7f0000000240)={0x0}}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001f00)={0xa, 0xac, 0x2, 0x5, 0x10, 0xffffffffffffffff, 0x1, [], 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x40) 17:04:29 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_SET_DEBUG(r0, 0x402c5828, &(0x7f00000001c0)) 17:04:29 executing program 3: clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0), &(0x7f00000003c0)={0x0, r0+10000000}, &(0x7f00000001c0)={&(0x7f0000000180), 0x6}) 17:04:29 executing program 3: socketpair(0x2, 0xa, 0x120, &(0x7f0000000000)) 17:04:29 executing program 5: setrlimit(0x0, &(0x7f0000000000)={0xffffffff, 0xffffffff}) [ 1264.021817] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1264.021817] 17:04:29 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_NEXT_CMD_LEN(r0, 0x2287, 0x0) 17:04:29 executing program 3: pipe2(0x0, 0xc00) 17:04:29 executing program 0: openat$cgroup_root(0xffffff9c, &(0x7f0000007dc0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) 17:04:29 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000001f00)={0xa, 0x0, 0x0, 0x5}, 0x40) [ 1264.193521] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1264.193521] 17:04:29 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4641801000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:29 executing program 3: r0 = add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000003780)='user\x00', &(0x7f00000037c0)=@keyring={'key_or_keyring:'}) 17:04:29 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_NEXT_CMD_LEN(r0, 0x1267, 0x0) 17:04:29 executing program 3: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000280)=""/163) r0 = openat$kvm(0xffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 17:04:29 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0xc, 0x1, &(0x7f0000000000)=@raw=[@ldst], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 17:04:29 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000007140)={0x0, 0x0, &(0x7f0000007100)={&(0x7f0000000000)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16, @ANYBLOB="01"], 0x28}}, 0x0) clock_gettime(0x0, &(0x7f0000002f80)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000002f00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, &(0x7f0000002fc0)={0x0, r1+60000000}) 17:04:29 executing program 1: r0 = openat$cuse(0xffffff9c, &(0x7f00000073c0)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000007400)={0x2020}, 0x2020) r1 = openat$cuse(0xffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r1, &(0x7f00000046c0)={0x2020}, 0x2020) 17:04:29 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_NEXT_CMD_LEN(r0, 0x1267, 0x0) [ 1264.511148] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1264.511148] 17:04:29 executing program 3: set_mempolicy(0x0, &(0x7f0000000000)=0xfffffffffffffffc, 0x7f) 17:04:29 executing program 2: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000380)='ns/ipc\x00') 17:04:29 executing program 1: clock_gettime(0x0, &(0x7f0000000a00)) 17:04:29 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) connect$netlink(r0, 0x0, 0x1c) [ 1264.668720] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1264.668720] 17:04:29 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4641901000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:29 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_NEXT_CMD_LEN(r0, 0x1267, 0x0) 17:04:29 executing program 3: r0 = getuid() syz_mount_image$romfs(&(0x7f0000000000)='romfs\x00', &(0x7f0000000040)='./file0\x00', 0xffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000080)="fe16bde5f43b49516a52647e6fada9056cfd701538b5f321e35a0602ff1f0f2bdf805d3f2dcb28d784fae583992dcb3a932d7fcc2e16e8d1ede13dbd6c27381cae5d9d17a2d6c29ba458", 0x4a, 0x8001}], 0x10, &(0x7f0000000140)={[{'\'^\\Z-y'}, {'%\''}, {'\xc6,)&]\xe2'}, {'}/]9,-'}, {')-'}, {'{:'}, {':*1[$\xf5/&!'}, {}], [{@smackfsfloor={'smackfsfloor', 0x3d, ':%{'}}, {@smackfsfloor={'smackfsfloor'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@fowner_lt={'fowner<', r0}}, {@euid_lt={'euid<', 0xffffffffffffffff}}]}) getresuid(&(0x7f0000000200), &(0x7f0000000240)=0x0, &(0x7f0000000280)) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, r1) getresuid(&(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)=0x0) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, r2) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000480)={'syztnl1\x00', &(0x7f0000000400)={'ip6tnl0\x00', 0x0, 0x2f, 0x9, 0x1f, 0x0, 0x48, @local, @private2={0xfc, 0x2, [], 0x1}, 0x20, 0x40, 0x1, 0x1f}}) sendto$packet(0xffffffffffffffff, &(0x7f0000000380)="89d90feff7ed53e5d1166f4bbfa31dce2c5b89bffa0246114624bdb37f0ba74e773627f5746c3b2bcbba39b2ed1132da029798a0751d5b8c8d8c359fbd2b8a402390583a373ee678b9fb19627a7a75def2c17529d1432dc0353c4b0464c40d6f36cd6c2990a9b55dc43f2c072587240460e729e40aae1a7200c9847e5483c000", 0x80, 0x85, &(0x7f00000004c0)={0x11, 0xd, r3, 0x1, 0x9, 0x6, @remote}, 0x14) geteuid() r4 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000540)='NLBL_UNLBL\x00', 0xffffffffffffffff) sendmsg$NLBL_UNLABEL_C_ACCEPT(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000580)={0x1c, r4, 0x400, 0x70bd25, 0x25dfdbfc, {}, [@NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @local}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20040844}, 0x8800) openat$tun(0xffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x20001, 0x0) syz_mount_image$romfs(&(0x7f00000006c0)='romfs\x00', &(0x7f0000000700)='./file0\x00', 0x400, 0x4, &(0x7f00000009c0)=[{&(0x7f0000000740)="f77505411d53511c275c770f176b5b40f027185873dfaf4fd134b89b5200820e53b3f745e683fb27bcef99914c93315fdfbfdff38f23e735e1f0db47fb9d3a680ad4f30a5845b009c5f90f41ad54827985de0a96a1e469ac5d3df4d77bae8f1c3bc7dff616639e9d561fcba9e08fb0d9090211b340b553cd04d590370e9dc1e28b74c70c691bc41df961577a16664eb7b6ed562780cdc01a379f9f5a392a022aba0f4c1deb31f33a55ae9873d416564eeb1ac460615c4a842c6b4a071af5fb2b599495bef70fcab29c38b6b36e9482834d15b16fbeb2731d4303741415b73619408f1fb5b492f7f337217dfa581af372", 0xf0, 0x100}, {&(0x7f0000000840)="0d69d1dc28e922d48ac03f7bafdb0530f5089d16435c5422d1779dd9bec96f77b3ea0345b72987cb304ba8b0ae16ee364aedb3b4b47afd8332a6b8bb10543f547d24d5dd51f8f66d4ef5ad60b9b391ea3eb51a7403c3c18c0e35db343c505e2337f9d9c62ca906398698c9025cabdc8e5b1b109572896e7617d7d9dca473a0da", 0x80, 0x8}, {&(0x7f00000008c0)="7784c251570afc422260d1e34c40e0cd10b2ea7fce65f1f8d3a5c6c251ae546b95dfcde26255518b35d18d15b3d767fccda05ed5e6498de486d51fa10de253fd1269df55233b263401f768ea973adcfe7d1fe37fdd1f67755e7244cd2bd9aa8394211edd11f05cc307d4ad6d442de2a6e53654bddc966b837eac873d814a5ac1a58a698613", 0x85, 0x40}, {&(0x7f0000000980)="c1", 0x1, 0x40}], 0x10, &(0x7f0000000a00)={[{'$:-,!/-*):!{'}], [{@func={'func', 0x3d, 'FIRMWARE_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '@*\''}}]}) socket$netlink(0x10, 0x3, 0x1) 17:04:29 executing program 1: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$zero(0xffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xa) 17:04:29 executing program 2: r0 = openat$rtc(0xffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_IRQP_READ(r0, 0x8004700b, &(0x7f0000000100)) 17:04:30 executing program 0: getsockname$unix(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_root(0xffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) geteuid() socket$nl_route(0x10, 0x3, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) epoll_create(0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000001400)='batadv\x00', r0) wait4(0x0, 0x0, 0x0, 0x0) 17:04:30 executing program 2: syz_mount_image$romfs(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1264.861618] MTD: Attempt to mount non-MTD device "/dev/loop3" [ 1264.886376] romfs: VFS: Can't find a romfs filesystem on dev loop3. 17:04:30 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_NEXT_CMD_LEN(r0, 0x1267, 0x0) 17:04:30 executing program 1: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file1\x00', 0x4503, 0x0) 17:04:30 executing program 0: r0 = add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000000)='asymmetric\x00', &(0x7f00000001c0)=@chain={'key_or_keyring:', r0, ':chain\x00'}) [ 1264.915069] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1264.915069] [ 1264.953836] MTD: Attempt to mount non-MTD device "/dev/loop3" [ 1264.976857] romfs: VFS: Can't find a romfs filesystem on dev loop3. [ 1265.031931] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1265.031931] 17:04:30 executing program 0: syz_mount_image$romfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001180)=[{&(0x7f0000000180)="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", 0xf00, 0x101}], 0x0, 0x0) 17:04:30 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_SG_TABLESIZE(r0, 0x227f, &(0x7f0000000000)) 17:04:30 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4641a01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:30 executing program 5: syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x105400) [ 1265.091481] MTD: Attempt to mount non-MTD device "/dev/loop3" [ 1265.120543] romfs: VFS: Can't find a romfs filesystem on dev loop3. 17:04:30 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000003c0)='./file0/file0\x00', 0x0) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0/file0/file0\x00') 17:04:30 executing program 2: openat$rtc(0xffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x2, 0x0) 17:04:30 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_SET_DEBUG(r0, 0x5382, &(0x7f00000001c0)) 17:04:30 executing program 3: pselect6(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000080)={0x2}, 0x0, 0x0) 17:04:30 executing program 5: openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x0, 0x0) clock_getres(0x2, &(0x7f0000000000)) [ 1265.280890] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1265.280890] 17:04:30 executing program 2: pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) writev(r0, &(0x7f0000000040)=[{&(0x7f00000001c0)='e', 0x1}], 0x1) [ 1265.403818] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1265.403818] 17:04:31 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, 0x0, &(0x7f0000007cc0)) 17:04:31 executing program 0: openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x0, 0x0) getitimer(0x2, &(0x7f0000000080)) 17:04:31 executing program 5: open(&(0x7f0000000000)='./file0\x00', 0x200, 0x0) symlinkat(&(0x7f00000003c0)='./file1\x00', 0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00') 17:04:31 executing program 2: symlinkat(&(0x7f00000002c0)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00') 17:04:31 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4641b01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:31 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r0, &(0x7f00000003c0)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9) 17:04:31 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) [ 1265.985434] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1265.985434] 17:04:31 executing program 5: shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) shmdt(0x0) 17:04:31 executing program 1: r0 = socket(0x18, 0x2, 0x0) getsockopt$sock_timeval(r0, 0xffff, 0x1006, 0x0, 0x0) [ 1266.132438] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1266.132438] 17:04:31 executing program 3: open$dir(&(0x7f0000000100)='./file0\x00', 0x670f38c9de285bed, 0x0) 17:04:31 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setown(r0, 0x6, 0xffffffffffffffff) 17:04:31 executing program 0: r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_STAT(r0, 0x2, 0x0) 17:04:31 executing program 1: recvmsg(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x20}, 0x0) 17:04:31 executing program 2: r0 = msgget(0x1, 0x0) msgrcv(r0, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000000)='./file0\x00', 0xa081, 0xfffffffd) msgrcv(r0, &(0x7f0000000080)={0x0, ""/233}, 0xf1, 0x0, 0x1000) 17:04:31 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCSBRK(r0, 0x2000747b) 17:04:31 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4641c01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:31 executing program 0: socket$inet(0x2, 0x0, 0x1) 17:04:31 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r0, 0x8, 0x0) 17:04:31 executing program 5: mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 17:04:31 executing program 3: r0 = msgget(0x1, 0x0) msgrcv(r0, 0x0, 0x0, 0x1, 0x0) r1 = msgget(0x1, 0x0) msgctl$IPC_SET(r1, 0x1, &(0x7f0000000080)={{0x0, 0x0, 0xffffffffffffffff}}) 17:04:31 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0) 17:04:31 executing program 1: r0 = msgget(0x1, 0x0) msgsnd(r0, &(0x7f0000000100), 0x8, 0x0) [ 1266.445232] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1266.445232] 17:04:31 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0xa) 17:04:31 executing program 1: setrlimit(0x0, &(0x7f0000000040)) setrlimit(0x0, &(0x7f00000000c0)) [ 1266.573641] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1266.573641] 17:04:31 executing program 2: openat$zero(0xffffffffffffff9c, &(0x7f0000000280)='/dev/zero\x00', 0x10, 0x0) 17:04:31 executing program 5: writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f0000000000)="419202"}, {&(0x7f0000000100)="10fcaaf4bd3c1fc927118b10b2c48d4f25924654666f007344d2958221a5289f4798bfe5283d84697cdde776ce05af1e5ac6edbc28bb2ee0838a9429a6c6c60eafbc18b20dc76601a2a440b49b1e46e1b4af5e6610b62f5b793a83dd1031eb68ac8bda42e50e862f0256"}, {&(0x7f0000000200)="9a38093bb0f75909f7fa4efb0c4cff8edfc29e9b90302362f7359aff0091649d204f1e503a41a529b7cc7ed186873bc6e7a592089cbe73444cc18570e511ad33fd782b0336506343d85941c2320e6171", 0x40}, {&(0x7f00000002c0)="3eeabf281dc21018c51d1217af74186f8b304e681ecb97fa1d133065cb70b189b95462ea26735410b14832e5b1c112306a41a5f9d427b266deed8539682e2e4b794d23bc3ffcb8f357b9576743145b3910dd7322baa024686a7e190a5c671539bfe9de1b2e8e4727a0d700c1e842358d76733e2c66af55a12a7ba89b77a0e969e8ef2574904444a47d4231461a1e14b2e43ae6b7c2f4dc821e529694a8b2f646c6a00377f0bb92f7b754f9c0e7749061d6f05dbd24507c1813ad0000000000000000000000000000004454a645d3aa59c032a991ad8541f93f078a7436f2e9cdc746302de1398382d12e7a407a"}], 0x10000000000002ec) 17:04:31 executing program 0: clock_gettime(0x0, &(0x7f0000000080)) clock_gettime(0x2, &(0x7f0000000000)) 17:04:31 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4641d01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:32 executing program 5: mknodat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x1044, 0x0) 17:04:32 executing program 2: semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000340)=""/4096) 17:04:32 executing program 1: recvmsg(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x900}, 0x0) [ 1266.860475] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1266.860475] [ 1266.946256] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1266.946256] 17:04:32 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000001700)={&(0x7f0000000240), 0x10, 0x0}, 0x0) 17:04:32 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f00000000c0)=""/237, 0x32, 0xed, 0x1}, 0x20) 17:04:32 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) close(r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000240)) ioctl$TUNSETOFFLOAD(r0, 0x8914, 0x400000) 17:04:32 executing program 1: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000780)={0x0, 0x0, 0x0}, 0x0) 17:04:32 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4641e01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:32 executing program 3: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000001680)) 17:04:32 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001480)={0x11, 0xc, &(0x7f0000001240)=@framed={{}, [@exit, @btf_id, @ldst, @initr0, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}]}, &(0x7f0000001300)='syzkaller\x00', 0x7, 0x95, &(0x7f0000001340)=""/149, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:04:32 executing program 3: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000480)={0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000000b00)={&(0x7f00000004c0)={0x2, 0x0, @broadcast}, 0x10, 0x0}, 0x8040) 17:04:32 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454ca, 0x4fc000) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) close(r0) gettid() 17:04:32 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454ca, 0x4fc000) ioctl$TUNSETLINK(r0, 0x400454cd, 0x20) [ 1267.471066] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1267.471066] 17:04:32 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454ca, 0x4af007) ioctl$TUNSETTXFILTER(r0, 0x400454d1, 0x0) 17:04:32 executing program 3: socketpair(0x10, 0x3, 0x1, &(0x7f0000000540)) 17:04:32 executing program 2: socketpair(0x26, 0x5, 0x40, &(0x7f0000000000)) [ 1267.602605] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1267.602605] 17:04:32 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x4}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0xc0189436, &(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}) 17:04:32 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r0) 17:04:32 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4642101000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:33 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454ca, 0x4af007) close(r0) 17:04:33 executing program 1: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={@map, 0xffffffffffffffff, 0x7e}, 0x14) 17:04:33 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454ca, 0x4fc000) bpf$ITER_CREATE(0x21, 0x0, 0x0) close(r0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) 17:04:33 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454ca, 0x4af007) ioctl$TUNSETTXFILTER(r0, 0x400454d1, 0x0) [ 1267.839875] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1267.839875] 17:04:33 executing program 2: bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000001c0)={0x0, 0x0}, 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) 17:04:33 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:04:33 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) recvmsg(r0, 0x0, 0x0) [ 1267.970627] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1267.970627] 17:04:33 executing program 3: perf_event_open$cgroup(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:04:33 executing program 2: perf_event_open$cgroup(&(0x7f00000015c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:04:33 executing program 1: socketpair$tipc(0xa, 0x3, 0x87, &(0x7f0000000440)) 17:04:33 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x4}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x5460, 0x0) 17:04:33 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4642201000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:33 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454ca, 0x4af007) ioctl$TUNSETTXFILTER(r0, 0x400454d1, 0x0) 17:04:33 executing program 5: r0 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) 17:04:33 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454ca, 0x4fc000) ioctl$TUNATTACHFILTER(r0, 0x10, 0x0) 17:04:33 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x17, 0x0, 0xec72, 0x6}, 0x40) [ 1268.276009] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1268.276009] 17:04:33 executing program 5: r0 = perf_event_open$cgroup(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, r0, 0x2) 17:04:33 executing program 1: socketpair(0x18, 0x0, 0x80000001, &(0x7f0000000000)) 17:04:33 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454ca, 0x4af007) ioctl$TUNSETTXFILTER(r0, 0x400454d1, 0x0) 17:04:33 executing program 2: socketpair(0x28, 0x0, 0x101, &(0x7f0000000000)) 17:04:33 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454ca, 0x4af007) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000000)={0x1, 0x1, [@multicast]}) [ 1268.446126] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1268.446126] 17:04:33 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454ca, 0x4af007) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{}, {0x1f}]}) 17:04:33 executing program 1: socketpair$tipc(0x2c, 0x3, 0x0, &(0x7f0000000440)) 17:04:33 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4642301000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:33 executing program 2: perf_event_open$cgroup(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400001}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:04:33 executing program 0: perf_event_open$cgroup(&(0x7f00000015c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:04:33 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000001c0)={&(0x7f00000002c0)=@l2tp6={0xa, 0x0, 0x0, @dev, 0x1}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000200)='.', 0x1}], 0x1}, 0x4000840) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000001a80)={0x19, 0x8, &(0x7f0000001640)=ANY=[@ANYBLOB="18280000", @ANYRES32, @ANYBLOB="000000000100000085100000000000005da600001000000018150000", @ANYRES32=r2, @ANYBLOB, @ANYRES32, @ANYBLOB="00000093d549e2ea"], &(0x7f0000001680)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x4, 0xffffffffffffffff, 0x8, &(0x7f00000017c0)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000001800)={0x3, 0xb}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={0xffffffffffffffff, 0x8001a0, 0x14, 0x0, &(0x7f0000000380)="4d50b441e692763513ef874588a8ffffff1f0000", 0x0, 0x0, 0xe00, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) 17:04:34 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x3) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "0008b40c40aafd29"}) [ 1268.760388] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1268.760388] 17:04:34 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000100)) 17:04:34 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000001c0)={&(0x7f00000002c0)=@l2tp6={0xa, 0x0, 0x0, @dev, 0x1}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000200)='.', 0x1}], 0x1}, 0x4000840) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000001a80)={0x19, 0x8, &(0x7f0000001640)=ANY=[@ANYBLOB="18280000", @ANYRES32, @ANYBLOB="000000000100000085100000000000005da600001000000018150000", @ANYRES32=r2, @ANYBLOB, @ANYRES32, @ANYBLOB="00000093d549e2ea"], &(0x7f0000001680)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x4, 0xffffffffffffffff, 0x8, &(0x7f00000017c0)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000001800)={0x3, 0xb}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={0xffffffffffffffff, 0x8001a0, 0x14, 0x0, &(0x7f0000000380)="4d50b441e692763513ef874588a8ffffff1f0000", 0x0, 0x0, 0xe00, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) 17:04:34 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, {'syz0\x00', 'syz0\x00', 'syz0\x00'}}, 0x118) 17:04:34 executing program 0: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x3, 0x2) socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001700)={&(0x7f00000015c0)=@can, 0x80, &(0x7f00000016c0)=[{&(0x7f0000000480)="74b4b24c321a01c449e0a3c20432e873176ce852375f761bd68e5c768bcf1d0982af0739c1a7", 0x26}, {&(0x7f0000001640)="994db27b773d2303cb10d97652ecd2013a5a9b9e1472fa85152d8d7ce2e09aec3b3a2ada03766577c11cc96c6dae4ed4a2a79b2b2bb67bd94191a477c71a5a44bd1be1b7bfe9decb021adad171b9f4f2be", 0x51}], 0x2, &(0x7f0000002dc0)=ANY=[@ANYBLOB="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"], 0x1230}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000009b00)='cpu.stat\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'wg1\x00', @multicast}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x71f, 0x0, @perf_config_ext, 0x10000, 0x0, 0x3, 0x0, 0x9}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = socket$kcm(0x2, 0x3, 0x2) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000140)={'wg1\x00', @dev}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)=@in={0x2, 0x4e24}, 0x80, 0x0, 0x0, 0x0, 0x5e8}, 0x8000) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)}, 0x40000040) sendmsg$kcm(r1, 0x0, 0x40010) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002100)='cpuacct.usage_user\x00', 0x0, 0x0) [ 1268.921050] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1268.921050] 17:04:34 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4642401000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:34 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000001c0)={&(0x7f00000002c0)=@l2tp6={0xa, 0x0, 0x0, @dev, 0x1}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000200)='.', 0x1}], 0x1}, 0x4000840) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000001a80)={0x19, 0x8, &(0x7f0000001640)=ANY=[@ANYBLOB="18280000", @ANYRES32, @ANYBLOB="000000000100000085100000000000005da600001000000018150000", @ANYRES32=r2, @ANYBLOB, @ANYRES32, @ANYBLOB="00000093d549e2ea"], &(0x7f0000001680)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x4, 0xffffffffffffffff, 0x8, &(0x7f00000017c0)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000001800)={0x3, 0xb}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={0xffffffffffffffff, 0x8001a0, 0x14, 0x0, &(0x7f0000000380)="4d50b441e692763513ef874588a8ffffff1f0000", 0x0, 0x0, 0xe00, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) [ 1269.245601] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1269.245601] 17:04:34 executing program 5: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x30}, 0xc) 17:04:34 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454ca, 0x4af007) ioctl$TUNSETLINK(r0, 0x400454cd, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000000)={'erspan0\x00', @dev}) 17:04:34 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000001c0)={&(0x7f00000002c0)=@l2tp6={0xa, 0x0, 0x0, @dev, 0x1}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000200)='.', 0x1}], 0x1}, 0x4000840) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000001a80)={0x19, 0x8, &(0x7f0000001640)=ANY=[@ANYBLOB="18280000", @ANYRES32, @ANYBLOB="000000000100000085100000000000005da600001000000018150000", @ANYRES32=r2, @ANYBLOB, @ANYRES32, @ANYBLOB="00000093d549e2ea"], &(0x7f0000001680)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x4, 0xffffffffffffffff, 0x8, &(0x7f00000017c0)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000001800)={0x3, 0xb}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={0xffffffffffffffff, 0x8001a0, 0x14, 0x0, &(0x7f0000000380)="4d50b441e692763513ef874588a8ffffff1f0000", 0x0, 0x0, 0xe00, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) 17:04:34 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000008c0)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x40010040) [ 1269.464327] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1269.464327] 17:04:34 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, {'syz0\x00', 'syz1\x00', 'syz1\x00', &(0x7f0000000080)=""/143, 0x8f}}, 0x120) 17:04:34 executing program 0: prctl$PR_SVE_SET_VL(0x32, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x16}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x204) msgsnd(0x0, &(0x7f0000000480)={0x2, "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"}, 0x27f, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x5b3}) 17:04:34 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4642501000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) [ 1269.694881] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1269.701689] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 17:04:34 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x4b68, 0x0) 17:04:35 executing program 2: r0 = socket$nl_crypto(0x10, 0x3, 0x15) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) [ 1269.814481] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1269.848267] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1269.848267] 17:04:35 executing program 0: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000240)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000280)='/dev/sg#\x00', 0x0, 0x0) readv(r1, &(0x7f0000000000)=[{&(0x7f0000000040)=""/52, 0x7ffff000}], 0x1) 17:04:35 executing program 1: r0 = getpid() sched_setscheduler(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbd2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x20002000, &(0x7f0000000000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@text64={0x40, &(0x7f0000000180)="c4c235aa1066ba2100b000ee440f07b9800000c00f3235000400000f30b8010000000f01d9b90e020000b805000000ba008000000f30420f38c9ee420f928e00000000c48181c6080066bad104b0e3ee", 0x50}], 0x1, 0x0, &(0x7f0000000240)=[@vmwrite], 0x1) ioctl$KVM_RUN(r3, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000040)=[@textreal={0x8, &(0x7f0000000000)="f2c7850700000f01730a66ed2e670f01c86426660f38dbde0f01c3660f2377ecb809008ec5660f3882ac0600", 0x2c}], 0x1, 0x0, 0x0, 0x0) [ 1269.916279] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 17:04:35 executing program 2: socketpair(0x0, 0x8000c, 0x0, &(0x7f0000000000)) 17:04:35 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x5452, &(0x7f0000000340)) [ 1269.986491] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 17:04:35 executing program 3: add_key$fscrypt_v1(&(0x7f0000000240)='logon\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) [ 1270.039651] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1270.075241] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1270.111280] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1270.140995] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1270.169463] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1270.198572] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1270.226250] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1270.252572] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1270.278766] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1270.303634] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1270.330406] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1270.358015] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1270.384610] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1270.412238] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1270.441653] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1270.468120] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1270.498436] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1270.527073] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1270.560193] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1270.586997] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1270.614341] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1270.648287] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1270.674733] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1270.701359] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1270.725896] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1270.751928] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1270.777102] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1270.802081] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 17:04:36 executing program 0: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000240)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000280)='/dev/sg#\x00', 0x0, 0x0) readv(r1, &(0x7f0000000000)=[{&(0x7f0000000040)=""/52, 0x7ffff000}], 0x1) [ 1270.834654] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1270.879612] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1270.909034] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1270.937854] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1270.966453] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1270.996933] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1271.023458] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1271.050595] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1271.082111] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1271.110105] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1271.140847] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1271.168643] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1271.197623] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1271.225796] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1271.250934] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1271.280795] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1271.306437] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1271.335394] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1271.363993] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1271.392676] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1271.425406] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1271.460572] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1271.491685] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1271.522124] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1271.560798] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1271.588298] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1271.614257] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1271.638573] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1271.663228] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1271.686714] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1271.710869] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1271.734237] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1271.750926] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1271.768337] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1271.785878] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1271.801206] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1271.810609] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1271.819254] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1271.828339] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1271.836847] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1271.845227] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1271.852143] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1271.862674] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1271.871336] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1271.879764] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1271.888230] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1271.897942] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1271.906386] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1271.915280] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1271.922162] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1271.932479] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1271.940751] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1271.950155] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1271.958477] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1271.966854] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1271.977145] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1271.987610] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1271.996073] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1272.008401] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1272.017964] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1272.029918] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1272.038312] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1272.049289] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1272.057680] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1272.068736] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1272.077672] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1272.089011] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1272.098199] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1272.106764] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1272.116210] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1272.124743] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1272.131602] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1272.140978] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1272.149364] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1272.157700] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1272.167990] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1272.178317] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1272.187328] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1272.197932] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1272.206864] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1272.217457] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1272.226421] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1272.236924] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1272.246558] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1272.257556] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1272.266657] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1272.277823] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1272.286912] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1272.297520] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1272.306363] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1272.316873] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1272.326521] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1272.337057] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1272.345928] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1272.352913] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1272.366768] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1272.380597] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1272.392758] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1272.404856] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1272.412220] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1272.426184] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1272.435587] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1272.447557] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1272.456451] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1272.470479] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1272.481323] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1272.495324] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1272.502303] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1272.517163] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1272.526560] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1272.541443] hid-generic 0000:0000:0000.0007: hidraw0: HID v0.00 Device [syz0] on syz1 17:04:37 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x5609, &(0x7f0000000100)) 17:04:37 executing program 5: r0 = socket$inet(0x2, 0x2, 0x2000000088) bind(r0, &(0x7f0000000080)=@in={0x2, 0x4e20}, 0x7c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x2, 0x4e20, @local}, 0x10) recvmmsg(r0, &(0x7f0000003400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 17:04:37 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4642601000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:37 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x16}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x204) msgsnd(0x0, &(0x7f0000000480)={0x2, "02d3fc941b5ae77a13d8e5a5ae67e07becbc23b251b2d14246613bfd415263b3d1ed163ef756e539634596685cf9a6e7a18cb476c5be07bd59bb6df41d213f58caa8ae5d9cc7f2682de7ca64698662bb42382b3668503217e173bb754e72bb31e2439b53cf9cfeb5377a597d86678e2b35a44a97e70a35eae70e4e059ec0abc84b8f8a8db46ec3a738aa99f6fa4407aa811a1f39b6ebb43283488eb567aa713c5c7766c98271f2561d75c53d6bbe3c7a143f97d97917d254ff5f6e216b6d86ec5debfd8e32261bfed4a64fa326827fbe8759b8d86d2a581255d314004a89905840a0be345b8209f355ed3effdac1f5cfb92d8b6015f2d718c9855595770b25f101b7cb3fc3a6a98d09c4745faeff4e2ea8696ccea2a797e84f7de70249957f8ed8df4b1198eba3499586702f9727d32ed6bc22497dc32fc9a3675a83a97b186680ccbfcd4a3b9ab554a37226725cedcd5ff237ecd090c176a4ff2fb97961e449d94ebcb906f908ef5037d99016095e18d5516ebb0505072701b06253a13cab8d34fe9df8c96c6e09d964c78db13a1e1b35d459909f05ea004adb976219a11f5e433269770f35bd9c8f517e2d4523ce259531363da4f0b673d2a30f78bce9ecaef9defcec2125a50a8eaf56eca725fbc163e020c3c0493176fb8f52eb401dcd614a1befa94db6429ef4b087db8e97ecfb0cc161b2f06932aaba842dbaa857ab0f5edb3b356779f8d3aa7b1c0075d2b2c526bb5f84adb6fa186bf311982c7fd225a4f14cf5029ba822931bd0c053dda919e96810ae643bdaa71e9da71653692dc5104c1e5b991ac375e5dd8d221b017f71eb83cf74ab2b693516a468230011e9efa15b875247b80ad54f8aa5dd2059dcd005fd000d6bd73c4e518c351ae379bd2f05eb906512ea3e6a6c9719be4d47244d19e87462b7d029c7c54759e4aef192e8c3e331f658916e17e8154000e87c5c62966e69d1c8414c9e0f4ac6cda00154b169308406daa2a6eded2b2095e04a1521524376e3f757108d18ddb5f5ad53ed4751ed6dd53284f16a2094854c3048c74e7b6955a69401e8c6e68265ef8600d44972738ae323e2c0501f80c19878e5d2c04ef5b5b44c3acdf832199d876dfbbf10b1234a92abc8b4cebfbb97381bac3d5a7f5ccab9205aaefef5a81c1b4ae335eabaa89d6c306e2e2f955c9c81d74838e6f39bac344e70338cfb3b72042d40f28129b7c2931a54b973f98b0416234f4092580e2a2afadea15a53378cef73a0e7b5af500e99f90f21d1d5c1bbcc42b6a894ec27340e2841b3e2d2c71ac33a66aea519d9b6be9d51867e6b386dcc419bbff1dbfad002861a08131718ceb962cdc536b1522770cbd1319dd6e9dbdcd6fe"}, 0x3d6, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x5b3}) 17:04:38 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) getpgid(0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000680), 0x0) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000002b40)=[{{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000001840)=""/4096, 0x1000}], 0x1}}], 0x270, 0x100, 0x0) sendto$inet(r0, &(0x7f00000006c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ef922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecfa0b1a", 0x45, 0x11, 0x0, 0x0) 17:04:38 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x5609, &(0x7f0000000100)) 17:04:38 executing program 0: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000240)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000280)='/dev/sg#\x00', 0x0, 0x0) readv(r1, &(0x7f0000000000)=[{&(0x7f0000000040)=""/52, 0x7ffff000}], 0x1) [ 1272.913250] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1272.913250] 17:04:38 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x5609, &(0x7f0000000100)) 17:04:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000240)='ext2\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000540)) 17:04:38 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x5609, &(0x7f0000000100)) 17:04:38 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000180)={0x0, 0x9, &(0x7f0000000140)="57a1cf0ad6235bd6ae"}) [ 1273.115902] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1273.115902] 17:04:38 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) 17:04:38 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x80000000e) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) vmsplice(r0, &(0x7f0000e79000)=[{&(0x7f00003fb000)="f7", 0xfdea}], 0x1, 0x0) fanotify_init(0x0, 0x0) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) 17:04:38 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4642701000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:38 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x80000000e) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) pipe2(0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) open$dir(0x0, 0x0, 0x0) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) [ 1273.242339] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 17:04:38 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_WOWLAN(r0, &(0x7f0000003880)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000003840)={&(0x7f00000000c0)={0x1ec4, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @void, @void}}, [@NL80211_ATTR_WOWLAN_TRIGGERS={0x40, 0x75, 0x0, 0x1, [@NL80211_WOWLAN_TRIG_RFKILL_RELEASE={0x4}, @NL80211_WOWLAN_TRIG_ANY={0x4}, @NL80211_WOWLAN_TRIG_MAGIC_PKT={0x4}, @NL80211_WOWLAN_TRIG_GTK_REKEY_FAILURE={0x4}, @NL80211_WOWLAN_TRIG_RFKILL_RELEASE={0x4}, @NL80211_WOWLAN_TRIG_TCP_CONNECTION={0x28, 0xe, 0x0, 0x1, [@NL80211_WOWLAN_TCP_DST_MAC={0xa}, @NL80211_WOWLAN_TCP_DST_MAC={0xa, 0x3, @device_b}, @NL80211_WOWLAN_TCP_DST_MAC={0xa, 0x3, @device_b}]}]}, @NL80211_ATTR_WOWLAN_TRIGGERS={0x1e68, 0x75, 0x0, 0x1, [@NL80211_WOWLAN_TRIG_ANY={0x4}, @NL80211_WOWLAN_TRIG_GTK_REKEY_FAILURE={0x4}, @NL80211_WOWLAN_TRIG_TCP_CONNECTION={0x88, 0xe, 0x0, 0x1, [@NL80211_WOWLAN_TCP_WAKE_MASK={0x79, 0xb, "f6e17d46fbd36c2cd3d1436960e759cc55180a55a02ec5b962429d1011c5a294cd28329b5b6c244433f1065ced1336bc4583082cfb0e1e34f84ed1169b73c0241b2d569b66541a714c29b2a1d38ac7b9cb7de9a5f259bb95bb5b3344c2f249e5028cd3d7aa8d36db63040e0c1bbae36262f6574908"}, @NL80211_WOWLAN_TCP_DST_PORT={0x6}]}, @NL80211_WOWLAN_TRIG_PKT_PATTERN={0x1dd4, 0x4, 0x0, 0x1, [{0x110, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_MASK={0x89, 0x1, "b8b4da6fc1d4112a212dba2ca9347a0f9804902bfadff961d90c8bc9a842d897b017db4dcdc140938f7e7bae5b54bc1d4ffb9c1d2502f8c34d5ae61a480bc4bf70db0ca9bccbd4a99cdae8c24248bdcfc0abe626cc305c0fb3775e475ffaff0be9dbc6f02aa8f928cd16a76cdffd9fcf2b6529de16ddf3bb555baef272b757ee84fc0a9557"}, @NL80211_PKTPAT_OFFSET={0x8}, @NL80211_PKTPAT_PATTERN={0x75, 0x2, "0e31199e97c533d4c34ff02968e078aa2a5fc762e4e7056e25b7abaf5b06dafbab6f0b1999c8bec015e39f423d84429cf7730a5e759cde80d4cc434deeee1d2eb30165a9af21cd5f4a4e3c45c786cf645b5ffc73fb1c7819d6e1d3f9cd1e42c0060166333f2bc813d6c977ff1f49792111"}]}, {0x264, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_MASK={0xc5, 0x1, "3fec22f27e7bcf5917e85a53a31acdf75037a55c78fd10885e7f989f056b6a2d4a64ead3ef5ebf4e053769198e6399fa65af34f5b2382d7e324d7bed0ae1d940ada896b275fe04dbbf7960b2aa2e7293276ab1e088d371907d9db95d223246bff154065e1a65e385d65f156c8adfc0531e74b6362e6ae1dcce5c67740c1659c94960f491a4a2ebed44a3ea8d891ee5efde294fa734d9e52ea4900152c672be3b3c4562898643a3aab2c9cf2910572d3624ad05d2769958e68096a1f5e7a80cb37a"}, @NL80211_PKTPAT_MASK={0xcd, 0x1, "a26fb0c33e2d2ba6bb44353909a1936e69840ffc5b6002e85b54f797f7bb68973f4f6a1f33cee62f8964c5c833fd7451732316e5ed65eabf4464a678ad52967f6a0414426d58d3075a8cbdd5c7e5d8376415721c9e159564b2fadd0a7d060534ebeb638ea5babf4fcd8f41bb34db382fd25f07f57fdc4ff26cc1769b76d5377cc61ed5d434a1e5519a15bfd2b7e0302bae0f3a89f9b63a5a6c7221cc8bec149c1ad355346a74fd80138031e795dc95143fda937d646827fce55517380390148429e7931bd74f19bf15"}, @NL80211_PKTPAT_OFFSET={0x8}, @NL80211_PKTPAT_PATTERN={0xb5, 0x2, "203a38021e92214529a49cea2e8c62e8e4356d2f9f2eaf83a85298fa8f3a35431318695a2d258bca9ed88525f1f23e6412038e99100d37d8981a5b0f95f3cb2e2f536753a73859a23e485fec84c8e361067e565f599f509cad7421cbe22aed0a840f35d44d973d103438f9852fa36e01e05b1a820bc7335dead8e185bb47c2258940be3b7095fa04c45fc158e4dd1c3317563c07f00222ad05c144619e88de918d964321671b63f7e636d16c7efb986b8e"}, @NL80211_PKTPAT_OFFSET={0x8}]}, {0x1118, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_MASK={0x35, 0x1, "af894296698d2c148432aaa3187d4589fc9cfb9a6bf53ad6df2bcb776a05d6f49be41a7644ad0bc7022161958a0cea3cbd"}, @NL80211_PKTPAT_PATTERN={0x2d, 0x2, "596dbd2bd0808f706825a896b31dd9ab026c1cd21ac1d690229ee2e301be1d744b533cea94889583b3"}, @NL80211_PKTPAT_MASK={0x1001, 0x1, "4f8d54b8ca4e97c40f015a27054c913c4bbb87c50695323cfcfb7b7b82a8e52d7ae3a9577efa9b2c8d67fd323f9a255f43041fa66808dda2fc4a03667d9e32230f6112b88ae2ac6da57dbda6d62ee12d3c56e925fa998960d66aa20eae160eb06102075ac34960cedffe7e14c1bb215bcd39702baf4df76f8741721725f41348cd12435756ca4096b88f870ecb2336573e3ffc110680b4745a38f37c9857b2f07c9d334e5dfe98296a149eb5b208a3c178372c87ae95844abde8875e2810affa25adba0c339ee00f236e43216bc3895bba6ee3d83000e121b884b28c4b97220c0ac46e2d90e2b0b0ba1e775f31906a573317758de95d07d572aaf5f4174d76bb9e88cc85237f711da9c28e195f21274ad735e36bf0cedfab4838e8ee43dd9caafb6050a5cf9701bfa22a317cee2de154712c03e49081192d4dd290a2ce2ac8b2c12be8551398a70b527ff255ff782d6d5853752a21e410d1f9701b962cfc20d36ba169ecb493a99697ae02bd6abeac027b90325ac116f19928813cc673ad3fe93e2e3fef820fa697bf24efe739f0d73e35d797528d2a17d7d3c9c3c0085053dac54020582c898b7ca7b823cc5d1e12f9b3a127740d986f2d236fd8fe760bec80deac4e82c4b585866d6bee49a389ae38d8b73b51505406fc731b547af3d84284f325fcb6390ddbb01120da9ce5680b65b39b4ba6e0e1156039fcb4e0ed5da4ee89ddbb8d0b2ee704716e4461e9512356e66900378afa740d01c339d2c66be9296c39ca6d78db0a9c3f00af4b6f6997c504691e7b764f267127c7d2c72f0b068c56de48d5fe5157aa50ecb573a38c483dfe1568d2e99b2d2bbfd862b01322527dfaad0b3f79b8a81fd2539721e2be386b8ff3667081e7d0a692122a85654feb26e525e8b0555d437e0125b37b61990d82ee5dd4a8f75fb2a3e2c28b6c856c13e69f488f21353998bd54916f9aeee97e9030ae651af2b5e962e64ac6d2e36cce74fbbafceabd6e674f2ba28499b99767bab94fd7fed0bc250dc8df82133db6d27c4a1b0f921c90ebbf8bfa2a209e2a2f80c4f0370336ed8236e9059c73f397598802e6eaa8a4780b8074d8b267e9901f1d25b6656a238f79a5ecf9cc6d71994b4903a17633d66b0a987b45e5a5954fc6a3984f11fb6e5afdc321f18cfbe29175a2897396ae5e2700e08f9e260357996339a4cc6b32330627ca5546e0ccc11a48e6c5ca9a8c525ab9d7ee4df2c1d23b6c29b3de19fc0d5864f158bb42dbff7e6934ccdf99360782a672d0c38e18b247a35d53e80978326f8a905192c882a62a4cceaed6b2e8409f6b0423d4178ae4b3d96c391472b105450b912d70279c960ebde931999b19ae9c4c8110e80731908f6e4a042d14bd01ae078fd06869f747f981a5e8f93e5a0d7753e431b7c6bc0415f50854e16e9cbd3467bf884fbb3270f204f5c0e448638cc26929ee0cd1fa9106910c29295bf74114a52eef4dd62973d511feca74392a1fa816e610db4270f620d124003ff3c688dc677db3d0c0d87dd8d4b9c995064a09490a0ee4fc8d7264eef6293ed5197690738739dd447f1461fc88ec175f5a76601a0a99389aa7c91ee5702f50c5012587c667bb9b271fb82dbb64d8627d4c91d718f5a3f10807b14597446d9dea5a0f862df4ce39a38abe24b9d3fa3b9bbe08ca8a19db7c07066c0eee674ae317a99c846dca2bdc86842bac3630d41a4554eb69ae65dee5c5920a5ace7a4cdc98091d017e42de933b6e6d807cb6536fecde6a1a442d08b584e3ca91547b7003bda136babf1a35a7bc234b2818fb9450e402a4d555f1bc51f8e9aa1bee8234a326fe3b1976245074b5dfb566607a8cc725141865a863d1d173e690c1da90cb4da17209e644b5dec693ee8027c99d1b400fd10f57739bf278ddf15f03ac5898aa00983d388b7ff313806f810abd76f910287ebeef9cf4fc1290ac69a58119ada37dc97d06dac0f79205071862692e74d0c7f9d790915ee30180ccb508f35ffc287378baecd5db16947d03ea43bb3acde13499b837860e846d60a6e25887f377c6a7cef20ef1546f215cd4c78656d42c157ea3fbf63e45b878ce4756661860e3b333416243ce9fbd9927a09189c302462c75ce109fa7f113a1225320b424d9093c786510d9a5d57f9a7d0689f4dd232a46b6a6e1d526c33e0abf4707fe028435a9c29508e9e0e61e2d78947fb8d8d8b3cd3f40acd766f735387be66f44d4aa7fbadbe316c76d3734393a6b2e89437f78c58cfc80803a29e7958c4ff2951cd1f1fdafab8e43bf322342340f615107a2197df26325ffa2b56e00e57a01879bcaa0236b20bfd395cae349e8b91f3eb67fe322dca7e9261dc1d0d2d475fe39348e2fb3c48e81b4f80f12b4c1594a8dddad29912ebe8204f6e3bf1222ef68d93ae478a3fbab2a2cbfc0ecc9ed7508dee0740ad7211e2f0d188a8d09c826f2adf68625f217a32ac25ef9e0e098877512cbf1c261ffc5197a397291c5a1d9e529cd31a0308785553e93762bb62ce178da881e15a5fb812f9bf3805186a1e915785c280641ef522a4fa051a0c48febf33e2fd79f7afeaefeb64fbecce4bf83ef4e3325b54bd75c412b1a448b70a6e966ebfb281a6c9846fe5bf476edb81d04fd8305b3833566c3b63f9b70d1a4b9d8780b91b121d5ff5381e3357b831b2bde2b50d33b46407c2e7d9c24f22923df9ae161012791c53883866736669c5730787af9ce82cc8595e58e2edcfb8763c0549cc7d64fce3e84d3e5f54fea88f0a5215cf7e67657292a6bf70d84eaf74082a3f9264f34f4a121ba9ac620bbd27c75561a89f88e1888a09f2409cd101d9210e1885cdc6b56ececef33bc2142fb61ac4e906872c81936dabab1ee564f060fc98b1da0639b13d4ca3fbcdb4d18e38c5d0f3900cd00e5bc73ed8f21ef62a2ae5a686f6b4d893d85e5eb49699459ca6f0ce6520b9e128ad2bc60f2cd560c58f484510cb25179512b1ae8fce91c2de6aec4c79d8ac5056593d1a920a33074106abea7f9daa62ff93adc4899dc03da7a90ebc0d77a90c65ae46a073c62ca53a8fcb0ab960429870985802905e3935a2ba5094fdfb60c81e16da94f4bf39f6aa0d6c35f01bd79474759821566c857c49113b3b3eab898c84c7dea1217a428732cbc000772639900f34a8d4f6b99c2f2ebddbb832a95f0f0575fc2e08d2f900405ba369595d109dcb0f4308ac542cb9ee2f1080e1bbcea0b1e1a7b6ea32bcc34f7bcbaf7dc6d169b5947f45cbfa8d2156129fe31655784db3e0e80f46c7c9c3ae1d00165ee1a74d8d706daa3faa8ac7d6b6bd44c1666f1727b552810aea862743962f781f91dfd61748a97d5db2b3fe7d1face6a7adae4f1aad8b07027905f48e3138f3ca225a9daaa60140144142482fab254d41f5503ad71e98d0697392ea49e0a7cdfff06512f41599269be8b21973868809ff9ca2aded2e0e2c15420271fcad28e703bdbde26ed7ab4a7aa40698d23bddac0e20770fd7dae1c3955013928694aeb2bbf7b6aba9d4cd06bf64c20ac8f589a2b58459fdf406f780aeb8f8cec16cb789ce42cbd82b690e34848c4962d5c3633b18e6453d66245dabfb8a23d5201a346a5d6f10cb949a3ee6063f31654249cde17eec2e36dc583b3ec694492c956e3ccf857b48c787d60c91bba8d386eb656261cefe6a98c6078a5ffacc7b8c9107c4c5da9f2d2485f68445ccdd0eb5ed5e6b087ea6be516974e4549c3317a46f69a86eb0bde76f8c674186d4b74a842d44122c93c6f258e961e4ea4233476c731541ac3406cde413256d5d6702c93f813abf0ceea9d19dc01fdb984361498798bbdb98d524b447b09edc8deab714d0ecd8f9a2bfa00e044babe23d44bdbb47af7e265d49b89366a3759f6b51559dbb3b9550bc3a54f41c49e08540dcdc1a0c9a94003313081cda864c0997eed7fe9b8921f1a5752f0ad9ef05fdf2e3ce82f36032095356e08ab9b2fe45b40880f66cf66b457305e6eba593734b606058c67431125a4507b87c3d6b752d31e852c367ea71167f68e47a5e4d83f40564a4b923d29edebbbedf9c3598191026b4177659bbb188b671a94fef063dad6e8879904e21b90de8df400073f5e8cab04f19647dc6ff5cbeb4390bab507466885eae8af8912d5a610e4b147fd9571c1484ccfb1e23206a1312a31df5a965b66847fd3a1cd5a0b2de9ebe8ff8d6699d395b076fb697459273467373cee54ba5df06f0ab931215dcb3c51a3db8aa5cebf68e8705dae2c4cb684299e36a754c4608eef44fd7abd35340ac9f77e831e30721299ee58d93129e0fdfb5a5fa0894782ed9e159fb48b208f563331179a19a4078a6ea67552f4dee1783cdf0529494c1db042c138cf1a52df16acc82957a6089fac532538f79bab50fc961b670346305dbfad12194c491fad4b234bca5b74bb88891be178ee735d9e7a1f41cf259f5b50bb0d7fca673f02be6159274d4893523b3adb9eee297ff9a8cc4fd76eccc311781549845f9dc03bee22a0cf083715d0612212225666e039f196f78d3ea8753b716e100599c15e7e644b23fc7a3ec2dbb733546a3176b30b921855d1ff97dcace297c62abcf204fa453312de2f03636c28a965174d8d72442608ab773271a9f372e29c5f378f034710f6f107e069fe299bd0bb823c1126ae031fa8e3d38081d7b5a9263268e396ebb632483fd6698d52252e5fec246d43254c8a561375d1583d78526522216d3559b27c01734a3d82400133091e74f22425158565ee8dc760fa156d6df3eee1379fdd817d63c4ccc4dfaf4a3e97cbab6c6477ff3bd0eababa54e9c4714a187b0e09920d83cbdcff0afa9cd8ca744f301c96331cd01381857c4a5841c643e1ff4e2349245413ae261f9630fe427f0207af27327c6a45b3e1775527ac6ea45f8053ccf5df8fbbe6bf3978a6b2e676a155dae9e67fdf22edde1998c33ecd594d4c07919886195d115d2388b1d32d0e072be7d0e588c3cc93364acbf1129214a1606319550bbaf374c7e36a3bbfb24e416a95a5793a28d06176c464ae1aa35c4f971c5498ef07a8713a19556d651f229cdc3dbe1f1e6a852e2a24eb429438191d45ca0f629d2d329e1aa018a561c3c3d14db9ebdedb1b381b9e01e3cff077079932275830df7de471abf8d20daf5cc6cc200b179cd8dbdd034d1347cd4e60dd4b56ccfbbaaa30536a035ec1de576ae79d0c59f081cfed89f4264b28aade9903436983fcacdfe4f96b278d1bf6ab67ff3a7dab9f1fdf3fbb16f4577c55de115bcc4b265c7255c734a0289cffde428ee693d3ddf14714205fe1861b8a33b432b0dde057984b3fa62d6a813054d39eddbb83cc45b05ee85d872ad46f9c9dfa588dacc767d6f38558cc04a806acee0434e87a829955af4c98f89ce90354d84bc54b0fa0e8faf09d37a30f24517b980285d4d303a3ae6ceec1063f4de6fcec3490db14a0d682f132fc998891964c95a7ac85a78f8af1180e1460a4470d13fb42c0fb52d595c9e2cfe3fca219c89cb48a73b318bfe12b77d9c25164f383ad7b34e1c5aa630bc14ae518b14791a039752d3a844b8f7c188611bda624c340d714447a8b55d2660c6c834237c677674c5bb4fd0ef6688f988212cd71c0cb22a389649f56e1711d88209d430388dbd406c79475dc0739b09e5cae26b1ee5a7c85c4508ca661a2dc6fffcbe0fd5eeb80b762fe2881e1fa768bb41b5327b2e6cb899699e2bfbbd1ef8ed4b3fc0bae4a6a9f9adf7a5a945bef9a525dca0bad7bfe2d595da99468cd4e8e343f087f"}, @NL80211_PKTPAT_PATTERN={0xa5, 0x2, "ea8acf79d0bf258128bd14ba655cd320da953c35864bd26463d698cf19429707fc71bc0bb5fe8fd0d25d885f27bb4ee50aa9dffcd201882887b149d2ae900265e87b0e040ba04572667e76b757e6c34b3513791b7f82338b7d48f0139a577da1e7212be0b46a46db6b7ce3ceae4658ca159edeb5b4435bc1c4dce638d8074bd90ebe44e788bb5ed6c85a363dd3bb96401dc1c077fff63f1cb89e3052e52a6c76ec"}]}, {0x4ac, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_MASK={0xa5, 0x1, "542772c132d3356b488d0290b54d1c5add2f3729b2bb925e3fec54d424a9132b96fb026cea64f7236a9814be4f3f02c235fd991c3c66710f6e136f130005c6c07eac3b47a6bbb862f01a926b34497add70e7433c6746bf96a3559ee905d25f955e396fa046f883d50f1ffd29a6b27d90b39721df9f668bf424920d76a6d3ff739228a7ee5f6ed3644163810238d77f4c8d931035d07f60582c94ca9d722bdc8a95"}, @NL80211_PKTPAT_MASK={0xe5, 0x1, "6cac3caeaf69c4e217793d2cb9c6eee48068dc85c18172793424a3766c1e786a135ddd4df2d872b8128a7b34ede85406b6ecca14e8a3ced7d828f9d35a216fd8a114cb845e789f650ec0b087d4552249389939505a329f66196434aad4cf82aed39f79adc1d8f1d599cf8facbd50aeebbb7d06342654f524319e57ba8cfc19c7ffe182231b4b8bf56fdf930af8d47afd7936380ad58a72e28b26d5537a8d59ef92acb217f7eed40b8e54f38843805759151116cc81c5b0ce3e2dfc8da5df44b5be618352fcd5858ac29487bb519abc8437f16247af0f723c132a9556dcb18ff45f"}, @NL80211_PKTPAT_PATTERN={0x75, 0x2, "9a530c823b4a4e0926c20c6f2e7e3605d8a9362878031f0e959834138273d5d5e34957fd9b8a2d1d5c3c6b612fd826d89d7cd5104d945c2a1906b3afe924570a494e663b7d688f3475c85c6d1dc535fb173a46c91af791330388ee533c6f5518aa86b8fb38439c7eddacb510f7c4f6151c"}, @NL80211_PKTPAT_PATTERN={0x65, 0x2, "b81c6cdcd87a8f79b4bbb24cbcf1ad8e8709c0892d55d4a34715e776d3ee8da16fc162f5eb31db5c09a6a3949bba5daf889de0fae3a6c133429b2a4b16953a74792c77268e28a235715141c9661714508e26f96893127660b5c7b4bb16b5c2a2a2"}, @NL80211_PKTPAT_OFFSET={0x8}, @NL80211_PKTPAT_PATTERN={0x79, 0x2, "a5e9b120be96f3a6b591e0eed0062197ef11347110c3b29343239e637216349fc087d2f1468f5329f703b1f9405477a377f91475bfec738fbec2b5b2ea361e1955d36a331db9f743940e032c7b399408e255b78c359eb5b0b31f504fac142a56bd24ca9d71f5559aec3cf376d8495fa5f5448189ab"}, @NL80211_PKTPAT_OFFSET={0x8}, @NL80211_PKTPAT_OFFSET={0x8}, @NL80211_PKTPAT_PATTERN={0xbd, 0x2, "a70e8f5a93613ac0eeea04413ddded4f51afb41d2a27d1c526040a6bd5fc99fce5675f1e7b02cfcadaa5796c83a905c4c3090455dc00c404745b727b0dfb589949b482e3c970806d5fced4aec987aac6f442076a1b26114b15eab3ca3ce8d15a68ab45ef6184056a02703fa8d73afc77f214aa0328f2225929708377ced1a4029b5891b4c88ec720b20b1627dbdbab09d19c5b47643e3fed32b54b15890d2274cc1527e5cfd2d3805118c20f0dd63d53463841714d9252d374"}, @NL80211_PKTPAT_PATTERN={0xe1, 0x2, "96ffbad90a92001845f48ec3e9a47a1e69e1228b7a673fa87ff8704bcfea6731be1ea9f431a0e9f562b5834778dddcfa1d2bc0d3c37fb8a8ed8294abd5ff9b3c2f29053f1ce4cba38144967b8a3da094448b656ae0f697ea08f0b7f12702455a9bfd1b58a89060fa9bcc66d9f3c2cef8fda1a6e896fa61fedd2e67bfc0185adc6e90bd51144360835107278b04c04faf651b29579c7ae909c486f01aa65f24566ef6c21c68e303f9a371bd8bc615262f0cf25bd7d857f4f8a4e0000acc252d524f1d50a6bd8eddb7d8f92058c8b54ac3ce9b2dde13a45d5a2784429e01"}]}, {0x498, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_MASK={0x85, 0x1, "44710ef2a134eb2ccaee9a8be88942f3bbd5b78ea4205ff2a6a7988ef3c4756a2bcc8eb4d8dc50005495ad7fbf24e00716fbaf5ad8b5af907aa5d41fbe8ade0cf10ea4ea9071392305adfd1d28a39aefa30afaeaf0d6f06fdd17336382426e5ad7b8b2c42ad306704de2fc83b1f2ced0fd7e2a836c93582079291b1a9416e739b4"}, @NL80211_PKTPAT_PATTERN={0x11, 0x2, "f370f395cc54707316c57ee807"}, @NL80211_PKTPAT_OFFSET={0x8}, @NL80211_PKTPAT_PATTERN={0x3ed, 0x2, "3a8ab01116ef9b6969ad6b628d06c0675d3ec0ae8a925c69d40d06c4cd08f5b1d40a8b21eaed2d0907040f47b924c3fb8e8e2b6e5da7a23299711064aa1090e93657a5fa516bc202392a54061cb161fefe45b2659d5e80042b2fd54eca49c85e15b3712ad39b79b941b54e805adf4d0adf301c2c739ff6ebfa829c920fb305973409f6cf9abae71c35f9e2f99e32b67335e1b41c2475a0722ff62ef1d75b64aa520ad7dee3140df03f29217b1cc75e5d866008d57fd19d79bb5cffb0e0383e360e32e12aa98636f7c3849015eba6630a69052a26ec8e84c937c35ec168cefd8bfd394305a3825a3d95e0aa00d5ccae17e52ea1012511dd8a2f0af4bb8ea35ae2247b427bafa23ad83fcdf32157f3216494638ff02efabb3eebae44e6eccaa754ace8a42a8f80294772c5c5f7ecd04d4f4dd225e4c97b4e27a5d46be83a7bf3bbf8303513045708a10fc8d9d024c26a6c57c614f60f95cc45544152e00bdc001064196f0a0118488ac8b11ff0f42a6e1ecd0c768d92b79e725db372da4770067c16d28cf404cb94ee8fda83a75e35e058e7525a9c8c28989ff52e1a3ac1537c7a42d00e9330c9d2fb99b439cdf3412f10b160b7600c886b0f74839b306ebdfc498a514fa361685be06d7732b63e85589d29b4da79b89d4aac61ee511ecac482b30abe9bd8a5acb264d14ebf0e1c4184ad1b77df1725620c394987ee4eea653ee83aebdb9e1e4eb47879d215eea67e794b52019375de31e4a8331785a6e682c728d4e1458c73dfec8a0ee92c6e6a595eff752511bf452397118127caa73ed1f75d475ac596d85e48a29819eb31672282443da01c579535aa53008549cd564b27a4f708d72ae6aaff35f3bfa3dfe6cb445e4f24c8fa9c5e821d97ce76ecf9e9db4228592e607bc0c0a6776dfa2bfe0a6b950b4141e99ba7fd2d609f3e2db7ee1e17af8d4dac084e2bd1c9493436eb23527bc0f436abf2b1cdfe2a6e020316bba045c3228a8bfb8641acc4c304f610bbc8db7aa67ec243575355620909416a441d8da71f837434a0b97fa643e7ef518037b895bfdbbf4e461ee25bff40966a80ebd7b7f356c22b32524c626a030b1549c3c44943c05b70bcc870d57882f527e4b5877d332c3dfc1528a72dc32d714c4a8c302dff07321bf8a9244e6daa953d68e45b38b82bb5429f612cf12b279f73ede9dc8be85beba7b6e977ad8cd47ad4c205a7c07f1ccbf9cf0de920f3a6a1c078afbb0786f80624a1e9eae337a690aa8d1ff047f44f577bc6a5f4e25dc562bd463929144e3df8dcc9e8657ae25634a7f2c563c540544541a4490cf6397062f0215b76ddc3835c41d4947f121b293f13ec33b6952ffe38c43b3b95af495ef62d84d96d5139af1d429af99f5f369d4b661637deae069b838dd746e330"}]}]}]}]}, 0x1ec4}}, 0x0) [ 1273.331921] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 17:04:38 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x541b, &(0x7f0000000340)) 17:04:38 executing program 5: perf_event_open(&(0x7f00000009c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xe400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) r1 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) ioctl$NBD_DO_IT(r0, 0xab03) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.events\x00', 0x275a, 0x0) getgroups(0x1, &(0x7f0000000a40)=[0xee00]) sendmsg$unix(r2, 0x0, 0x4040) [ 1273.521846] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1273.521846] [ 1273.686141] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1273.686141] [ 1273.757493] block nbd5: Receive control failed (result -107) [ 1273.854931] block nbd5: shutting down sockets 17:04:39 executing program 0: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000240)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000280)='/dev/sg#\x00', 0x0, 0x0) readv(r1, &(0x7f0000000000)=[{&(0x7f0000000040)=""/52, 0x7ffff000}], 0x1) 17:04:39 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc020660b, 0x0) 17:04:39 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f0000001380)) 17:04:39 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x80000000e) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) vmsplice(r0, &(0x7f0000e79000)=[{&(0x7f00003fb000)="f7", 0xfdea}], 0x1, 0x0) fanotify_init(0x0, 0x0) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) 17:04:39 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4642801000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:39 executing program 3: prctl$PR_SVE_SET_VL(0x32, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x16}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) socket(0x4, 0x0, 0x0) poll(0x0, 0x0, 0x204) msgsnd(0x0, &(0x7f0000000480)={0x2, "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"}, 0x2c4, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x0, 0x0, 0x5b3}) socket$netlink(0x10, 0x3, 0x0) [ 1273.921123] block nbd5: shutting down sockets 17:04:39 executing program 5: perf_event_open(&(0x7f00000009c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xe400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) r1 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) ioctl$NBD_DO_IT(r0, 0xab03) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.events\x00', 0x275a, 0x0) getgroups(0x1, &(0x7f0000000a40)=[0xee00]) sendmsg$unix(r2, 0x0, 0x4040) 17:04:39 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x80000000e) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) vmsplice(r0, &(0x7f0000e79000)=[{&(0x7f00003fb000)="f7", 0xfdea}], 0x1, 0x0) fanotify_init(0x0, 0x0) open$dir(0x0, 0x0, 0x0) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) [ 1274.107521] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1274.107521] 17:04:39 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000023c0)=[{&(0x7f0000001280)="fd", 0x1, 0xb3d6}], 0x0, 0x0) 17:04:39 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x80000000e) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) vmsplice(r0, &(0x7f0000e79000)=[{&(0x7f00003fb000)="f7", 0xfdea}], 0x1, 0x0) fanotify_init(0x0, 0x0) open$dir(0x0, 0x0, 0x0) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) 17:04:39 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x80000000e) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) vmsplice(r0, &(0x7f0000e79000)=[{&(0x7f00003fb000)="f7", 0xfdea}], 0x1, 0x0) fanotify_init(0x0, 0x0) open$dir(0x0, 0x0, 0x0) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) [ 1274.305153] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1274.305153] [ 1274.389613] block nbd5: Receive control failed (result -107) 17:04:39 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x80000000e) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) vmsplice(r0, &(0x7f0000e79000)=[{&(0x7f00003fb000)="f7", 0xfdea}], 0x1, 0x0) fanotify_init(0x0, 0x0) open$dir(0x0, 0x0, 0x0) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) [ 1274.504972] block nbd5: shutting down sockets 17:04:40 executing program 5: perf_event_open(&(0x7f00000009c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xe400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) r1 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) ioctl$NBD_DO_IT(r0, 0xab03) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.events\x00', 0x275a, 0x0) getgroups(0x1, &(0x7f0000000a40)=[0xee00]) sendmsg$unix(r2, 0x0, 0x4040) 17:04:40 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4642901000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:40 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x80000000e) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) vmsplice(r0, &(0x7f0000e79000)=[{&(0x7f00003fb000)="f7", 0xfdea}], 0x1, 0x0) fanotify_init(0x0, 0x0) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) 17:04:40 executing program 3: keyctl$read(0x1e, 0x0, 0x0, 0x0) 17:04:40 executing program 1: keyctl$read(0xa, 0x0, 0x0, 0x0) 17:04:40 executing program 0: request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0) 17:04:40 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETOBJ(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000740)={0x14, 0x13, 0xa, 0x201}, 0x14}}, 0x0) 17:04:40 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x5411, &(0x7f0000000340)) 17:04:40 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x4b41, &(0x7f0000000100)) 17:04:40 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x80000000e) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) vmsplice(r0, &(0x7f0000e79000)=[{&(0x7f00003fb000)="f7", 0xfdea}], 0x1, 0x0) fanotify_init(0x0, 0x0) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) 17:04:40 executing program 1: timer_create(0x3, 0x0, &(0x7f00000000c0)) timer_gettime(0x0, &(0x7f0000000080)) 17:04:40 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) msgctl$IPC_STAT(0x0, 0x2, 0x0) ioctl$TIOCL_PASTESEL(r0, 0x540e, 0x0) [ 1275.103437] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1275.103437] [ 1275.207382] block nbd5: Receive control failed (result -107) [ 1275.306075] block nbd5: shutting down sockets [ 1275.312031] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1275.312031] 17:04:40 executing program 5: perf_event_open(&(0x7f00000009c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xe400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) r1 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) ioctl$NBD_DO_IT(r0, 0xab03) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.events\x00', 0x275a, 0x0) getgroups(0x1, &(0x7f0000000a40)=[0xee00]) sendmsg$unix(r2, 0x0, 0x4040) 17:04:40 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4642a01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:40 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}]}, @NFT_MSG_DELCHAIN={0x20, 0x5, 0xa, 0x301, 0x0, 0x0, {}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x68}}, 0x0) 17:04:40 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x4b52, &(0x7f0000000100)) 17:04:40 executing program 1: keyctl$read(0x18, 0x0, 0x0, 0x0) 17:04:40 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) 17:04:40 executing program 2: mknod$loop(&(0x7f0000000300)='./file0\x00', 0x0, 0x1) clone(0x2f802900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=unix,'}) 17:04:40 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$sock_SIOCDELRT(r0, 0x5450, 0x0) 17:04:40 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541b, &(0x7f0000000100)) 17:04:40 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x200, &(0x7f0000000080), 0x4) [ 1275.737234] block nbd5: Receive control failed (result -107) 17:04:41 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541b, &(0x7f0000000100)) 17:04:41 executing program 0: r0 = socket(0x1c, 0x10000001, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x103, &(0x7f0000000400), &(0x7f0000000500)=0x8) [ 1275.798626] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1275.798626] [ 1275.915835] block nbd5: shutting down sockets [ 1275.924764] 9pnet: p9_fd_create_unix (7828): problem connecting socket: ./file0: -111 [ 1275.947360] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1275.947360] 17:04:41 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000280)={&(0x7f0000000140)=@in={0x10, 0x2}, 0x10, &(0x7f0000000000)=[{&(0x7f0000000180)='c', 0x1}], 0x1, &(0x7f0000000040)=[@dstaddrv6={0x1c, 0x84, 0xa, @loopback}], 0x1c}, 0x0) [ 1275.971505] 9pnet: p9_fd_create_unix (7843): problem connecting socket: ./file0: -111 17:04:41 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendmsg(r0, &(0x7f0000000280)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) 17:04:41 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541b, &(0x7f0000000100)) 17:04:41 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_mreqn(r0, 0x0, 0x4b, &(0x7f0000000000)={@multicast1, @broadcast}, 0xc) 17:04:41 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) listen(r0, 0x4) r1 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r1, &(0x7f0000000000)={0xfffffffffffffd91, 0x2}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000740)="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", 0xff0}, {&(0x7f0000000080)="aa1e359211a6e3a95ee229fe3df58b4f1c6b17f657310dae9599361686a0c4b466bc8c3d1ed92c3a91387fe7991c04f26716435012be511869f2244447edbe0dc3bd39cd1effeb8b3a2f5e054fdf0b697c", 0x51}, {&(0x7f0000000100)="39274f2490b30a98b6417f48624337e3e5e9ba9f69549484648bf20841c4c962ef221af3b21333", 0x27}], 0x3, &(0x7f00000004c0)=[@prinfo={0x14, 0x84, 0x7, {0x2}}], 0x14}, 0x0) 17:04:41 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4642b01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:41 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541b, &(0x7f0000000100)) 17:04:41 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_mreqn(r0, 0x0, 0x4, 0x0, &(0x7f0000000200)) 17:04:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_mreqn(r0, 0x0, 0xa, 0x0, 0x0) 17:04:41 executing program 5: mknodat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x1, 0x0) open(&(0x7f00000001c0)='./file0\x00', 0x1, 0x0) 17:04:41 executing program 2: open(&(0x7f0000000000)='./file0\x00', 0x200, 0x0) open(&(0x7f00000001c0)='./file0\x00', 0x2948854d9ce094c4, 0x0) [ 1276.342469] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1276.342469] 17:04:41 executing program 3: mknodat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') 17:04:41 executing program 1: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) connect(r0, &(0x7f0000000040)=@in6={0x1c, 0x1c, 0x3}, 0x1c) connect(r0, &(0x7f00000000c0)=ANY=[], 0x13) [ 1276.508408] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1276.508408] 17:04:41 executing program 0: r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x1}, 0x1c, &(0x7f0000000040)=[{&(0x7f0000000100)="4f45aaec76cd90ad9f825efc23af0bf674e1b0c7eff75be3ed93cd5a0644333545575ea1835d8f15f06c41f105368e773d61fa08da545a741a9a50ec61d80db30b0b378c24143cca1f8a5efc8e37c26132761975682e67547aaf3fa03be8732a277f209da29f095ff5e8677091216085c5732691aee398bdecd127319aa35e540f54af3b7a2ba3d8a18fe9b55cec8c0cf6f2053ad5482de4808b28fe52fc2b521cdd0b183067dad3d9ad8e8c8695ae3b5555dd6accd560e69ff01dc7bbd96e71866443245495505188274497878823d58dc02bfbd01f3f7539745316d6b5db50144e8c8722991edc0a914aad669a4f94f32b6ae58161a4031e486ccdd328b80976c1670581bcf273528fe3a59b780d6819bfcedffbcb456aeab48962f82d890e969329e6e0d151249644668ebc9a56c07ce4186304891febf7f8da1473fe2d094eff3994d7bee44ef16ceefa76f074bae06a7b12a3cc44555a561da41f52e0909a2722923557b54b90897723926261c073b90e0c130d73691c373fdc1a4fa6421a5aa0c58d5e1391b37693f977e500b22a8754d4881bf0b25c0883e6bc2aaf63d42ce9dff5cf536d380daa0d1b06d6152682dee712ba9a429eb155935164a1d669b8b729c16cd56bb9474b2fd24b588745da4379a9881fc52364653f830f1bb832d52e9ac2d3fcbcb6b37c55c98206771263de3148c95d52cfe678483ffd3c2260b8a8917435bb309cf6b28472eeb172db92f11786b54d46d7b712f97671aff6de9779c3c187cc510ef1c07762f3009fe5e38700601808fbda03df213665af255a96713883e09619590473ef0c4001b7c8d75212932dfd974b34c165ccad9bc3ff8a57f2e03379e4d7b95341542a4954724bef1289903ba3de5ee47e68c597a717d25a926aa22363d65e294413a9c7e3a314637a1ae8d22e2c0363f4d284980cbd621379e9c4e6103cba05111d7f8ce1d9eea2510d5d23ce1c78ade5f68f30fd95472081871b19902b0522e6b5b1ea6749904a660c592ac13de079e6d2319f68dbf516bda54c60c0540c19c12c101b12aa381004e3efb87c48deb1ce51f5d423551d7c0e99229c37ff5e72fedded3991773e237567d51b5b20babe6e5ee06037d71fb746acd607d56e1c4e998199463cb70a934ae200fd05c56107962d3e4314ee726ba9997ef5128c25b045bc85faa250c47cf39a27e4b561c6d24618c549787930dcd4cf85a050272fd95dded915b583ce6a52bd259e6498611c4b6fdd39dfe89b31d0e4dab4d1e745eda018bf86148b2f365f1b898e1a5cb0729c4340b216e2dda93b39fe36c49a1afedae5463e79773974b6452e1941675a5f2464fe0f2709fc80d7a8c3a8b457949c3f48584fa4b7a354338efa8535c86ae13c365bf404c1ea56d7c420ebde38d0daf0ccd3e3caef30c99ed996ffbcc9d7f3d6ecdc73f03f931706d3375df089f3ecccd4280afba533058ec934653ae954f1c4637fc3a3492f67e4e13c40d4a36cea90b9b767a5121a9861cecc9b2a3ad35cd2a89d517812e5a5551edebdb4b841b7d11833b55678cca3b373f7d0c4f8046df042f8a85b5af856f028565880ab144a4435c938250b6a47638a1ccb780739284fce8dd0f44dfc912bda8976ac5558d97e3f6f7d1ec26f9b91e8ecd68fd5c6662306c8e4e0aafd68b93fb2a2e71fd0a07edc44f87aed35ef3c68369682f95c80ca87810a3e03cf2b55eabf12f1fabb9bb34fad538172f90f0967e46687123c120405e0ff67771135bed6b25e5b93f1aff4e6fd3f9819256470bf964e17e19bc5ad7565e0a12c02a9b363bfa63c77cee9115678bd4ddee1e52563f605796936d9e25c05269f43c5b58ca9e2c490400b3ba6764de60d339395733e0cfd7db51c53bdc2591f439a29d83eae2e8df037549489e2c4affcb122e98845d65a05926a1009c7ed560a73f4db3dd6102fd0226b034bdd7c8920997e6dbec543b2793b6983a92595010f45c3b0f43991f2399456d3aae914ca87ffe046732bd78f3c0e5def06bc83836b902d19350fddff62b4860b22a9006a35a526f003e1236704aef116b84426bd71aaca0abec10986bdb1d2b95fa49d368d0c6d21e87a8924aa5217070a90898c3b1da3c9f3e41cb64dcd00dc2ac48cf48a97ad71514864ccbb0b058df23598132175c2609d6ef65be932df76aaf3b4de57daa1b9efe17c000e96d6f34d0f65a0c74a5eb88ee80cab5d0d0576213aaba9dd4397f944872f188cfa214872026a52a8f7896b5a942aea364d900d1f91a5230f7464c7b1d4aeeb56c82a2a806556b4ee90c828bdc0a2c6e4f97f37e531d1e8fc3e7982a5713b4b1825142f66caa11fd34f00634ffb061755e525fa3d608c3b142ade247ec0d5bc2c0df0287b473b8ddc6da4366451e88b487dc62f083a72d9fb3834e18d2ce0a1f86722764e1b515cc52efc17185939a41319f8354c827c4cc8dbf22d94db8d818df6da2287ed7491848a9d98fc72f03579032b95467a0da74fabb835b2dfbaab8b143424e2f2a86c9f880067b003eb4cec8bab846a372d13015765ffc8d405785445b2aafd2cfdf2e12605f6a4aff36efac9328a43fa62e712c0596820724e93be991f0a7b023a1320ef7856cff6e68aab7da9162e7041026bcd5cf92af1e341ccd1123d828471474f121e182a707bea6225b13c80f922a492cf76ee8bb4c51b301bd26193ea58712cc2f3062c8735cb8b2461baa6b3b1ae5267e574a25bf883cd7238e2bc9680d0d63d021cd3ad4ec5f480a1790b40f6383eff572d7b3bacee1eb28ecff6f5917c4df01471b79d5bb1c4636a6d54caa472f5449cbadc5c0bb2df7c9ca15be2848c918b8ce66626cec715e3ca840c9cb7fc9065d011c4d4012c44d7f33252cafe79387dc4ee458fdf1d5f112056cde35dde12c5780348d36beffadda264c890f49ebecb6124c0d25ac22a27ff114e9a638bff4f48ee702dd39ec011d13d1bcc879d05b68a4c4d3c289c61be754ace07f6c4abce60ca9e33c3a196b10b9c4bc78463772e2dfa68204ccd74ac47bd303762c822f0cb0df9a7708a813919ff4be69aeaeef18805d6985f22293691f49c3f9435b4c3bb388e5c9fc2c6ad6cd3bd100659a6dcd23f09cc462fd15d7f587362ba8f443a04b3f18199a58d1fab22de61f4e5c9072714ed1d0291e79ee97301c8de8dbbc673b9e3f3e974d6d893d038f5e978c1f6a7ecb5e27461980577d902e81e98b66fb00ba63be3fad4060c45cc48299369359b3563ad6049aa0a07fb6dc5a4fab16d5e521a2531d78482886e711f40230c0edc915d82787e09f213efe745dcbc7ab0f8f5004e53e8b9054a86fec32ce7159de8446061634da2eca718b72874d649beeb3c2c08e8b4b195e2583d7774954cab3510ce897faf2d423675d379db85badd2df5ce6d99a012265645e92e2a44ef27e770bded156b54b4c35dfaadceacaa475aa977252c1dbb49400df6d652b5252d198a2e74e64b4070c49b43fe13722603d6fd30ec0e1200e49a02dce4aa0aa162532f246c6bfcca3f5b2c1c010587b53ff5b3c9b23932acba007c5e59390a50aecd9f4018bf759838933a84e9a43ce0a76b4947ae6641d3d1e7347082b8f4d5b88b83b9f401d77b767f1886c2816893c0621670109c7ffc39dafef1fe41f1eac5df16ef76d7f53befefdc3816913667a9c9b9ed693457fba5946ed16bd16e4707965f1cce1669cc83895722b6bfbd4ce6aeac18628ea825951efae2b6a2ad530eac31cb0b2548c5d1ecb03c9b56875bc5af7ee43979798ccfa7ff06c71899501b01eec72930c3c81138a4e04cba29933716579e908cd67d25f1de29814bd3633493a7e6a0c28ddb31940f15ec9bfd8385f7b8bdf1167dfd4b0d1063c8618ba053fd3f1e7db982be48a1cb3a3fadccfb6d704cd794f7ed35e43ea612b6ebf4783d44cc4b28d563683eae9cbcf28feece0be75bfbe0db8522050b504a8a424b19b3e674158edd379f52295b972a11fd2fda6c7d0452998ff627995e7a7aa84a70bad4503373a1831de5addbc6cf8cfdb85d7ec209d9eaadcecfbf28d1228f532c0f957f9c61cacd5c737f9756f00487ddf7123d9bffc8eb6fd9c9569f4c4a28f2e71c115a78ab38b22c918bbf86b0531ab260c657fde3aaca4d3f5dd07cbf629638560c005cb8826ca0be8e44e383934a4911013d1b12eac8129837670d33cfc77c7c76b802de2ec2243da9079e5895914f71bfafce547322be89d1868982e8a9b996c5413da143bf33c1e0893e4d1b68ce49ccadb81dcca9148e8bf964839df4e2de2d3aec004ba1f9413954e163963bd2e7bcf1784691aca94ba4730ea8b41be89515d0e22c1bf6e6a14f4e5efd684ef0b0176124a0de1b395506404134b35f820a90ea704e64ce5153b55f7f015d8a656e9d036da54e3e1d620b3400dadcac85fdbfdbc84e83e661094411765f6ffb9858dd2e02a39d9f44a7ef190fe4da40697bcb319cd64461eff14f1920b5dde854fd8d21f6f7a8728c2b828a01789a19fac8503d2ef31e99b929787461b2270c5ff2447534b4b328010e90fa1651cb9ae0a82dcf5384df6e5269bbed27ca80b6752895d846aa03c4e11f205faa4baca33d803dcbd5161a440e6ec66ddc11ddad58377bffbbb62e136633c7a7a1d89e3769bc11f6de7be6dee1b96fd8b38e17d50a397cbec6c37d7193d86bbaa0b4c6cbcf7acd5db30522c240b861910f0c2b3a13a05307e660296603f60417b0e99dbb4b2fcf941ba75f27bd048f45ee0d3021d0cfe125e15e83480df8666c4b747a9bcf32bac6d8d00d8cecba1ffec3eea8e893e1f9a0b64e7088f1b154cf53c17822e10d6e6b0b3a42f0c8a03e1a2a0c13b4ade67f1dcb2bcc6bfa4d6bcac16b2597bda43100c37a158e1f68f15216fe30f898bcd22927dcc1ed59e1fb9a03b5df36a1df8ea63f021027a7986580fe9d2fc3ac1e432c983ef4b938a80908374fbc67d287830e847f5d30556ddea70ffd655e0304d73aae7fe067836c3e422c3fa716046437d7b73d23ced1f577ab2b3522e8486bf92c08c844f87719217c0b8355935180f27e9df486a2af3cdf09133545163c8e2a9bb22628e04c123feb13f7b5e4d1d9e290a82a1f5d28e4804365cc516c0518dc87b2e85074b649fef4c98b0112fffe09ce252cff7d8a464c47cfe1af4c828c23320d697db7d8912d2da67809907da8b1dcccd245572941ffb2ccbc1068d3f96f920cea567c45cfe07f4fde6c96bf3ed0f06b30fa1ebfb0adebcc1ff58a065ba79fa511b832f12a9cf12cf3aab6f558989b77abc222f79df372fa73b0778e7e0d9149dda155ce97b17464d8de993e774fe003dd9fe3aa87c12abd1438116560a979062cf2ea5cd8f8e01faa175f275341052dcc189a91fbe1a0f4534c060848da6c8c6b6625dd62ef8dfdf7cf0390763b4db1e8369762320649478c39cbbce7593929a1b967c1cf9c8954bfd88396795affb2cc6b374f127f1cfcf1a50e1c4cd89d47d73d8690f08c221b0303bb28160ebb0398c7322e2521b282e1610b4c7bbdd091a39d9255f501edfc96ac7ec750e9d7382f2cbd6f3a233c3ad2b21c30d1b0983cf638494e2e59b09b6a785c98a28d8a396b111480d515cf8d7fff3c65a063b24eef790816261cf95f46bac5bcc022806fb39ea5ec102960e0d4db3e98eef84fe9e834b4d34b6d473472959285fdea18cb8ccd6af50db1dc81788d8c80bd951b0cd0499a31165283", 0xfdc}], 0x1}, 0x0) 17:04:41 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r1, &(0x7f0000000300)={0x10}, 0x10) dup2(r0, r1) 17:04:41 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4642c01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:41 executing program 5: setitimer(0x0, &(0x7f00000000c0)={{0x0, 0x800007aa}, {0x0, 0xc13}}, 0x0) 17:04:42 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000000140)={@local, @broadcast, @val, {@ipv4}}, 0x0) 17:04:42 executing program 0: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x2e, &(0x7f0000000440)={@empty}, 0x14) 17:04:42 executing program 2: r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x1}, 0x1c, &(0x7f0000000040)=[{&(0x7f0000001100)="196e9c920ebd", 0x6}, {&(0x7f0000002100)="fbb41082248d85df2c574dda68ba21b085ae3f76ef869712bc47b8b228af18c95cdb4c12fbc2887e466ff66c68511fedff3c34dc536132d08abbccaf32ac73ef0ee736cb0865e9849f3632eea8029be18905fd77b053c324ee3253552238e631345bd362dc5354f890d79922", 0x6c}], 0x2}, 0x0) [ 1276.897723] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1276.897723] 17:04:42 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) setsockopt$inet6_int(r0, 0x29, 0x1b, &(0x7f0000000040), 0x4) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = dup2(r0, r1) bind(r2, &(0x7f0000000000)=@in6={0x1c, 0x1c, 0x3}, 0x1c) 17:04:42 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_mreqn(r0, 0x0, 0xc, &(0x7f0000000000)={@multicast1, @broadcast}, 0xc) [ 1277.053316] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1277.053316] 17:04:42 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000900)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, &(0x7f0000000880)=[{&(0x7f0000000040)="ac", 0x1}], 0x1, &(0x7f00000008c0)=[@prinfo={0x14, 0x84, 0x7, {0x1}}], 0x14}, 0x0) 17:04:42 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000780)={&(0x7f00000002c0)=@in6={0x1c, 0x1c}, 0x1c, &(0x7f0000000700)=[{&(0x7f0000000300)="90", 0x1}], 0x1, &(0x7f0000000040)=[@dstaddrv4={0x10, 0x84, 0x9, @rand_addr=0x40}, @dstaddrv6={0x1c, 0x84, 0xa, @remote={0xfe, 0x80, [], 0x0}}, @sndrcv={0x2c}], 0x58}, 0x0) 17:04:42 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt(r0, 0x84, 0x0, &(0x7f0000000180)='H', 0x1) 17:04:42 executing program 5: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000440)=@in6={0x1c, 0x1c, 0x3}, 0x1c, 0x0}, 0x1) 17:04:42 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4642d01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:42 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) listen(r0, 0x4) r1 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r1, &(0x7f0000000000)={0xfffffffffffffd91, 0x2}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000740)="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", 0x1000}, {&(0x7f0000000080)="aa1e359211a6e3a95ee229fe3df58b4f1c6b17f657310dae9599361686a0c4b466bc8c3d1ed92c3a91387fe7991c04f26716435012be511869f2244447edbe0dc3bd39cd1effeb8b3a2f5e054fdf0b697c", 0x51}, {&(0x7f0000000100)="39274f2490b30a98b6417f48624337e3e5e9ba9f69549484648bf20841c4c962ef221af3b21333d7379e93", 0x2b}, {&(0x7f0000000140)="bd90dda2d61a00de632ed5cb5e8fc7071f", 0x11}], 0x4}, 0x0) 17:04:42 executing program 0: r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x1}, 0x1c, &(0x7f0000000040)=[{&(0x7f0000000100)="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", 0xf56}, {&(0x7f0000002100)="fbb41082248d85df2c574dda68ba21b085ae3f76ef869712bc47b8b228af18c95cdb4c12fbc2887e466ff66c68511fedff3c34dc536132d08abbccaf32ac73ef0ee736cb0865e9849f3632eea8029be18905fd77b053c324ee3253552238e631345bd362dc53", 0x66}], 0x2}, 0x0) 17:04:42 executing program 3: mknodat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x2, 0x0) open(&(0x7f00000001c0)='./file0\x00', 0x8c86, 0x0) 17:04:42 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000100)={0x1c, 0x1c}, 0x1c) 17:04:42 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_mreqn(r0, 0x0, 0x4a, 0x0, 0x0) 17:04:42 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendto(r0, &(0x7f0000000f80)="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", 0x7d8, 0x0, &(0x7f0000000000)=@in={0x10, 0x2}, 0x10) [ 1277.544556] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1277.544556] 17:04:42 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000780)={&(0x7f00000002c0)=@in6={0x1c, 0x1c}, 0x1c, 0x0, 0x0, &(0x7f0000000740)=[@dstaddrv4={0x10, 0x84, 0x9, @rand_addr=0x20}], 0x10}, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000280)={&(0x7f0000000140)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) 17:04:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_mreqn(r0, 0x0, 0xb, &(0x7f0000000000)={@multicast1, @broadcast}, 0xc) 17:04:42 executing program 0: open(&(0x7f0000000000)='./file0\x00', 0x200, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x1, 0x0) write(r0, 0x0, 0x1a) 17:04:42 executing program 3: open(&(0x7f0000000000)='./file0\x00', 0x200, 0x0) faccessat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x0) 17:04:43 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000780)={&(0x7f00000002c0)=@in6={0x1c, 0x1c}, 0x1c, &(0x7f0000000700)=[{&(0x7f0000000300)="90", 0x1}], 0x1, &(0x7f0000000740)=[@dstaddrv4={0x10, 0x84, 0x9, @remote={0xac, 0x14, 0x0}}, @init={0x14, 0x84, 0x1, {0x9, 0x200, 0x40, 0x1ff}}], 0x24}, 0x0) [ 1277.725464] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1277.725464] 17:04:43 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4642e01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:43 executing program 2: r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x1}, 0x1c, &(0x7f0000000040)=[{&(0x7f0000000100)="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", 0x1000}, {&(0x7f0000001100)="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", 0xf60}, {&(0x7f0000002100)="fbb41082248d85df2c574dda68ba21b085ae3f76ef869712bc47b8b228af18c95cdb4c12fbc2887e466ff66c68511fedff3c34dc536132d08abbccaf32ac73ef0ee736cb0865e9849f3632eea8029be18905fd77b053c324ee3253552238e631345bd362dc5354f890d7992241b5a0f6a62f2e5518980b2e10670e994b843d828df969af695d299a1734f9cd00", 0x8d}], 0x3, &(0x7f00000021c0)=[{0xc}], 0xc}, 0x20004) 17:04:43 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect(r0, &(0x7f0000000000)=@in={0x10, 0x2}, 0x10) 17:04:43 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000780)={&(0x7f00000002c0)=@in6={0x1c, 0x1c}, 0x1c, &(0x7f0000000700)=[{&(0x7f0000000300)="90", 0x1}], 0x1, &(0x7f0000000740)=[@init={0x14, 0x84, 0x1, {0x0, 0x0, 0x0, 0x1ff}}], 0x14}, 0x0) 17:04:43 executing program 5: sendto(0xffffffffffffffff, &(0x7f0000000000)="b45cf6bb68f63c", 0x7, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f00000016c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="10000000"], 0x10}, 0x0) 17:04:43 executing program 0: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) sendmsg(r0, &(0x7f0000002140)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x2}, 0x1c, 0x0}, 0x0) 17:04:43 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_mreqn(r0, 0x0, 0xd, &(0x7f0000000000)={@multicast1, @broadcast}, 0xc) setsockopt$inet_mreqn(r0, 0x0, 0x9, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) 17:04:43 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) bind$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x2}, 0x1c) 17:04:43 executing program 1: r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x1}, 0x1c, &(0x7f0000000040)=[{&(0x7f0000001100)="196e", 0x2}, {&(0x7f0000002100)="fbb41082248d85df2c574dda68ba21b085ae3f76ef869712bc47b8b228af18c95cdb4c12fbc2887e466ff66c68511fedff3c34dc536132d08abbccaf32ac73ef0ee736cb0865e9849f3632eea8029be18905fd77b053c3", 0x57}], 0x2}, 0x0) [ 1278.074068] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1278.074068] 17:04:43 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) bind$inet6(r0, &(0x7f0000000040)={0x1c, 0x1c}, 0x22) 17:04:43 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@sndinfo={0x1c, 0x84, 0x4, {0x0, 0x1200}}], 0x1c}, 0x0) 17:04:43 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_mreqn(r0, 0x0, 0x6, 0x0, &(0x7f0000000080)) [ 1278.275124] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1278.275124] 17:04:43 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4642f01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_mreqn(r0, 0x0, 0xc, &(0x7f0000000000)={@multicast1, @loopback}, 0xc) 17:04:43 executing program 3: mknodat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) chdir(&(0x7f0000000800)='./file0/file0\x00') 17:04:43 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x8, 0x0, &(0x7f0000001180)) 17:04:43 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_mreqn(r0, 0x0, 0x41, &(0x7f0000000000)={@multicast1, @broadcast}, 0xc) 17:04:43 executing program 2: mknodat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000001680)='./file0\x00', 0x0) open(0x0, 0x0, 0x0) 17:04:43 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x2}, 0x1c) r1 = dup2(r0, r0) connect$inet6(r1, &(0x7f0000000080)={0x1c, 0x1c, 0x2}, 0x1c) 17:04:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_mreqn(r0, 0x0, 0xc, &(0x7f0000000000)={@multicast2}, 0xc) getsockopt$inet_mreqn(r0, 0x0, 0x9, 0x0, &(0x7f0000000080)) 17:04:43 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000780)={&(0x7f00000002c0)=@in6={0x1c, 0x1c}, 0x1c, 0x0}, 0x0) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r1, &(0x7f0000000000)={0x1c, 0x1c, 0x2}, 0x1c) r2 = socket(0x1c, 0x5, 0x0) dup2(r1, r2) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f0000000200)={0x1, [0x0]}, &(0x7f0000000240)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000000000)={0xfe29, 0x0, 0x0, 0x0, r3}, 0x10) [ 1278.624346] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1278.624346] 17:04:43 executing program 2: mknodat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x2, 0x0) [ 1278.746329] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1278.746329] 17:04:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_mreqn(r0, 0x0, 0xd, &(0x7f00000000c0)={@broadcast, @local={0xac, 0x14, 0x0}}, 0xc) 17:04:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_mreqn(r0, 0x0, 0xa, &(0x7f0000000000)={@multicast1, @broadcast}, 0xc) 17:04:44 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4643001000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:44 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000780)={&(0x7f00000002c0)=@in6={0x1c, 0x1c}, 0x1c, &(0x7f0000000700)=[{&(0x7f0000000300)="90", 0x1}], 0x1, &(0x7f0000000000)=[@init={0x14, 0x84, 0x1, {0x9750}}], 0x14}, 0x0) [ 1279.059832] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1279.059832] [ 1279.126169] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1279.126169] 17:04:44 executing program 3: mknodat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) open(&(0x7f00000001c0)='./file0\x00', 0x8c86, 0x0) 17:04:44 executing program 1: r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) bind$inet6(r0, &(0x7f0000000040)={0x1c, 0x1c, 0x1}, 0x1c) 17:04:44 executing program 0: r0 = socket(0x2, 0x3, 0x0) sendto$unix(r0, 0x0, 0x0, 0x2000d, &(0x7f0000000040)=ANY=[], 0xa) 17:04:44 executing program 2: syz_emit_ethernet(0x96, &(0x7f00000000c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa08"], 0x0) 17:04:44 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x15, &(0x7f0000000200), &(0x7f0000000240)=0x8) 17:04:44 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4643101000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:44 executing program 3: r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x1}, 0x1c, &(0x7f0000000040)=[{&(0x7f0000001100)="196e9c920ebd43e2ee2b2cba7b21d4a3d38ba5a16e406b3b3e9803f40c523ff5deb986d20ed5a076ac87ba1edc876eb3087f9234eea48e55ac5ba307a972532490db6ba50f7c089bb7573eeb4c262242178348913e4b4fa22d35d875b38c3ffa5ac418464ccf34ff152241ace80df1eb9cfe600f78d0ae253734f0b783f5136259c35c53612dcf71be7cecd67d74752a3f738adfc85d7fc9df5a8e91fe3b6f6f89de4e6c034f636debda0f933d51e0f32feaec6a77371a3ecfd9e96559e64acbc5212f405ef5d3fe390344db698bf490f6032108123ad68d00bbed0e4cca51ae014b06ee084adf021ea28b6db2525e36067eab4eab3cef3f560289079808b595f514a411b20f6f009059064c186cf32739f610f261a56fb847c60ac6f8f371b5a6b12b894cf60295f852d115596cfcb9fc0aab702ee6cd8096579f1a4630c873e1d5982dc6ea852e4affa8aa0ff24dbfb0fb419083716c9598af26417cc36170f400badff3715298e9b96fa3329ae67823fc7e80071c6cbe53d4fbc5436167f19e6869975f8b50ca2128d9fed3d0ceb0a93000e3e351b9f18cc280a7ff9383302ed83abc0ded7e314cc0bc9add7af83f012d7ce0c1f951506a82878d5a8d3bb82b5e16aadab15a5778a28c06962a97e207bb5a788f8c4f8499a47ba0740c197fc962153589e84fa51a7fba2a74ed2e03fcf0c40f042e66d861645d502a7375dfa5ba1c513bbc65501f2bddc79f8700047fdd4858e5fd7cb73403ef99d115560bf3c5c47be76f574c39c0549646b6888dc177fac6ba6249852bdafec8ccf1cd68ac17c5bcc27c10dc5fe6f94e3740ae3255d0900aa953816b841e889590a6e2672e4d8e4f4ec7545ac1c569a263516635fb99a129205eac9031edad7cf67290c432a9ce8c55a89318460ef3d84cb1157070319d583cede0fc26c430837126f45e8b14d60f5febec7148cbadcdce22d69ab3766978085d8fab6724366f261c7553031973c9b0f6f86673ab2e709a4c79d7b78c6e8f7b88d6918b68590ffca98cf0a5640fbba65efe0d00867af914e93659f25441dd9308b12e00a911b965e35cb7e24a5dc85e689c52b371f79aa20a67a4c99225948855fa3529099136aee952c626ae1ea64eb9fcb6ba78df5825c5a54d0f15cdd6b5befc580727cfa06098648ad8c865031099656728b647b11b2b27d3e6586671f8b2bb67dee9ed9156ecd6a346fae24219195311c48b6aa10183ce1b5d3e3feff5bd7f9b21cb8b6296d4060de72722ed1f22f4a4e3030207e8f22b8ccfdd1afc732329296fe52839091525f645085e6342c11b2afbce6e4076bee6a45acca55981cb8185216f0c2a903092ca9a6e565cea5af67865d7c8680a0d95984f81997be61db54c3a6f7172d2023d17402023ce1bcb53f8ba65662ce0cb593620a647f30d604f8bcf812e7a8c971a65312d114fcb113afdefbc43ef335e225de55f2b1fc1afb906d43afe5228dec39203e03dff45e2ad72d7b510276145cc59828127ad339e3d965a361853643e456faf244a57bf046317d8c252438e8f9b617a9dd76a327772c6cc85077125900acd8e03a9a12e5e02db93bcb18c1957f155808f53c84096d08715b3253bb6588fc1e022b9275f4c0ab85c7562d2181f61c884e1eddd5068a71f7fe2cbcff8b65bd8a4959add7884ff890f69345f7ab7477bc7d51208b6c32da0498464fee7582514f2e81cf320d525434b8a126f7bf7668e643c9776bb96eb28651253bfda9ad1c7421d0eef237936fb5a2e48bd23e772ad48dd795fbbfcc77abceae8d753d429e54bf6b6a6dff9d298567d4efd9c6332cedb9ba619ad5abda221252b6a0ba9b126765829dc15ba152db203ab999ea2b57a1e7270b8881c7438db30c50dd0ed3672be913ccd0b31ab3e1cd52f2d3d9b9738c3f002dd60703363c0e97bb826ea467eabd86636d2cfca2537c420aa7c8c35d45fb39732f728932be524f360766b1e18049e36a2813c4d8b00f40b4a015ca59ed6aef96fe55ba512e02b16c36a7da93a90eae5fe77b5d0cfd6c793e6fb1f8942300a07938f34ebde72fdfb8b4c505a8e75a9182c210ad5f12cb3256682b573835331d811b1a071460fd6eca84482054db5862ab798af3bce2c681a3cb20627a1a55c1a81124da2a6e0836751d348deb8b5a740bb21d727c3492b2b5f96397983b1f0503772607ff30862a8de2d2e2dcc3c32f89074a4d32279ea8e3577a14100a810d30ff9cb07509c24757d9cdcbaf69b42408b83dc142e9d425ca5d82a2456190584492d5bbc7bbf4b4fbcc55700c965d540cdef9a6d221f04d8af1649482cddd7f728e68cd69f6036164888401f38b59db2dd14a49b6ae1f54b54a543c5a0992b4c6a40bfd2a8c11948708946cb54c32105b87348737dd4326ea45206de24d868541775e97c9c55de38b97705ed1846daac35f192107e9a248a14e23ea6db1ec97158c3f292eba551efdcbe117754a50d58375ebc58cdbc71a905c7a64a892ea2647a2040cfbab0f73812f20ddecb37403a920512d6b20f14e2e1081ac4a68ec7aff77f4f787048ad2a12b7bb4e6b6bcde4710c98a4ca7d1ad224d593bd9109d3a9b32760cc3935cca968d04968841eb6fff7882fc6617ee5e199650f8903d314a2fc874b56d119861ab07a010f6f4dcfac6343fff312f90d48ec1ff725dc650cefee27ac3c8f484b6fe458c86fbf8407b30de2fcb989a20bcfb5eb3ebb3dab25553afa89dc769aa6031c42dbb58331d6f9579becfdef7ef147850c217f8f45c5ff6528a7ab346750ea958f99848afc3e9f27e6400eb4617588b545acda4dcbdd0ca35d84bdf5a38d8400800156aa7a556bf394107d93e0b19cf13864af4e029e7c3e9203ce38f8d235148271e0db7413a0db30f010a58144de33327c4f0fd63ed4cac7f1f049af0ba02f3262a93950a6f4d1015541a4246e14acc72b3ea19d43df95117ddfb3a16ac216a6dae07218338a4163622ef9a150085b6ff7eb0ee1383811452bd5a7e4e636b5e244c73faa14d0c4d3ae0f9ffc44e5b0e9f485c1609e061ec4c3f3fb75a2eb751b4dc4620f5d9d6392fbcfb57ad681e7859ac917cf5816acd9e94d56ad18896c91a5345680ecb0d9160eb77ab8f74bdb466632ce88b61f27b25867bc3aceae0cdd0ceae4648692ee0096c9cb39400000ded7c56261f46685b3bcdf6eeb78be11f664e58fea7dbb2147f8ef9eebeee2294345a1efd6c6bfabb267b93fac2822253804b9736f0856f0860681a36b6777871a6095b943c82b16c4ad8d6584bafd5639209495e98273c65cd7708b6d3a20836dd83dc703c2ffb7c49441e6f6134ad3bd3f7fe4aff67a3d516a4b9b254a6f8abdf0640f147caeaa82321ddff0da62fa694dc3224f1bcb3e231bdee5bcc7c83ecfa6ea56075a0b50134b1f574d26569d6c3760f18e440f13b7688d701548c6c108d8dfcd35b810c4c45f340582233f5131ee1ee7cece4f9fdc9f4bcb3b8eb1ee7b1ba8086b22e838246ddfd001d3a7c6dd55d67f9e34196327a66b61ca82bacd0403e94ff15374ba9b3c251217a82559c84e974969140249816c45817abb2da950b1a290b53fb8b5ab246f8a45ee0a2405f9c8d3c5cf1d5b97b0563731f3ae2e46b793fe386f6e7f97323ae9f455fd06209fea92f7e3ef1256d261eeda0d704302136d5f73f625d14a1acc1319f13aa084c383b71d6eb594c742272198920583376d8d81822b340d4120a3436e5a5ff2fc9dccd823b557de9b92d89e24cf0d9577b95c9a6123e5933014658ef05cf6faa179e03afdfb2b0da655f043c561d31dc8aad9fd356ed92191961c2edbd85e6c9ce94af801c0f97427f358d6558a7eae491cfd002007df94cbb24730b271439432425a531c3ce7bbe7330ddc15e78391bb6216361ea453de261aa1e003b6f7d61bc865f8ad8eb706b56af29fe8988fabf4926666a280c1db33cfc2f29a0327bf4f8507237c6519cfc4629f288191ca518b38c85189e5f7d0b3ff6c9005dfff8c3b319cf784cb5d6e1561fe7329f555dbdee5024b875e68a2cf35414c66981e66a8e7a358dd2f186dca3ab8b802fb1b7ee525b3597ddc1968fb8081d34abab73d87f0e1fd8ad91bba14c2c30eabe5e17a52925710a14ecc1b8b28f75c58222546b50b4e461dd4e9426aa09fd2c810df64d2de41e3fcfcb2efa2e73ce6571035915c478f88f4b0ab2b8cdc3242794b631c5d01f85f75af6b7ca644d349b0b885e7fc0d3f4c1bec4503b0a99703f87aaf133a1d9961ad288cfb07068b5a036b84efc91b54a57a2eb80b47b38bb728c97700affb969bb0bd527b66ea7074c328eac09913793434f2209e7b7e9afd814cf1a2daf78d7345659e3e3ca433a0fb2957a7a761b86686a3491e761e613712c0ad038f24818d4bf885f9ab3b73151c4e4f1e2a752f6c608aa7ea0f14b7bb0794416f174b78589895e5c3913ac4fda60d202178aef879299b37b11851b8b2c7f9e8fef41bef196cf858b3ed4eabb863a8ec021a3d254ef3916023eeed17d269c965285a236ac23d43a6345c37b4b8c403b0632856965e51b2907a31c908d4785c946cffeac912b328bded4b3020a09cd93d60ba29da1b15cc8d070e7fe2f719bd4efca059a8a06f017f75171537885fee74518d1a58965cd9363350f74a51bcd6894d9aa2198914544f49a164e26690873614e9f9f4975caa31796fbfc0c5ff42d634dd97139a3c1486eb50c2af4d6fc5e024e4344baaaf2d218572498148877ebb120abe97d60bda816f3817ff64ed0a96c9ccf51d2e1b02ff3b649ddb5caeabfa43b090dcd1ed2265dab9d10752be2f5390f41e6ef5beb165a9263062468e715eab5a4000825f206cebb185e2bd92c785232f901373e4ca676e14ebc2d5adb984cbe81c89acac5c342f582f3a7e6a882f0e10fd7b48f255b0716e14efb6b4e0829689dcaf143b6b1a8cfbb39d538e30991c5de0e754eccfe2d1af0f3fcb867e538ff211397c6ae2e8193006dc3b193f040408efa0c5755943e916b7e8ff983f53472fcefd54930fc9d81a8cdda161f168e695292b0d39c07fdc26d4a65cb1f3a39316e2596946c827d8be4208707e852ad3421ce32f8682183794e7c5a7c71fd91a427e96f9d33c28288cfda484b40c6e842e5e641204c3e5c923c4cf282e650b45c46390ceec6e7e6625d4129e84996c93562ac510c40dc0e15954cf899eb0d12e888292b45a5cefa24e5ad05d6fe618060d12a68625a83ee20a12bcf57d3fcb1548b01e5e6c6ac412a98801de24fcd7ae401789ea375446434410ea4212acf74659895613ded71941ab321296c4d401fa458155d8af721c32deb366644c772e8e374cfa544c4482d0205bc7a37373816dcd175f2c0dcb05d70747d946047f675f2772b2dd081b8d9f21cb70ad0349a27b9dc62d4f062489fba1236056fdf65e67d05e3cdf35f7adcb0d46754335ef535dbcf0fe6f36d4cf3557a039222ecc82cb2ceabd533006f7304dcc6f25963c7067359a14f3d2096f781fd64e615b3d59082747e87866540d872d062a5fb0647af43fb8faed", 0xf60}, {&(0x7f0000002100)="fbb41082248d85df2c574dda68ba21b085ae3f76ef869712bc47b8b228af18c95cdb4c12fbc2887e466ff66c68511fedff3c34dc536132d08abbccaf32ac73ef0ee736cb0865e9849f3632eea8029be18905fd77b053c324ee3253552238e631345bd362dc5354f890d7992241b5a0f6a62f2e55", 0x74}], 0x2}, 0x0) 17:04:44 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0x100, &(0x7f00000000c0), &(0x7f0000000000)=0xb8) [ 1279.449867] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1279.449867] 17:04:44 executing program 3: r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x1}, 0x1c, &(0x7f0000000040)=[{&(0x7f0000001100)="196e9c920ebd43e2ee2b2cba7b21d4a3d38ba5a16e406b3b3e9803f40c523ff5deb986d20ed5a076ac87ba1edc876eb3087f9234eea48e55ac5ba307a972532490db6ba50f7c089bb7573eeb4c262242178348913e4b4fa22d35d875b38c3ffa5ac418464ccf34ff152241ace80df1eb9cfe600f78d0ae253734f0b783f5136259c35c53612dcf71be7cecd67d74752a3f738adfc85d7fc9df5a8e91fe3b6f6f89de4e6c034f636debda0f933d51e0f32feaec6a77371a3ecfd9e96559e64acbc5212f405ef5d3fe390344db698bf490f6032108123ad68d00bbed0e4cca51ae014b06ee084adf021ea28b6db2525e36067eab4eab3cef3f560289079808b595f514a411b20f6f009059064c186cf32739f610f261a56fb847c60ac6f8f371b5a6b12b894cf60295f852d115596cfcb9fc0aab702ee6cd8096579f1a4630c873e1d5982dc6ea852e4affa8aa0ff24dbfb0fb419083716c9598af26417cc36170f400badff3715298e9b96fa3329ae67823fc7e80071c6cbe53d4fbc5436167f19e6869975f8b50ca2128d9fed3d0ceb0a93000e3e351b9f18cc280a7ff9383302ed83abc0ded7e314cc0bc9add7af83f012d7ce0c1f951506a82878d5a8d3bb82b5e16aadab15a5778a28c06962a97e207bb5a788f8c4f8499a47ba0740c197fc962153589e84fa51a7fba2a74ed2e03fcf0c40f042e66d861645d502a7375dfa5ba1c513bbc65501f2bddc79f8700047fdd4858e5fd7cb73403ef99d115560bf3c5c47be76f574c39c0549646b6888dc177fac6ba6249852bdafec8ccf1cd68ac17c5bcc27c10dc5fe6f94e3740ae3255d0900aa953816b841e889590a6e2672e4d8e4f4ec7545ac1c569a263516635fb99a129205eac9031edad7cf67290c432a9ce8c55a89318460ef3d84cb1157070319d583cede0fc26c430837126f45e8b14d60f5febec7148cbadcdce22d69ab3766978085d8fab6724366f261c7553031973c9b0f6f86673ab2e709a4c79d7b78c6e8f7b88d6918b68590ffca98cf0a5640fbba65efe0d00867af914e93659f25441dd9308b12e00a911b965e35cb7e24a5dc85e689c52b371f79aa20a67a4c99225948855fa3529099136aee952c626ae1ea64eb9fcb6ba78df5825c5a54d0f15cdd6b5befc580727cfa06098648ad8c865031099656728b647b11b2b27d3e6586671f8b2bb67dee9ed9156ecd6a346fae24219195311c48b6aa10183ce1b5d3e3feff5bd7f9b21cb8b6296d4060de72722ed1f22f4a4e3030207e8f22b8ccfdd1afc732329296fe52839091525f645085e6342c11b2afbce6e4076bee6a45acca55981cb8185216f0c2a903092ca9a6e565cea5af67865d7c8680a0d95984f81997be61db54c3a6f7172d2023d17402023ce1bcb53f8ba65662ce0cb593620a647f30d604f8bcf812e7a8c971a65312d114fcb113afdefbc43ef335e225de55f2b1fc1afb906d43afe5228dec39203e03dff45e2ad72d7b510276145cc59828127ad339e3d965a361853643e456faf244a57bf046317d8c252438e8f9b617a9dd76a327772c6cc85077125900acd8e03a9a12e5e02db93bcb18c1957f155808f53c84096d08715b3253bb6588fc1e022b9275f4c0ab85c7562d2181f61c884e1eddd5068a71f7fe2cbcff8b65bd8a4959add7884ff890f69345f7ab7477bc7d51208b6c32da0498464fee7582514f2e81cf320d525434b8a126f7bf7668e643c9776bb96eb28651253bfda9ad1c7421d0eef237936fb5a2e48bd23e772ad48dd795fbbfcc77abceae8d753d429e54bf6b6a6dff9d298567d4efd9c6332cedb9ba619ad5abda221252b6a0ba9b126765829dc15ba152db203ab999ea2b57a1e7270b8881c7438db30c50dd0ed3672be913ccd0b31ab3e1cd52f2d3d9b9738c3f002dd60703363c0e97bb826ea467eabd86636d2cfca2537c420aa7c8c35d45fb39732f728932be524f360766b1e18049e36a2813c4d8b00f40b4a015ca59ed6aef96fe55ba512e02b16c36a7da93a90eae5fe77b5d0cfd6c793e6fb1f8942300a07938f34ebde72fdfb8b4c505a8e75a9182c210ad5f12cb3256682b573835331d811b1a071460fd6eca84482054db5862ab798af3bce2c681a3cb20627a1a55c1a81124da2a6e0836751d348deb8b5a740bb21d727c3492b2b5f96397983b1f0503772607ff30862a8de2d2e2dcc3c32f89074a4d32279ea8e3577a14100a810d30ff9cb07509c24757d9cdcbaf69b42408b83dc142e9d425ca5d82a2456190584492d5bbc7bbf4b4fbcc55700c965d540cdef9a6d221f04d8af1649482cddd7f728e68cd69f6036164888401f38b59db2dd14a49b6ae1f54b54a543c5a0992b4c6a40bfd2a8c11948708946cb54c32105b87348737dd4326ea45206de24d868541775e97c9c55de38b97705ed1846daac35f192107e9a248a14e23ea6db1ec97158c3f292eba551efdcbe117754a50d58375ebc58cdbc71a905c7a64a892ea2647a2040cfbab0f73812f20ddecb37403a920512d6b20f14e2e1081ac4a68ec7aff77f4f787048ad2a12b7bb4e6b6bcde4710c98a4ca7d1ad224d593bd9109d3a9b32760cc3935cca968d04968841eb6fff7882fc6617ee5e199650f8903d314a2fc874b56d119861ab07a010f6f4dcfac6343fff312f90d48ec1ff725dc650cefee27ac3c8f484b6fe458c86fbf8407b30de2fcb989a20bcfb5eb3ebb3dab25553afa89dc769aa6031c42dbb58331d6f9579becfdef7ef147850c217f8f45c5ff6528a7ab346750ea958f99848afc3e9f27e6400eb4617588b545acda4dcbdd0ca35d84bdf5a38d8400800156aa7a556bf394107d93e0b19cf13864af4e029e7c3e9203ce38f8d235148271e0db7413a0db30f010a58144de33327c4f0fd63ed4cac7f1f049af0ba02f3262a93950a6f4d1015541a4246e14acc72b3ea19d43df95117ddfb3a16ac216a6dae07218338a4163622ef9a150085b6ff7eb0ee1383811452bd5a7e4e636b5e244c73faa14d0c4d3ae0f9ffc44e5b0e9f485c1609e061ec4c3f3fb75a2eb751b4dc4620f5d9d6392fbcfb57ad681e7859ac917cf5816acd9e94d56ad18896c91a5345680ecb0d9160eb77ab8f74bdb466632ce88b61f27b25867bc3aceae0cdd0ceae4648692ee0096c9cb39400000ded7c56261f46685b3bcdf6eeb78be11f664e58fea7dbb2147f8ef9eebeee2294345a1efd6c6bfabb267b93fac2822253804b9736f0856f0860681a36b6777871a6095b943c82b16c4ad8d6584bafd5639209495e98273c65cd7708b6d3a20836dd83dc703c2ffb7c49441e6f6134ad3bd3f7fe4aff67a3d516a4b9b254a6f8abdf0640f147caeaa82321ddff0da62fa694dc3224f1bcb3e231bdee5bcc7c83ecfa6ea56075a0b50134b1f574d26569d6c3760f18e440f13b7688d701548c6c108d8dfcd35b810c4c45f340582233f5131ee1ee7cece4f9fdc9f4bcb3b8eb1ee7b1ba8086b22e838246ddfd001d3a7c6dd55d67f9e34196327a66b61ca82bacd0403e94ff15374ba9b3c251217a82559c84e974969140249816c45817abb2da950b1a290b53fb8b5ab246f8a45ee0a2405f9c8d3c5cf1d5b97b0563731f3ae2e46b793fe386f6e7f97323ae9f455fd06209fea92f7e3ef1256d261eeda0d704302136d5f73f625d14a1acc1319f13aa084c383b71d6eb594c742272198920583376d8d81822b340d4120a3436e5a5ff2fc9dccd823b557de9b92d89e24cf0d9577b95c9a6123e5933014658ef05cf6faa179e03afdfb2b0da655f043c561d31dc8aad9fd356ed92191961c2edbd85e6c9ce94af801c0f97427f358d6558a7eae491cfd002007df94cbb24730b271439432425a531c3ce7bbe7330ddc15e78391bb6216361ea453de261aa1e003b6f7d61bc865f8ad8eb706b56af29fe8988fabf4926666a280c1db33cfc2f29a0327bf4f8507237c6519cfc4629f288191ca518b38c85189e5f7d0b3ff6c9005dfff8c3b319cf784cb5d6e1561fe7329f555dbdee5024b875e68a2cf35414c66981e66a8e7a358dd2f186dca3ab8b802fb1b7ee525b3597ddc1968fb8081d34abab73d87f0e1fd8ad91bba14c2c30eabe5e17a52925710a14ecc1b8b28f75c58222546b50b4e461dd4e9426aa09fd2c810df64d2de41e3fcfcb2efa2e73ce6571035915c478f88f4b0ab2b8cdc3242794b631c5d01f85f75af6b7ca644d349b0b885e7fc0d3f4c1bec4503b0a99703f87aaf133a1d9961ad288cfb07068b5a036b84efc91b54a57a2eb80b47b38bb728c97700affb969bb0bd527b66ea7074c328eac09913793434f2209e7b7e9afd814cf1a2daf78d7345659e3e3ca433a0fb2957a7a761b86686a3491e761e613712c0ad038f24818d4bf885f9ab3b73151c4e4f1e2a752f6c608aa7ea0f14b7bb0794416f174b78589895e5c3913ac4fda60d202178aef879299b37b11851b8b2c7f9e8fef41bef196cf858b3ed4eabb863a8ec021a3d254ef3916023eeed17d269c965285a236ac23d43a6345c37b4b8c403b0632856965e51b2907a31c908d4785c946cffeac912b328bded4b3020a09cd93d60ba29da1b15cc8d070e7fe2f719bd4efca059a8a06f017f75171537885fee74518d1a58965cd9363350f74a51bcd6894d9aa2198914544f49a164e26690873614e9f9f4975caa31796fbfc0c5ff42d634dd97139a3c1486eb50c2af4d6fc5e024e4344baaaf2d218572498148877ebb120abe97d60bda816f3817ff64ed0a96c9ccf51d2e1b02ff3b649ddb5caeabfa43b090dcd1ed2265dab9d10752be2f5390f41e6ef5beb165a9263062468e715eab5a4000825f206cebb185e2bd92c785232f901373e4ca676e14ebc2d5adb984cbe81c89acac5c342f582f3a7e6a882f0e10fd7b48f255b0716e14efb6b4e0829689dcaf143b6b1a8cfbb39d538e30991c5de0e754eccfe2d1af0f3fcb867e538ff211397c6ae2e8193006dc3b193f040408efa0c5755943e916b7e8ff983f53472fcefd54930fc9d81a8cdda161f168e695292b0d39c07fdc26d4a65cb1f3a39316e2596946c827d8be4208707e852ad3421ce32f8682183794e7c5a7c71fd91a427e96f9d33c28288cfda484b40c6e842e5e641204c3e5c923c4cf282e650b45c46390ceec6e7e6625d4129e84996c93562ac510c40dc0e15954cf899eb0d12e888292b45a5cefa24e5ad05d6fe618060d12a68625a83ee20a12bcf57d3fcb1548b01e5e6c6ac412a98801de24fcd7ae401789ea375446434410ea4212acf74659895613ded71941ab321296c4d401fa458155d8af721c32deb366644c772e8e374cfa544c4482d0205bc7a37373816dcd175f2c0dcb05d70747d946047f675f2772b2dd081b8d9f21cb70ad0349a27b9dc62d4f062489fba1236056fdf65e67d05e3cdf35f7adcb0d46754335ef535dbcf0fe6f36d4cf3557a039222ecc82cb2ceabd533006f7304dcc6f25963c7067359a14f3d2096f781fd64e615b3d59082747e87866540d872d062a5f", 0xf58}, {&(0x7f0000002100)="fbb41082248d85df2c574dda68ba21b085ae3f76ef869712bc47b8b228af18c95cdb4c12fbc2887e466ff66c68511fedff3c34dc536132d08abbccaf32ac73ef0ee736cb0865e9849f3632eea8029be18905fd77b053c324ee3253552238e631345bd362", 0x64}], 0x2}, 0x0) 17:04:44 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x80000000e) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) pipe2(&(0x7f0000000000), 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = fanotify_init(0x0, 0x0) ioctl$BTRFS_IOC_GET_DEV_STATS(r0, 0xc4089434, 0x0) open$dir(0x0, 0x0, 0x0) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) 17:04:44 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) chdir(&(0x7f0000000100)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$9p_unix(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0) 17:04:44 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r2, r1) [ 1279.633977] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1279.633977] 17:04:45 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000400)={&(0x7f0000000000)={0xa, 0x4e22, 0x0, @dev}, 0x1c, &(0x7f0000000340)=[{&(0x7f0000000040)='h', 0x1}, {0x0}, {&(0x7f0000000200)='?', 0x1}, {&(0x7f0000000300)='S', 0x1}], 0x4}, 0x0) 17:04:45 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4643201000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:45 executing program 1: socketpair(0x11, 0xa, 0xba78, &(0x7f0000005400)) 17:04:45 executing program 2: perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x3, 0x2) socket$kcm(0x29, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'wg1\x00', @multicast}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x71f, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x3, 0x2) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000140)={'wg1\x00', @dev}) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x40010) 17:04:45 executing program 3: perf_event_open(&(0x7f0000000040)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:04:45 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00', 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r1, 0x1, 0x0, 0x0, {0x14}}, 0x14}}, 0x0) 17:04:45 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg(r0, &(0x7f00000015c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x1140}, 0x0) [ 1279.967934] overlayfs: failed to resolve 'file0c`2 ã': -2 17:04:45 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r2, 0x0) 17:04:45 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080)='ethtool\x00', 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_EEE_GET(r0, &(0x7f0000006f00)={0x0, 0x0, &(0x7f0000006ec0)={&(0x7f0000006e80)={0x18, r1, 0x711, 0x0, 0x0, {0x11}, [@HEADER={0x4}]}, 0x18}}, 0x0) [ 1280.070812] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1280.070812] 17:04:45 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x8, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, 0x0) 17:04:45 executing program 3: pipe2(&(0x7f0000013780)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0xc0189436, &(0x7f0000000000)={'wlan1\x00'}) 17:04:45 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00', r0) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x14}, 0x33fe0}}, 0x0) 17:04:45 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8993, &(0x7f0000000240)={'sit0\x00'}) [ 1280.264648] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1280.264648] 17:04:45 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4643301000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:45 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) flistxattr(r2, 0x0, 0x0) 17:04:45 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8947, &(0x7f0000000240)={'sit0\x00'}) 17:04:45 executing program 0: sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x9) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x0, 0x0) 17:04:45 executing program 3: sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x9) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) close(r0) 17:04:45 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00', 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x2c, r1, 0x1, 0x0, 0x0, {0x5}, [@ETHTOOL_A_PAUSE_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x5, 'lo\x00'}]}]}, 0x2c}}, 0x0) 17:04:45 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x14}, 0x20000114}}, 0x0) 17:04:45 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_buf(r1, 0x1, 0x1f, &(0x7f0000000240)=""/4096, &(0x7f0000000080)=0x1000) 17:04:45 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8901, &(0x7f0000000240)={'sit0\x00'}) [ 1280.691451] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1280.691451] 17:04:45 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udp6\x00') r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) preadv(r1, &(0x7f00000014c0)=[{&(0x7f0000000200)=""/237, 0xed}], 0x1, 0x4, 0x0) 17:04:46 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:04:46 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8930, &(0x7f0000000240)={'sit0\x00'}) [ 1280.903894] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1280.903894] 17:04:46 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4643401000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:46 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x0, 0x0) socket(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000064c0)='ext3\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 17:04:46 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080)='ethtool\x00', 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_EEE_GET(r0, &(0x7f0000006f00)={0x0, 0x0, &(0x7f0000006ec0)={&(0x7f0000006e80)={0x14, r1, 0x711}, 0x14}}, 0x0) [ 1281.137600] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1281.137600] [ 1281.222151] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1281.222151] 17:04:46 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00', r0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080)='ethtool\x00', 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_EEE_GET(r0, &(0x7f0000006f00)={0x0, 0x0, &(0x7f0000006ec0)={&(0x7f0000006e80)={0x20, r1, 0x711, 0x0, 0x0, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x20}}, 0x0) 17:04:46 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/snmp6\x00') preadv(r0, &(0x7f0000000140)=[{&(0x7f0000000280)=""/64, 0x40}], 0x1, 0x0, 0x0) 17:04:46 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080)='ethtool\x00', 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB="10000000", @ANYRES16=r1, @ANYBLOB="01"], 0x1c}}, 0x0) 17:04:46 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x14}, 0x33fe0}}, 0x0) 17:04:46 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4643501000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:46 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r2, 0x0) 17:04:46 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16, @ANYBLOB="01"], 0x1c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00', r0) syz_genetlink_get_family_id$fou(&(0x7f00000003c0)='fou\x00', r0) [ 1281.677996] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1281.677996] 17:04:47 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x541b, 0x0) 17:04:47 executing program 0: perf_event_open(&(0x7f0000000040)={0x7, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1281.818533] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1281.818533] 17:04:47 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00', 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x18, r1, 0x1, 0x0, 0x0, {0x5}, [@ETHTOOL_A_PAUSE_HEADER={0x4}]}, 0x18}}, 0x0) 17:04:47 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00', r0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[], 0x33fe0}}, 0x0) 17:04:47 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4643601000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:47 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00', 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r1, 0x1, 0x0, 0x0, {0xe}}, 0x14}}, 0x0) 17:04:47 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080)='ethtool\x00', 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0100000000000000000001"], 0x1c}}, 0x0) 17:04:47 executing program 1: perf_event_open(&(0x7f0000000040)={0x8, 0xd8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x200000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:04:47 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00', 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$ETHTOOL_MSG_PAUSE_SET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x34, r1, 0x1, 0x0, 0x0, {0x3}, [@ETHTOOL_A_PAUSE_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}]}, 0x34}}, 0x0) 17:04:47 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'sit0\x00'}) [ 1282.227964] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1282.227964] 17:04:47 executing program 3: sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5}]}, 0x1c}}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080)='ethtool\x00', 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0100000000000000000001"], 0x1c}}, 0x0) 17:04:47 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8991, &(0x7f0000000240)={'sit0\x00'}) 17:04:47 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x891e, &(0x7f0000000240)={'sit0\x00'}) 17:04:47 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='environ\x00') set_mempolicy(0x3, &(0x7f0000000040)=0x3, 0x5) read$usbmon(r0, 0x0, 0x0) [ 1282.393781] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1282.393781] 17:04:47 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x78, 0x45, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080)='ethtool\x00', 0xffffffffffffffff) 17:04:47 executing program 0: perf_event_open(&(0x7f0000000040)={0x8, 0xd8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:04:47 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4643701000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:47 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00', 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x2c, r1, 0x1, 0x0, 0x0, {0x5}, [@ETHTOOL_A_PAUSE_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x3, 'lo\x00'}]}]}, 0x2c}}, 0x0) 17:04:47 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080)='ethtool\x00', 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x14, r1, 0x1}, 0x14}}, 0x0) 17:04:47 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080)='ethtool\x00', 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_EEE_GET(r0, &(0x7f0000006f00)={0x0, 0x0, &(0x7f0000006ec0)={&(0x7f0000006e80)={0x18, r1, 0x711, 0x0, 0x0, {0x15}, [@HEADER={0x4}]}, 0x18}}, 0x0) 17:04:47 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x541b, &(0x7f0000000240)={'sit0\x00'}) 17:04:48 executing program 3: perf_event_open(&(0x7f0000000040)={0x8, 0xd8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:04:48 executing program 0: perf_event_open(&(0x7f0000000040)={0x8, 0xd8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1282.805377] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1282.805377] 17:04:48 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETSW2(r0, 0x4b44, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "3045f71cd57267bc70ae6dc540e7ac185c28e1"}) 17:04:48 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='mounts\x00') preadv(r0, &(0x7f0000000140)=[{&(0x7f0000000280)=""/64, 0x40}], 0x1, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, &(0x7f0000000280)) 17:04:48 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1c"], 0x33fe0}}, 0x0) 17:04:48 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:04:48 executing program 3: ioperm(0x0, 0x100, 0x7) [ 1282.979956] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1282.979956] 17:04:48 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4643801000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:48 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080)='ethtool\x00', 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_EEE_GET(r0, &(0x7f0000006f00)={0x0, 0x0, &(0x7f0000006ec0)={&(0x7f0000006e80)={0x18, r1, 0x711, 0x0, 0x0, {}, [@HEADER={0x4, 0x8}]}, 0x18}}, 0x0) 17:04:48 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00', 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x2c, r1, 0x1, 0x0, 0x0, {0x2}, [@ETHTOOL_A_PAUSE_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}]}]}, 0x2c}}, 0x0) 17:04:48 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8942, &(0x7f0000000240)={'sit0\x00'}) 17:04:48 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x12, r0, 0x0) 17:04:48 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0xd8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:04:48 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080)='ethtool\x00', 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_EEE_GET(r0, &(0x7f0000006f00)={0x0, 0x0, &(0x7f0000006ec0)={&(0x7f0000006e80)={0x18, r1, 0x711, 0x0, 0x0, {}, [@HEADER={0x10}]}, 0x18}}, 0x0) 17:04:48 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000012c0)='./file0\x00', &(0x7f0000001300)='sysfs\x00', 0x0, 0x0) umount2(&(0x7f0000000100)='./file0\x00', 0x0) [ 1283.380916] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1283.380916] 17:04:48 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x4020940d, &(0x7f0000000240)={'sit0\x00'}) 17:04:48 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00', 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$ETHTOOL_MSG_PAUSE_SET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x20, r1, 0x1, 0x0, 0x0, {0x5}, [@ETHTOOL_A_PAUSE_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}]}, 0x20}}, 0x0) 17:04:48 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080)='ethtool\x00', 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0100000000000000000003"], 0x1c}}, 0x0) 17:04:48 executing program 5: prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7fff) [ 1283.525461] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1283.525461] 17:04:48 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4643901000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:48 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080)='ethtool\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$ETHTOOL_MSG_EEE_GET(r0, &(0x7f0000006f00)={0x0, 0x0, &(0x7f0000006ec0)={&(0x7f0000000040)={0x20, r1, 0x711, 0x0, 0x0, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0x20}}, 0x0) 17:04:48 executing program 3: r0 = syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x0) 17:04:49 executing program 3: syz_open_dev$evdev(&(0x7f0000001680)='/dev/input/event#\x00', 0x0, 0x0) [ 1283.737973] block nbd3: NBD_DISCONNECT [ 1283.744905] block nbd3: NBD_DISCONNECT 17:04:49 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000001680)='/dev/input/event#\x00', 0x0, 0x1389bc61f9265acf) ioctl$EVIOCSREP(r0, 0x40084503, 0x0) 17:04:49 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000001680)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSREP(r0, 0x40084503, 0x0) 17:04:49 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000001680)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGNAME(r0, 0x80404506, 0x0) 17:04:49 executing program 2: syz_open_dev$evdev(&(0x7f0000001680)='/dev/input/event#\x00', 0x0, 0x80000) 17:04:49 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$sock_int(r0, 0xffff, 0x200, &(0x7f0000000000), 0x102) 17:04:49 executing program 1: mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mprotect(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0) munlock(&(0x7f0000fff000/0x1000)=nil, 0x1000) [ 1283.999304] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1283.999304] 17:04:49 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000780)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$unix(r0, &(0x7f00000007c0)=""/102395, 0x18ffb, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/227, 0xe3}], 0x1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r2, &(0x7f0000019980)=[{&(0x7f0000019a40)=""/254, 0xfe}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0xccf3, 0x0, 0x0, 0x800e00595) shutdown(r2, 0x0) r4 = socket$inet6_sctp(0x1c, 0x1, 0x84) connect$inet6(r4, &(0x7f0000000000)={0x1c, 0x1c}, 0x1c) shutdown(r3, 0x0) 17:04:49 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) [ 1284.150542] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1284.150542] 17:04:49 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4643a01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0}, 0x0) 17:04:49 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x14, &(0x7f00000000c0)={0x1, [0x0]}, 0x6) 17:04:49 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) connect$inet(r0, &(0x7f0000000000)={0xfffffffffffffd91, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000180)={0x0, @in, 0x0, 0x0, 0x204}, 0xa0) 17:04:49 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_mreqn(r0, 0x0, 0x9, 0x0, &(0x7f00000000c0)) 17:04:49 executing program 3: getresuid(&(0x7f0000002800), &(0x7f0000002840), 0x0) 17:04:49 executing program 3: mlock(&(0x7f0000ff2000/0x1000)=nil, 0x1000) mlock(&(0x7f0000ffa000/0x4000)=nil, 0x4000) munlock(&(0x7f0000fed000/0x12000)=nil, 0x12000) 17:04:49 executing program 2: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000080)={0x1c, 0x1c}, 0x1c) 17:04:49 executing program 1: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x53, &(0x7f00000000c0)={0x0, {{0x1c, 0x1c, 0x1}}, {{0x1c, 0x1c}}}, 0x108) 17:04:49 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvfrom$unix(r0, &(0x7f00000000c0)=""/250, 0xfa, 0x40080, 0x0, 0x0) [ 1284.438818] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1284.438818] [ 1284.567890] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1284.567890] 17:04:50 executing program 5: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 17:04:50 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000100)={0x1c, 0x1c, 0x3}, 0x1c) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) sendto$inet6(r2, &(0x7f0000001280)='2', 0x1, 0x0, &(0x7f0000001300)={0x1c, 0x1c, 0x3}, 0x1c) 17:04:50 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4643b01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:50 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg(r0, &(0x7f0000000940)={&(0x7f0000000140)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, 0x0, 0x640}, 0x2018d) 17:04:50 executing program 2: pipe2(&(0x7f0000000280)={0xffffffffffffffff}, 0x0) fcntl$lock(r0, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) 17:04:50 executing program 2: r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) shmat(r0, &(0x7f0000ffe000/0x1000)=nil, 0x1000) mincore(&(0x7f0000ff9000/0x7000)=nil, 0x7000, &(0x7f0000000000)=""/17) [ 1285.303161] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1285.303161] 17:04:50 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0xa15cd4cff0dbd27b, 0x0) 17:04:50 executing program 5: utimensat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f0000000880)='./file1\x00', 0x0, 0x0) 17:04:50 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f00000001c0)={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x108, &(0x7f0000000180)={0x0, 0x0, 0xb}, &(0x7f0000000240)=0x18) 17:04:50 executing program 3: mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x5) 17:04:50 executing program 0: getpeername$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000040)) [ 1285.450335] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1285.450335] 17:04:50 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) bind(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="0a012e2f66636c6534"], 0xa) 17:04:50 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000001680)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGNAME(r0, 0x80404506, &(0x7f00000016c0)=""/93) 17:04:50 executing program 5: r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) shmat(r0, &(0x7f0000ffe000/0x1000)=nil, 0x1000) r1 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) shmat(r1, &(0x7f0000ffe000/0x1000)=nil, 0x1000) shmdt(0x0) 17:04:50 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4643c01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:50 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$sock_int(r0, 0xffff, 0x1014, &(0x7f0000000180)=0x9b, 0x4) 17:04:50 executing program 3: mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) mprotect(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) 17:04:50 executing program 0: r0 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x52, &(0x7f0000000100)={0x71c8743d, {{0x1c, 0x1c, 0x2}}, {{0x1c, 0x1c, 0x3}}}, 0x129) 17:04:50 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000002700)) 17:04:50 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) sendmsg(r0, &(0x7f0000000800)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x3}, 0x1c, 0x0, 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x1d8}, 0x0) 17:04:50 executing program 5: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x54, &(0x7f00000000c0)={0x0, {{0x1c, 0x1c, 0x1}}, {{0x1c, 0x1c}}}, 0x108) 17:04:50 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) 17:04:50 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xe, &(0x7f0000000140), 0x8) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) connect$inet(r0, &(0x7f0000000000)={0xfffffffffffffd91, 0x2}, 0x10) sendmsg(r0, &(0x7f00000015c0)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000240)="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", 0x125}], 0x1}, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000180)={0x0, @in, 0x44}, 0xa0) [ 1285.734261] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1285.734261] 17:04:51 executing program 3: utimensat(0xffffffffffffff9c, 0x0, &(0x7f0000000140)={{0x0, 0x7fffffff}}, 0x0) 17:04:51 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4643d01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:51 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000180)={0x0, @in, 0x0, 0xffff, 0x210}, 0x98) 17:04:51 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) sendmsg(r0, &(0x7f0000001e80)={&(0x7f0000000b40)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) 17:04:51 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) setsockopt$sock_int(r0, 0xffff, 0x1015, &(0x7f0000001080), 0x4) 17:04:51 executing program 0: mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x7, 0x410, 0xffffffffffffffff, 0x0) 17:04:51 executing program 3: mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) mincore(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) fork() mlock(&(0x7f0000ff9000/0x7000)=nil, 0x7000) 17:04:51 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_buf(r0, 0x29, 0x33, &(0x7f0000000300)="7119d367", 0x4) 17:04:51 executing program 3: socket$unix(0x1, 0x2, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000080)}], 0x1, &(0x7f0000000580)=[@rights, @cred, @rights, @rights, @cred, @rights, @rights], 0xe8, 0x80}, 0x20008) [ 1286.043211] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1286.043211] 17:04:51 executing program 0: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 17:04:51 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000100)={0x1c, 0x1c, 0x2}, 0x1c) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000080)={0x3}, 0x4) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x23, &(0x7f0000000000), 0xfe6a) 17:04:51 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendto$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1286.144478] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1286.144478] 17:04:51 executing program 1: socketpair(0x0, 0x0, 0x9, 0x0) 17:04:51 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4643e01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:51 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg(r0, &(0x7f0000000640)={0x0, 0x0, 0x0}, 0x0) 17:04:51 executing program 0: mlock(&(0x7f0000ffc000/0x2000)=nil, 0x2000) fork() 17:04:51 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f00000000c0), &(0x7f0000000040)=0x8) 17:04:51 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000780)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$unix(r0, &(0x7f00000007c0)=""/102395, 0x18ffb, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/227, 0xe3}], 0x1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r2, &(0x7f0000019980)=[{&(0x7f0000019a40)=""/254, 0xfe}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x6) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0xccf3, 0x0, 0x0, 0x800e00595) shutdown(r2, 0x0) r4 = socket$inet6_sctp(0x1c, 0x1, 0x84) connect$inet6(r4, &(0x7f0000000000)={0x1c, 0x1c}, 0x1c) shutdown(r3, 0x0) 17:04:51 executing program 3: r0 = socket$inet6_udp(0x1c, 0x2, 0x0) accept4$inet6(r0, 0x0, 0x0, 0x0) 17:04:51 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000780)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$unix(r0, &(0x7f00000007c0)=""/102395, 0x18ffb, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/227, 0xe3}], 0x1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r2, &(0x7f0000019980)=[{&(0x7f0000019a40)=""/254, 0xfe}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x7) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0xccf3, 0x0, 0x0, 0x800e00595) shutdown(r2, 0x0) r4 = socket$inet6_sctp(0x1c, 0x1, 0x84) connect$inet6(r4, &(0x7f0000000000)={0x1c, 0x1c}, 0x1c) shutdown(r3, 0x0) 17:04:51 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) sendmsg(r0, &(0x7f00000005c0)={&(0x7f0000000000)=@in6={0x1c, 0x1c}, 0x1c, &(0x7f00000000c0)=[{&(0x7f0000000040)="87", 0x1}], 0x1}, 0x0) 17:04:51 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="0a012e6f"], 0xa) [ 1286.506166] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1286.506166] 17:04:51 executing program 0: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x8, &(0x7f0000000000)=0x9, 0x4) 17:04:51 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_buf(r0, 0x29, 0x33, 0x0, &(0x7f0000000100)) 17:04:51 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r1, &(0x7f0000000200)={0x10, 0x2}, 0x10) bind$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) [ 1286.606614] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1286.606614] 17:04:51 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4644101000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000040)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) 17:04:52 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r1, &(0x7f0000000200)={0x10, 0x2}, 0x10) bind$inet(r0, &(0x7f0000000200)={0x10, 0x2}, 0x10) 17:04:52 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) listen(r0, 0x0) shutdown(r0, 0x1) [ 1286.835184] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1286.835184] [ 1286.913527] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1286.913527] 17:04:52 executing program 5: getsockname$inet(0xffffffffffffffff, 0x0, &(0x7f0000000240)) pipe2(&(0x7f0000000080), 0x0) 17:04:52 executing program 0: mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x2000010, 0xffffffffffffffff, 0x0) 17:04:52 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f00000001c0)={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x108, &(0x7f0000000180)={0x0, 0x0, 0xf}, &(0x7f0000000240)=0x18) 17:04:52 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4644201000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:52 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000001900)={&(0x7f0000001280)=@un=@file={0xa}, 0xa, 0x0, 0x0, &(0x7f0000001800)}, 0x0) 17:04:52 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) shutdown(r0, 0x0) 17:04:52 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r0, &(0x7f0000000a80)={&(0x7f0000000480)=@file={0xa}, 0xa, &(0x7f00000007c0)=[{0x0}, {&(0x7f0000000500)="80", 0x1}], 0x2}, 0x0) 17:04:52 executing program 3: pipe2(&(0x7f0000000280), 0x0) getsockname$inet(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000080)=0x2e) [ 1287.657546] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1287.657546] 17:04:52 executing program 1: r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) setsockopt$inet6_group_source_req(r0, 0x29, 0x52, &(0x7f0000000000)={0x5, {{0x1c, 0x1c}}, {{0x1c, 0x1c, 0x1}}}, 0x108) 17:04:52 executing program 2: lchown(0x0, 0x0, 0xffffffffffffffff) 17:04:52 executing program 3: clock_gettime(0xf, &(0x7f0000000000)) 17:04:52 executing program 0: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0) 17:04:52 executing program 5: mprotect(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) 17:04:53 executing program 3: r0 = socket$inet6_udp(0x1c, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x1}, 0x1c) [ 1287.815798] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1287.815798] 17:04:53 executing program 5: r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) shmat(r0, &(0x7f0000ffe000/0x1000)=nil, 0x1000) mprotect(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x5) sigaltstack(&(0x7f0000ffd000/0x1000)=nil, 0x0) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000040)=0x8001, 0x4) r1 = shmget(0x1, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmat(r1, &(0x7f0000ffb000/0x2000)=nil, 0x1000) 17:04:53 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4644301000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:53 executing program 3: r0 = shmget(0x1, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) shmat(r0, &(0x7f0000ffc000/0x3000)=nil, 0x3000) 17:04:53 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) lseek(r0, 0x0, 0x2) 17:04:53 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)=[{0xb0, 0x0, 0x0, "a77d46120babf1e4271486ba5a51b5cb84f4bd1c049b9821f9fe8b36da0b55622ee36c28486fd6f83ea9f4cc64e95c2f1fb42ab81838a3ca27a3c4edd0e74f8389a856e645ff1ea0ffa7bb7fc14be91864db83d24c997fa7edafea12bd98ad55822d19f344de2acab23f8697509822ca58d62e32788979694779057cd55b80409280df0bf4f6ce04e4956a7c8eb0061665a711ea2e32b933e8"}], 0xb0}, 0x0) 17:04:53 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x4, &(0x7f0000000080), 0x4) 17:04:53 executing program 0: r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) shmat(r0, &(0x7f0000ffe000/0x1000)=nil, 0x1000) r1 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) r2 = shmat(r1, &(0x7f0000ffe000/0x1000)=nil, 0x1000) shmdt(r2) shmdt(r2) 17:04:53 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) 17:04:53 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) setsockopt$sock_int(r0, 0xffff, 0x10000, 0x0, 0x0) 17:04:53 executing program 1: accept$inet6(0xffffffffffffff9c, 0x0, &(0x7f0000000080)) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) mlock(&(0x7f000068b000/0x1000)=nil, 0x1000) [ 1288.080342] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1288.080342] 17:04:53 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$sock_int(r0, 0xffff, 0x1004, &(0x7f0000000040)=0x4, 0x4) 17:04:53 executing program 0: getresuid(0x0, &(0x7f0000002840), &(0x7f0000002880)) 17:04:53 executing program 3: r0 = socket(0x26, 0x5, 0x0) getsockopt$sock_buf(r0, 0x1, 0x12, 0x0, &(0x7f0000000140)) [ 1288.216478] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1288.216478] 17:04:53 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4644401000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:53 executing program 5: statx(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0) 17:04:53 executing program 3: creat(&(0x7f0000000340)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@loop={'/dev/loop', 0x0}, &(0x7f0000000000)='./file0\x00', 0x0, 0x851400, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) 17:04:53 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x200000000000024a, &(0x7f00000000c0)}) 17:04:53 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/timer_list\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000002340)={0x2020}, 0x2020) read$FUSE(r0, &(0x7f0000000300)={0x2020}, 0x2020) 17:04:53 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)=@ipv4_newroute={0x24, 0x18, 0x1, 0x0, 0x0, {}, [@RTA_DST={0x8, 0x1, @empty}]}, 0x24}}, 0x0) 17:04:53 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000180)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@deltfilter={0x24, 0x2d, 0x301, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0x0, 0xa}, {0x0, 0xa}}}, 0x24}}, 0x0) 17:04:53 executing program 3: mknodat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0xc000, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) 17:04:53 executing program 5: creat(&(0x7f0000000340)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[@ANYBLOB='/dev/loop0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x851400, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10c4020, 0x0) 17:04:53 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) connect(r0, &(0x7f0000000f00)=@ethernet={0x306, @dev}, 0x80) [ 1288.486356] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1288.486356] 17:04:53 executing program 3: r0 = epoll_create(0x6) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/slabinfo\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000340)) 17:04:53 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/timer_list\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000300)={0x2020}, 0x2020) read$FUSE(r0, &(0x7f0000002340)={0x2020}, 0x2020) read$FUSE(r0, &(0x7f00000063c0)={0x2020}, 0x2020) [ 1288.637738] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1288.637738] 17:04:53 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4644501000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:53 executing program 0: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x200202, 0x0) pselect6(0x40, &(0x7f0000000080)={0x9}, 0x0, 0x0, 0x0, 0x0) 17:04:53 executing program 5: getgid() socketpair(0x26, 0x0, 0x0, 0x0) 17:04:53 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x181240, 0x0) setxattr$security_ima(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.ima\x00', 0x0, 0x0, 0x0) 17:04:53 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10, &(0x7f00000000c0)=[{&(0x7f0000000040)="d1", 0x1}], 0x1}, 0x8d0) 17:04:54 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/timer_list\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000300)={0x2020}, 0x2020) read$FUSE(r0, &(0x7f0000002340)={0x2020}, 0x2020) read$FUSE(r0, &(0x7f00000063c0)={0x2020}, 0x2020) 17:04:54 executing program 3: syz_open_dev$loop(&(0x7f0000001900)='/dev/loop#\x00', 0x0, 0x10000) 17:04:54 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@ipv4_newroute={0x24, 0x18, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, [@RTA_GATEWAY={0x8, 0x5, @private=0xa010102}]}, 0x24}}, 0x0) 17:04:54 executing program 0: open$dir(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1000, 0x0) open$dir(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) 17:04:54 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x181240, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000280)={{}, {}, [{}]}, 0x2c, 0x0) [ 1288.858806] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1288.858806] 17:04:54 executing program 5: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') setns(r0, 0x0) 17:04:54 executing program 3: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2, 0x0, 0x81a2) [ 1288.987298] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1288.987298] 17:04:54 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4644601000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:54 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000001a0001fe1f17004b8ce6848f49274f746e091708a7e9"], 0x24}}, 0x0) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 17:04:54 executing program 5: clock_gettime(0x0, &(0x7f0000001980)) 17:04:54 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/timer_list\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000300)={0x2020}, 0x2020) read$FUSE(r0, &(0x7f0000002340)={0x2020}, 0x2020) read$FUSE(r0, &(0x7f00000063c0)={0x2020}, 0x2020) 17:04:54 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=@ipv4_newroute={0x24, 0x18, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, [@RTA_METRICS={0x8, 0x8, 0x0, 0x1, "15096c55"}]}, 0x24}}, 0x0) 17:04:54 executing program 0: sendmsg$BATADV_CMD_SET_MESH(0xffffffffffffffff, 0x0, 0xdddb5b7e8c9cd906) 17:04:54 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000180)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@newlink={0x20, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r2, 0x0, 0x200}}, 0x20}}, 0x0) 17:04:54 executing program 5: clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpid() rt_tgsigqueueinfo(r1, r0, 0x15, &(0x7f00000000c0)) ptrace(0x10, r1) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r2, 0x0) ptrace$getregset(0x4204, r1, 0x0, 0x0) [ 1289.201812] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1289.201812] 17:04:54 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@ipv6_delroute={0x24, 0x19, 0x1, 0x0, 0x0, {0xa, 0x80}, [@RTA_PRIORITY={0x8, 0x6, 0x10001}]}, 0x24}, 0x1, 0x0, 0x0, 0x2004c001}, 0x8000) 17:04:54 executing program 3: open$dir(&(0x7f0000000000)='./file0\x00', 0x92040, 0x0) mount$fuseblk(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0xd001, 0x0) open$dir(0x0, 0x0, 0x0) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='fuseblk\x00', 0x4001, 0x0) 17:04:54 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=@getlink={0x20, 0x12, 0x1}, 0x20}}, 0x0) 17:04:54 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/timer_list\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000300)={0x2020}, 0x2020) read$FUSE(r0, &(0x7f0000002340)={0x2020}, 0x2020) read$FUSE(r0, &(0x7f00000063c0)={0x2020}, 0x2020) [ 1289.334698] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1289.334698] 17:04:54 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4644701000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:54 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x3a0, 0xffffffff, 0xf0, 0x0, 0x0, 0xffffffff, 0xffffffff, 0x2d0, 0x2d0, 0x2d0, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xa8, 0xf0}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 'caif0\x00'}}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4, [], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe}}}, {{@ipv6={@private0, @mcast2, [], [], 'bridge_slave_0\x00', 'ip6gre0\x00'}, 0x0, 0xa8, 0xd8}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x0, 0x3}}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x400) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e22, 0x1, @dev}, 0x1c) 17:04:54 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x181240, 0x0) lgetxattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)=@known='trusted.overlay.redirect\x00', &(0x7f0000000440)=""/147, 0x93) 17:04:54 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000180)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@newlink={0x20, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r2, 0x8200}}, 0x20}}, 0x0) [ 1289.515096] x_tables: duplicate underflow at hook 2 17:04:54 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)=@ipv6_newroute={0x2c, 0x18, 0x1, 0x0, 0x0, {}, [@RTA_METRICS={0x4}, @RTA_ENCAP={0xc, 0x16, 0x0, 0x1, @LWT_BPF_XMIT_HEADROOM={0x8}}]}, 0x2c}}, 0x0) 17:04:54 executing program 2: open$dir(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000001f80)='./file0\x00', 0x80) inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0x4000091) [ 1289.586699] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1289.601294] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1289.601294] 17:04:54 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)=@ipv6_newroute={0x1c, 0x18, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}, 0x1c}}, 0x0) [ 1289.724334] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1289.724334] 17:04:55 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000180)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=@deltclass={0x24, 0x29, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0x0, 0xffe7}}}, 0x24}}, 0x0) 17:04:55 executing program 2: creat(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='nfsd\x00', 0x0, 0x0) 17:04:55 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4644801000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:55 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=@ipv4_newroute={0x2c, 0x18, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, [@RTA_METRICS={0x4}, @RTA_MULTIPATH={0xc}]}, 0x2c}}, 0x0) 17:04:55 executing program 0: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) recvfrom(r0, 0x0, 0x0, 0x12060, 0x0, 0x0) 17:04:55 executing program 1: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/nvram\x00', 0x0, 0x0) read$eventfd(r0, 0x0, 0x0) 17:04:55 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x3d}}) 17:04:55 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'geneve1\x00', &(0x7f0000000040)=@ethtool_sset_info={0x37, 0x0, 0x7f}}) [ 1290.269438] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1290.269438] 17:04:55 executing program 1: syz_mount_image$jffs2(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', &(0x7f0000000100)={'U+'}, 0x16, 0x0) syz_mount_image$ufs(0x0, &(0x7f0000000280)='./file0\x00', 0x800, 0x0, 0xffffffffffffffff, 0x0, 0x0) syz_open_dev$vcsn(&(0x7f00000025c0)='/dev/vcs#\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) 17:04:55 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@ipv6_delroute={0x1c, 0x19, 0x1, 0x0, 0x0, {0xa, 0x80}}, 0x1c}}, 0x0) 17:04:55 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=@ipv6_newroute={0x30, 0x18, 0x1, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_ENCAP={0xc, 0x16, 0x0, 0x1, @SEG6_LOCAL_OIF={0x8}}]}, 0x30}}, 0x0) 17:04:55 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)=@getlink={0x34, 0x12, 0xaeab8d252980cafb, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @cfhsi={{0xa, 0x1, 'cfhsi\x00'}, {0x4}}}]}, 0x34}}, 0x0) 17:04:55 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x4, 0x0, &(0x7f0000000000)) [ 1290.398551] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1290.398551] 17:04:55 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000000)={'veth0_to_batadv\x00', {0x2, 0x0, @dev}}) 17:04:55 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4644901000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:55 executing program 5: getgroups(0x3, &(0x7f0000000840)=[0xffffffffffffffff, 0xffffffffffffffff, 0x0]) 17:04:55 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000002b40)=[{{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000001840)=""/4096, 0x1000}], 0x1}}], 0x270, 0x100, 0x0) sendto$inet(r0, &(0x7f00000006c0)="0c268a927f1f65", 0x7, 0x11, 0x0, 0x0) 17:04:55 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) openat$incfs(r0, &(0x7f0000000280)='.pending_reads\x00', 0x0, 0x0) 17:04:55 executing program 3: openat$kvm(0xffffffffffffff9c, 0x0, 0x400000, 0x0) 17:04:55 executing program 1: r0 = fanotify_init(0x0, 0x0) fanotify_mark(r0, 0x5, 0x1002, 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') 17:04:55 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4643201000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:55 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4642c01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:55 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4641901000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:56 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4640f01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) [ 1290.741491] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1290.741491] [ 1290.841141] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1290.841141] [ 1290.851527] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1290.851527] [ 1290.873681] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1290.873681] 17:04:56 executing program 1: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000601000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) [ 1290.885648] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1290.885648] 17:04:56 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4644a01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:56 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000000000000b000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:56 executing program 0: socket$nl_netfilter(0x10, 0x3, 0xc) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f0000000480)={0x0, 0xfb, 0x84, 0x0, 0x3, "48d26d032ccc146906a78db4aacb9e98", "1a78fee3cb9e845981a61fd12539cbc472cf90ccf7b35e9c22ba97ed9edd98ac4dff6070dd4d697d75d88eaa028caf1bf980a2f0f8285df93bcdf403effbf6cd693848677d27e71b5912c861902297b63d46d89d9b380254b124227581e2e9af90da4ba161d932c91acf51307f2e67"}, 0x84, 0x3) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r1, 0xc0046686, &(0x7f0000000280)=ANY=[@ANYBLOB="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"]) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x4, 0x0, 0x3, 0x3, 0x0, 0xffff, 0x10000, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x4}, 0x9860, 0x401, 0x7fffffff, 0x1, 0x1, 0x9a, 0x7}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0xa, &(0x7f00000000c0)=0xbb1, 0x4) bind$inet(r2, &(0x7f0000000440)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000200)={0x2, 0x4e23, @local}, 0x10) r3 = fork() wait4(r3, &(0x7f0000000140), 0x0, 0x0) setpgid(r3, 0x0) tkill(r3, 0x32) perf_event_open(&(0x7f00000007c0)={0x2, 0x70, 0x1, 0x0, 0x2, 0x7a, 0x0, 0xe8e0, 0x90, 0x9, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x6}, 0x20, 0x6, 0x6, 0x8, 0x5, 0xfff, 0x9}, r3, 0x3, r0, 0xa) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000180), 0x4) sendto$inet(r2, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) recvmsg(r2, &(0x7f0000001500)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000001540)=""/4096, 0x1000}, {&(0x7f0000000600)=""/113, 0x71}, {&(0x7f0000000680)=""/233, 0xe9}], 0x3, 0x0, 0x0, 0xf9ea}, 0x100) 17:04:56 executing program 5: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f0000010000)="cefaad1b", 0x4}, {0x0, 0x0, 0x200}], 0x3, &(0x7f0000000040)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0xc, &(0x7f0000000040), &(0x7f0000000080)=0x4) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x1108008, &(0x7f0000000140)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',cache=fscache,cache=none,version=9p2000.u,fowner<', @ANYRESDEC=0xee01, @ANYBLOB=',measure,fowner>', @ANYRESDEC=0x0, @ANYBLOB="0000ee0300000000"]) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@private1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}}}, &(0x7f00000005c0)=0xe8) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00', 0xffffffffffffffff) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600)='nl80211\x00', r0) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r4, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x24, r5, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r6}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x3}]}, 0x24}}, 0x0) sendmsg$NL80211_CMD_STOP_AP(r0, &(0x7f00000007c0)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x80000880}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x14, r5, 0x400, 0x70bd27, 0x25dfdbfb, {{}, {@void, @void}}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000200)='./file0\x00', 0xc7, 0x2, &(0x7f0000000340)=[{&(0x7f0000000240)="f7036a9555d9c2ddd77fe37261a4778706d1676f0fd0b1d0e025daf5777237653f7640f072f7f8e51259b346bf1f297316845a97d591f605e699f97b4504f36917fae3212d9aaece028bbde8a0a9e0d76ae6ecd864dbbc407d718ec452022593f9440821e70cd52b975551411713fd37f34b19cccd80d165c64bc3b4d502c056a4bc57d077392d8e6caa0d19038c67fe0cbba98e877e924303069f7a8d1d791dbc61ba30d6d6ea520dc5c2baf7fa30ec5b118d69ad1ba35ceb8ad15dd63399194639e59ff9a2f67bc5cb57252256facd6b2837523f24fdd3", 0xd8}, {&(0x7f00000003c0)="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", 0xfd, 0x8}], 0xa0840, &(0x7f0000000940)={[{@resize={'resize', 0x3d, 0x7}}, {@notail='notail'}, {@usrjquota='usrjquota'}, {@barrier_none='barrier=none'}, {@balloc_notest4='block-allocator=notest4'}, {@balloc_noborder='block-allocator=noborder'}, {@errors_continue='errors=continue'}, {@resize_auto='resize=auto'}, {@barrier_none='barrier=none'}], [{@fsname={'fsname', 0x3d, '`f\xdcP\x7f\x16\x84Z\x04\xf9\xd8\xeaX\x1d\xa8\\s\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '\x8e2\xc6\xc2\xb6\xa2\xc2z\xd7\xb1v\x1f\xe6\xba\xd7L\xe4~\x98\xaab\xf1\xd4t\xdbT-\v\x10\xc5\xc9\x12\xe1F]\x85\x8d\x7f\xb8\xb8n0\x04JS<8&\xe0X[\xb9\xea\x93)L\xa2\xb4\x95`k\x87\xb5\x92\xd3`\xeck\xa3\vW\x01\x14@\x944)\xe2\xb1\xa1\x0e\x11\x1d\xd5\xc70x0}}, {{@in6=@private0}}}, &(0x7f00000005c0)=0xe8) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00', 0xffffffffffffffff) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600)='nl80211\x00', r0) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r4, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x24, r5, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r6}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x3}]}, 0x24}}, 0x0) sendmsg$NL80211_CMD_STOP_AP(r0, &(0x7f00000007c0)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x80000880}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x14, r5, 0x400, 0x70bd27, 0x25dfdbfb, {{}, {@void, @void}}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000200)='./file0\x00', 0xc7, 0x2, &(0x7f0000000340)=[{&(0x7f0000000240)="f7036a9555d9c2ddd77fe37261a4778706d1676f0fd0b1d0e025daf5777237653f7640f072f7f8e51259b346bf1f297316845a97d591f605e699f97b4504f36917fae3212d9aaece028bbde8a0a9e0d76ae6ecd864dbbc407d718ec452022593f9440821e70cd52b975551411713fd37f34b19cccd80d165c64bc3b4d502c056a4bc57d077392d8e6caa0d19038c67fe0cbba98e877e924303069f7a8d1d791dbc61ba30d6d6ea520dc5c2baf7fa30ec5b118d69ad1ba35ceb8ad15dd63399194639e59ff9a2f67bc5cb57252256facd6b2837523f24fdd3", 0xd8}, {&(0x7f00000003c0)="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", 0xfd, 0x8}], 0xa0840, &(0x7f0000000940)={[{@resize={'resize', 0x3d, 0x7}}, {@notail='notail'}, {@usrjquota='usrjquota'}, {@barrier_none='barrier=none'}, {@balloc_notest4='block-allocator=notest4'}, {@balloc_noborder='block-allocator=noborder'}, {@errors_continue='errors=continue'}, {@resize_auto='resize=auto'}, {@barrier_none='barrier=none'}], [{@fsname={'fsname', 0x3d, '`f\xdcP\x7f\x16\x84Z\x04\xf9\xd8\xeaX\x1d\xa8\\s\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '\x8e2\xc6\xc2\xb6\xa2\xc2z\xd7\xb1v\x1f\xe6\xba\xd7L\xe4~\x98\xaab\xf1\xd4t\xdbT-\v\x10\xc5\xc9\x12\xe1F]\x85\x8d\x7f\xb8\xb8n0\x04JS<8&\xe0X[\xb9\xea\x93)L\xa2\xb4\x95`k\x87\xb5\x92\xd3`\xeck\xa3\vW\x01\x14@\x944)\xe2\xb1\xa1\x0e\x11\x1d\xd5\xc70x0}}, {{@in6=@private0}}}, &(0x7f00000005c0)=0xe8) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00', 0xffffffffffffffff) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600)='nl80211\x00', r0) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r4, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x24, r5, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r6}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x3}]}, 0x24}}, 0x0) sendmsg$NL80211_CMD_STOP_AP(r0, &(0x7f00000007c0)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x80000880}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x14, r5, 0x400, 0x70bd27, 0x25dfdbfb, {{}, {@void, @void}}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000200)='./file0\x00', 0xc7, 0x2, &(0x7f0000000340)=[{&(0x7f0000000240)="f7036a9555d9c2ddd77fe37261a4778706d1676f0fd0b1d0e025daf5777237653f7640f072f7f8e51259b346bf1f297316845a97d591f605e699f97b4504f36917fae3212d9aaece028bbde8a0a9e0d76ae6ecd864dbbc407d718ec452022593f9440821e70cd52b975551411713fd37f34b19cccd80d165c64bc3b4d502c056a4bc57d077392d8e6caa0d19038c67fe0cbba98e877e924303069f7a8d1d791dbc61ba30d6d6ea520dc5c2baf7fa30ec5b118d69ad1ba35ceb8ad15dd63399194639e59ff9a2f67bc5cb57252256facd6b2837523f24fdd3", 0xd8}, {&(0x7f00000003c0)="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", 0xfd, 0x8}], 0xa0840, &(0x7f0000000940)={[{@resize={'resize', 0x3d, 0x7}}, {@notail='notail'}, {@usrjquota='usrjquota'}, {@barrier_none='barrier=none'}, {@balloc_notest4='block-allocator=notest4'}, {@balloc_noborder='block-allocator=noborder'}, {@errors_continue='errors=continue'}, {@resize_auto='resize=auto'}, {@barrier_none='barrier=none'}], [{@fsname={'fsname', 0x3d, '`f\xdcP\x7f\x16\x84Z\x04\xf9\xd8\xeaX\x1d\xa8\\s\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '\x8e2\xc6\xc2\xb6\xa2\xc2z\xd7\xb1v\x1f\xe6\xba\xd7L\xe4~\x98\xaab\xf1\xd4t\xdbT-\v\x10\xc5\xc9\x12\xe1F]\x85\x8d\x7f\xb8\xb8n0\x04JS<8&\xe0X[\xb9\xea\x93)L\xa2\xb4\x95`k\x87\xb5\x92\xd3`\xeck\xa3\vW\x01\x14@\x944)\xe2\xb1\xa1\x0e\x11\x1d\xd5\xc70x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x24, r4, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r5}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x3}]}, 0x24}}, 0x0) sendmsg$NL80211_CMD_STOP_AP(r0, &(0x7f00000007c0)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x80000880}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x14, r4, 0x400, 0x70bd27, 0x25dfdbfb, {{}, {@void, @void}}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x0) 17:04:57 executing program 0: socket$nl_netfilter(0x10, 0x3, 0xc) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f0000000480)={0x0, 0xfb, 0x84, 0x0, 0x3, "48d26d032ccc146906a78db4aacb9e98", "1a78fee3cb9e845981a61fd12539cbc472cf90ccf7b35e9c22ba97ed9edd98ac4dff6070dd4d697d75d88eaa028caf1bf980a2f0f8285df93bcdf403effbf6cd693848677d27e71b5912c861902297b63d46d89d9b380254b124227581e2e9af90da4ba161d932c91acf51307f2e67"}, 0x84, 0x3) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r1, 0xc0046686, &(0x7f0000000280)=ANY=[@ANYBLOB="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"]) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x4, 0x0, 0x3, 0x3, 0x0, 0xffff, 0x10000, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x4}, 0x9860, 0x401, 0x7fffffff, 0x1, 0x1, 0x9a, 0x7}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0xa, &(0x7f00000000c0)=0xbb1, 0x4) bind$inet(r2, &(0x7f0000000440)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000200)={0x2, 0x4e23, @local}, 0x10) r3 = fork() wait4(r3, &(0x7f0000000140), 0x0, 0x0) setpgid(r3, 0x0) tkill(r3, 0x32) perf_event_open(&(0x7f00000007c0)={0x2, 0x70, 0x1, 0x0, 0x2, 0x7a, 0x0, 0xe8e0, 0x90, 0x9, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x6}, 0x20, 0x6, 0x6, 0x8, 0x5, 0xfff, 0x9}, r3, 0x3, r0, 0xa) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000180), 0x4) sendto$inet(r2, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 17:04:57 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', 0x0, 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000005f00000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:57 executing program 1: syz_mount_image$jfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000601000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) [ 1292.624249] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1292.624249] [ 1292.633704] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1292.633704] 17:04:57 executing program 0: socket$nl_netfilter(0x10, 0x3, 0xc) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f0000000480)={0x0, 0xfb, 0x84, 0x0, 0x3, "48d26d032ccc146906a78db4aacb9e98", "1a78fee3cb9e845981a61fd12539cbc472cf90ccf7b35e9c22ba97ed9edd98ac4dff6070dd4d697d75d88eaa028caf1bf980a2f0f8285df93bcdf403effbf6cd693848677d27e71b5912c861902297b63d46d89d9b380254b124227581e2e9af90da4ba161d932c91acf51307f2e67"}, 0x84, 0x3) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r1, 0xc0046686, &(0x7f0000000280)=ANY=[@ANYBLOB="00005200514ae9f125090000e3ddd5741f43b1912a7d4430e532d5bd4e332f724900001aeacfabd5667bc58bec327653674169f8b4c8908d3fbdc0320df8c8a2b67383249930234ae6af4500ef08383580af9121ca4dcd55006044e996b6993f6a1422ddc5ed3599f14080e0108171a616346079f745ed97a7fb1952e083bb57fbf4bc5ca92acf54fcab92810d7924b0e437d8e736b1008ce1b42450f8b47b97f33e1b9128fcb3dec3517fb95e62d7fccf859301ce17d75a67cf08a98a22e465dcc16b912663af711bae9bd67065d327d13adf4cec5f6103d0c8fbb5b8293d336b2b15c2f1ca13acc79195b4302e269602696e94bc6de1ad67c996c00f5b35ccf09853c3367f2ac8dcbd54588908c348e6d179210a3e0fbab349f013df39eeb713e04427f786cf825556016a3e87adeebc7de8c940d06309b56a9d0cf98b801fbfaa9996233167"]) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x4, 0x0, 0x3, 0x3, 0x0, 0xffff, 0x10000, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x4}, 0x9860, 0x401, 0x7fffffff, 0x1, 0x1, 0x9a, 0x7}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0xa, &(0x7f00000000c0)=0xbb1, 0x4) bind$inet(r2, &(0x7f0000000440)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000200)={0x2, 0x4e23, @local}, 0x10) r3 = fork() wait4(r3, &(0x7f0000000140), 0x0, 0x0) setpgid(r3, 0x0) tkill(r3, 0x32) perf_event_open(&(0x7f00000007c0)={0x2, 0x70, 0x1, 0x0, 0x2, 0x7a, 0x0, 0xe8e0, 0x90, 0x9, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x6}, 0x20, 0x6, 0x6, 0x8, 0x5, 0xfff, 0x9}, r3, 0x3, r0, 0xa) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000180), 0x4) [ 1292.668326] BFS-fs: bfs_fill_super(): Superblock is corrupted 17:04:58 executing program 1: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', 0x0, 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000601000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:58 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', 0x0, 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000005f00000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:58 executing program 5: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f0000010000)="cefaad1b", 0x4}, {0x0, 0x0, 0x200}], 0x3, &(0x7f0000000040)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0xc, &(0x7f0000000040), &(0x7f0000000080)=0x4) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x1108008, &(0x7f0000000140)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',cache=fscache,cache=none,version=9p2000.u,fowner<', @ANYRESDEC=0xee01, @ANYBLOB=',measure,fowner>', @ANYRESDEC=0x0, @ANYBLOB="0000ee0300000000"]) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@private1, @in=@empty}}, {{@in6=@private0}}}, &(0x7f00000005c0)=0xe8) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00', 0xffffffffffffffff) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600)='nl80211\x00', r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x24, r4, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r5}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x3}]}, 0x24}}, 0x0) 17:04:58 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4644c01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:58 executing program 0: socket$nl_netfilter(0x10, 0x3, 0xc) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f0000000480)={0x0, 0xfb, 0x84, 0x0, 0x3, "48d26d032ccc146906a78db4aacb9e98", "1a78fee3cb9e845981a61fd12539cbc472cf90ccf7b35e9c22ba97ed9edd98ac4dff6070dd4d697d75d88eaa028caf1bf980a2f0f8285df93bcdf403effbf6cd693848677d27e71b5912c861902297b63d46d89d9b380254b124227581e2e9af90da4ba161d932c91acf51307f2e67"}, 0x84, 0x3) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r1, 0xc0046686, &(0x7f0000000280)=ANY=[@ANYBLOB="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"]) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x4, 0x0, 0x3, 0x3, 0x0, 0xffff, 0x10000, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x4}, 0x9860, 0x401, 0x7fffffff, 0x1, 0x1, 0x9a, 0x7}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0xa, &(0x7f00000000c0)=0xbb1, 0x4) bind$inet(r2, &(0x7f0000000440)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000200)={0x2, 0x4e23, @local}, 0x10) r3 = fork() wait4(r3, &(0x7f0000000140), 0x0, 0x0) setpgid(r3, 0x0) tkill(r3, 0x32) perf_event_open(&(0x7f00000007c0)={0x2, 0x70, 0x1, 0x0, 0x2, 0x7a, 0x0, 0xe8e0, 0x90, 0x9, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x6}, 0x20, 0x6, 0x6, 0x8, 0x5, 0xfff, 0x9}, r3, 0x3, r0, 0xa) 17:04:58 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4644e01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:58 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', 0x0, 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000005f00000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:58 executing program 1: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', 0x0, 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000601000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) [ 1293.073745] BFS-fs: bfs_fill_super(): Superblock is corrupted [ 1293.091801] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1293.091801] [ 1293.101775] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1293.101775] 17:04:58 executing program 0: socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f0000000480)={0x0, 0xfb, 0x84, 0x0, 0x3, "48d26d032ccc146906a78db4aacb9e98", "1a78fee3cb9e845981a61fd12539cbc472cf90ccf7b35e9c22ba97ed9edd98ac4dff6070dd4d697d75d88eaa028caf1bf980a2f0f8285df93bcdf403effbf6cd693848677d27e71b5912c861902297b63d46d89d9b380254b124227581e2e9af90da4ba161d932c91acf51307f2e67"}, 0x84, 0x3) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f0000000280)=ANY=[@ANYBLOB="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"]) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x4, 0x0, 0x3, 0x3, 0x0, 0xffff, 0x10000, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x4}, 0x9860, 0x401, 0x7fffffff, 0x1, 0x1, 0x9a, 0x7}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0xa, &(0x7f00000000c0)=0xbb1, 0x4) bind$inet(r1, &(0x7f0000000440)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000000200)={0x2, 0x4e23, @local}, 0x10) r2 = fork() wait4(r2, &(0x7f0000000140), 0x0, 0x0) setpgid(r2, 0x0) tkill(r2, 0x32) 17:04:58 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:58 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) ioctl$BTRFS_IOC_DEFAULT_SUBVOL(r2, 0x40089413, &(0x7f00000004c0)=0x80000001) execveat(r1, &(0x7f0000000080)='./file0\x00', &(0x7f0000000280)=[&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='\x00', &(0x7f0000000180)='(\xa3+[\x00', &(0x7f00000001c0)='nointegrity', &(0x7f0000000240)='jfs\x00'], &(0x7f0000000440)=[&(0x7f0000000300)='nointegrity', &(0x7f0000000340)='&\x00', &(0x7f0000000380)='!{%(-Y%,[]\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\'\x00'], 0x800) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0xf99}, {&(0x7f0000000140)="10c4645f010000000100000093426c74c863dd927ca64476d6a4ceaac22c7850f6b1fd59f307019187dce4e3164150a90000000000000000", 0x38, 0xb200}], 0x0, &(0x7f0000000480)={[{@usrquota='usrquota'}]}) 17:04:58 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:58 executing program 5: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f0000010000)="cefaad1b", 0x4}, {0x0, 0x0, 0x200}], 0x3, &(0x7f0000000040)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0xc, &(0x7f0000000040), &(0x7f0000000080)=0x4) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x1108008, &(0x7f0000000140)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',cache=fscache,cache=none,version=9p2000.u,fowner<', @ANYRESDEC=0xee01, @ANYBLOB=',measure,fowner>', @ANYRESDEC=0x0, @ANYBLOB="0000ee0300000000"]) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@private1, @in=@empty}}, {{@in6=@private0}}}, &(0x7f00000005c0)=0xe8) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00', 0xffffffffffffffff) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600)='nl80211\x00', r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000700)={'wlan1\x00'}) 17:04:58 executing program 0: socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f0000000480)={0x0, 0xfb, 0x84, 0x0, 0x3, "48d26d032ccc146906a78db4aacb9e98", "1a78fee3cb9e845981a61fd12539cbc472cf90ccf7b35e9c22ba97ed9edd98ac4dff6070dd4d697d75d88eaa028caf1bf980a2f0f8285df93bcdf403effbf6cd693848677d27e71b5912c861902297b63d46d89d9b380254b124227581e2e9af90da4ba161d932c91acf51307f2e67"}, 0x84, 0x3) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f0000000280)=ANY=[@ANYBLOB="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"]) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x4, 0x0, 0x3, 0x3, 0x0, 0xffff, 0x10000, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x4}, 0x9860, 0x401, 0x7fffffff, 0x1, 0x1, 0x9a, 0x7}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0xa, &(0x7f00000000c0)=0xbb1, 0x4) bind$inet(r1, &(0x7f0000000440)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000000200)={0x2, 0x4e23, @local}, 0x10) r2 = fork() wait4(r2, &(0x7f0000000140), 0x0, 0x0) setpgid(r2, 0x0) 17:04:58 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4644f01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:58 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:58 executing program 1: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', 0x0, 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000601000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:58 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000005f00000c", 0x15, 0x8000}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:58 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) ioctl$BTRFS_IOC_DEFAULT_SUBVOL(r2, 0x40089413, &(0x7f00000004c0)=0x80000001) execveat(r1, &(0x7f0000000080)='./file0\x00', &(0x7f0000000280)=[&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='\x00', &(0x7f0000000180)='(\xa3+[\x00', &(0x7f00000001c0)='nointegrity', &(0x7f0000000240)='jfs\x00'], &(0x7f0000000440)=[&(0x7f0000000300)='nointegrity', &(0x7f0000000340)='&\x00', &(0x7f0000000380)='!{%(-Y%,[]\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\'\x00'], 0x800) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0xf99}, {&(0x7f0000000140)="10c4645f010000000100000093426c74c863dd927ca64476d6a4ceaac22c7850f6b1fd59f307019187dce4e3164150a90000000000000000", 0x38, 0xb200}], 0x0, &(0x7f0000000480)={[{@usrquota='usrquota'}]}) [ 1293.586372] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1293.586372] [ 1293.602287] BFS-fs: bfs_fill_super(): Superblock is corrupted 17:04:58 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:58 executing program 1: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:58 executing program 5: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f0000010000)="cefaad1b", 0x4}, {0x0, 0x0, 0x200}], 0x3, &(0x7f0000000040)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0xc, &(0x7f0000000040), &(0x7f0000000080)=0x4) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x1108008, &(0x7f0000000140)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',cache=fscache,cache=none,version=9p2000.u,fowner<', @ANYRESDEC=0xee01, @ANYBLOB=',measure,fowner>', @ANYRESDEC=0x0, @ANYBLOB="0000ee0300000000"]) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@private1, @in=@empty}}, {{@in6=@private0}}}, &(0x7f00000005c0)=0xe8) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00', 0xffffffffffffffff) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600)='nl80211\x00', r0) 17:04:58 executing program 1: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:59 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645001000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:59 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) ioctl$BTRFS_IOC_DEFAULT_SUBVOL(r2, 0x40089413, &(0x7f00000004c0)=0x80000001) execveat(r1, &(0x7f0000000080)='./file0\x00', &(0x7f0000000280)=[&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='\x00', &(0x7f0000000180)='(\xa3+[\x00', &(0x7f00000001c0)='nointegrity', &(0x7f0000000240)='jfs\x00'], &(0x7f0000000440)=[&(0x7f0000000300)='nointegrity', &(0x7f0000000340)='&\x00', &(0x7f0000000380)='!{%(-Y%,[]\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\'\x00'], 0x800) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0xf99}, {&(0x7f0000000140)="10c4645f010000000100000093426c74c863dd927ca64476d6a4ceaac22c7850f6b1fd59f307019187dce4e3164150a90000000000000000", 0x38, 0xb200}], 0x0, &(0x7f0000000480)={[{@usrquota='usrquota'}]}) [ 1293.968023] BFS-fs: bfs_fill_super(): Superblock is corrupted [ 1293.996088] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1293.996088] [ 1294.134179] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1294.134179] 17:04:59 executing program 0: socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f0000000480)={0x0, 0xfb, 0x84, 0x0, 0x3, "48d26d032ccc146906a78db4aacb9e98", "1a78fee3cb9e845981a61fd12539cbc472cf90ccf7b35e9c22ba97ed9edd98ac4dff6070dd4d697d75d88eaa028caf1bf980a2f0f8285df93bcdf403effbf6cd693848677d27e71b5912c861902297b63d46d89d9b380254b124227581e2e9af90da4ba161d932c91acf51307f2e67"}, 0x84, 0x3) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f0000000280)=ANY=[@ANYBLOB="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"]) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x4, 0x0, 0x3, 0x3, 0x0, 0xffff, 0x10000, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x4}, 0x9860, 0x401, 0x7fffffff, 0x1, 0x1, 0x9a, 0x7}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0xa, &(0x7f00000000c0)=0xbb1, 0x4) bind$inet(r1, &(0x7f0000000440)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000000200)={0x2, 0x4e23, @local}, 0x10) r2 = fork() wait4(r2, &(0x7f0000000140), 0x0, 0x0) setpgid(r2, 0x0) 17:04:59 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:59 executing program 1: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:59 executing program 5: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f0000010000)="cefaad1b", 0x4}, {0x0, 0x0, 0x200}], 0x3, &(0x7f0000000040)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0xc, &(0x7f0000000040), &(0x7f0000000080)=0x4) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x1108008, &(0x7f0000000140)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',cache=fscache,cache=none,version=9p2000.u,fowner<', @ANYRESDEC=0xee01, @ANYBLOB=',measure,fowner>', @ANYRESDEC=0x0, @ANYBLOB="0000ee0300000000"]) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@private1, @in=@empty}}, {{@in6=@private0}}}, &(0x7f00000005c0)=0xe8) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00', 0xffffffffffffffff) 17:04:59 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) ioctl$BTRFS_IOC_DEFAULT_SUBVOL(r2, 0x40089413, &(0x7f00000004c0)=0x80000001) execveat(r1, &(0x7f0000000080)='./file0\x00', &(0x7f0000000280)=[&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='\x00', &(0x7f0000000180)='(\xa3+[\x00', &(0x7f00000001c0)='nointegrity', &(0x7f0000000240)='jfs\x00'], &(0x7f0000000440)=[&(0x7f0000000300)='nointegrity', &(0x7f0000000340)='&\x00', &(0x7f0000000380)='!{%(-Y%,[]\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\'\x00'], 0x800) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0xf99}, {&(0x7f0000000140)="10c4645f010000000100000093426c74c863dd927ca64476d6a4ceaac22c7850f6b1fd59f307019187dce4e3164150a90000000000000000", 0x38, 0xb200}], 0x0, &(0x7f0000000480)={[{@usrquota='usrquota'}]}) 17:04:59 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645101000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:59 executing program 1: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000601000000c", 0x15, 0x8000}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) [ 1294.523092] BFS-fs: bfs_fill_super(): Superblock is corrupted 17:04:59 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:59 executing program 5: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f0000010000)="cefaad1b", 0x4}, {0x0, 0x0, 0x200}], 0x3, &(0x7f0000000040)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0xc, &(0x7f0000000040), &(0x7f0000000080)=0x4) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x1108008, &(0x7f0000000140)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',cache=fscache,cache=none,version=9p2000.u,fowner<', @ANYRESDEC=0xee01, @ANYBLOB=',measure,fowner>', @ANYRESDEC=0x0, @ANYBLOB="0000ee0300000000"]) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@private1, @in=@empty}}, {{@in6=@private0}}}, &(0x7f00000005c0)=0xe8) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00', 0xffffffffffffffff) [ 1294.624923] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1294.624923] 17:04:59 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) ioctl$BTRFS_IOC_DEFAULT_SUBVOL(r2, 0x40089413, &(0x7f00000004c0)=0x80000001) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0xf99}, {&(0x7f0000000140)="10c4645f010000000100000093426c74c863dd927ca64476d6a4ceaac22c7850f6b1fd59f307019187dce4e3164150a90000000000000000", 0x38, 0xb200}], 0x0, &(0x7f0000000480)={[{@usrquota='usrquota'}]}) 17:04:59 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645201000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:04:59 executing program 1: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) [ 1294.941156] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1294.941156] [ 1295.082463] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1295.082463] 17:05:00 executing program 0: socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f0000000480)={0x0, 0xfb, 0x84, 0x0, 0x3, "48d26d032ccc146906a78db4aacb9e98", "1a78fee3cb9e845981a61fd12539cbc472cf90ccf7b35e9c22ba97ed9edd98ac4dff6070dd4d697d75d88eaa028caf1bf980a2f0f8285df93bcdf403effbf6cd693848677d27e71b5912c861902297b63d46d89d9b380254b124227581e2e9af90da4ba161d932c91acf51307f2e67"}, 0x84, 0x3) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f0000000280)=ANY=[@ANYBLOB="00005200514ae9f125090000e3ddd5741f43b1912a7d4430e532d5bd4e332f724900001aeacfabd5667bc58bec327653674169f8b4c8908d3fbdc0320df8c8a2b67383249930234ae6af4500ef08383580af9121ca4dcd55006044e996b6993f6a1422ddc5ed3599f14080e0108171a616346079f745ed97a7fb1952e083bb57fbf4bc5ca92acf54fcab92810d7924b0e437d8e736b1008ce1b42450f8b47b97f33e1b9128fcb3dec3517fb95e62d7fccf859301ce17d75a67cf08a98a22e465dcc16b912663af711bae9bd67065d327d13adf4cec5f6103d0c8fbb5b8293d336b2b15c2f1ca13acc79195b4302e269602696e94bc6de1ad67c996c00f5b35ccf09853c3367f2ac8dcbd54588908c348e6d179210a3e0fbab349f013df39eeb713e04427f786cf825556016a3e87adeebc7de8c940d06309b56a9d0cf98b801fbfaa9996233167"]) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x4, 0x0, 0x3, 0x3, 0x0, 0xffff, 0x10000, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x4}, 0x9860, 0x401, 0x7fffffff, 0x1, 0x1, 0x9a, 0x7}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0xa, &(0x7f00000000c0)=0xbb1, 0x4) bind$inet(r1, &(0x7f0000000440)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000000200)={0x2, 0x4e23, @local}, 0x10) r2 = fork() wait4(r2, &(0x7f0000000140), 0x0, 0x0) setpgid(r2, 0x0) 17:05:00 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x8000}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:05:00 executing program 5: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f0000010000)="cefaad1b", 0x4}, {0x0, 0x0, 0x200}], 0x3, &(0x7f0000000040)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0xc, &(0x7f0000000040), &(0x7f0000000080)=0x4) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x1108008, &(0x7f0000000140)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',cache=fscache,cache=none,version=9p2000.u,fowner<', @ANYRESDEC=0xee01, @ANYBLOB=',measure,fowner>', @ANYRESDEC=0x0, @ANYBLOB="0000ee0300000000"]) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@private1, @in=@empty}}, {{@in6=@private0}}}, &(0x7f00000005c0)=0xe8) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00', 0xffffffffffffffff) 17:05:00 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) ioctl$BTRFS_IOC_DEFAULT_SUBVOL(r2, 0x40089413, &(0x7f00000004c0)=0x80000001) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0xf99}, {&(0x7f0000000140)="10c4645f010000000100000093426c74c863dd927ca64476d6a4ceaac22c7850f6b1fd59f307019187dce4e3164150a90000000000000000", 0x38, 0xb200}], 0x0, &(0x7f0000000480)={[{@usrquota='usrquota'}]}) 17:05:00 executing program 1: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:05:00 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645301000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:05:00 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x8000}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) [ 1295.506042] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1295.506042] [ 1295.541102] BFS-fs: bfs_fill_super(): Superblock is corrupted 17:05:00 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) ioctl$BTRFS_IOC_DEFAULT_SUBVOL(r2, 0x40089413, &(0x7f00000004c0)=0x80000001) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0xf99}, {&(0x7f0000000140)="10c4645f010000000100000093426c74c863dd927ca64476d6a4ceaac22c7850f6b1fd59f307019187dce4e3164150a90000000000000000", 0x38, 0xb200}], 0x0, &(0x7f0000000480)={[{@usrquota='usrquota'}]}) 17:05:00 executing program 1: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:05:01 executing program 5: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f0000010000)="cefaad1b", 0x4}, {0x0, 0x0, 0x200}], 0x3, &(0x7f0000000040)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0xc, &(0x7f0000000040), &(0x7f0000000080)=0x4) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x1108008, &(0x7f0000000140)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',cache=fscache,cache=none,version=9p2000.u,fowner<', @ANYRESDEC=0xee01, @ANYBLOB=',measure,fowner>', @ANYRESDEC=0x0, @ANYBLOB="0000ee0300000000"]) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@private1, @in=@empty}}, {{@in6=@private0}}}, &(0x7f00000005c0)=0xe8) socket$nl_generic(0x10, 0x3, 0x10) 17:05:01 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x8000}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) [ 1295.787005] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1295.787005] 17:05:01 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645401000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) [ 1296.013650] BFS-fs: bfs_fill_super(): Superblock is corrupted [ 1296.103510] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1296.103510] [ 1296.188067] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1296.188067] 17:05:01 executing program 0: socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f0000000480)={0x0, 0xfb, 0x84, 0x0, 0x3, "48d26d032ccc146906a78db4aacb9e98", "1a78fee3cb9e845981a61fd12539cbc472cf90ccf7b35e9c22ba97ed9edd98ac4dff6070dd4d697d75d88eaa028caf1bf980a2f0f8285df93bcdf403effbf6cd693848677d27e71b5912c861902297b63d46d89d9b380254b124227581e2e9af90da4ba161d932c91acf51307f2e67"}, 0x84, 0x3) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f0000000280)=ANY=[@ANYBLOB="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"]) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x4, 0x0, 0x3, 0x3, 0x0, 0xffff, 0x10000, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x4}, 0x9860, 0x401, 0x7fffffff, 0x1, 0x1, 0x9a, 0x7}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0xa, &(0x7f00000000c0)=0xbb1, 0x4) bind$inet(r1, &(0x7f0000000440)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000000200)={0x2, 0x4e23, @local}, 0x10) r2 = fork() wait4(r2, &(0x7f0000000140), 0x0, 0x0) tkill(r2, 0x32) 17:05:01 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f00000002c0)) execveat(r1, &(0x7f0000000080)='./file0\x00', &(0x7f0000000280)=[&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='\x00', &(0x7f0000000180)='(\xa3+[\x00', &(0x7f00000001c0)='nointegrity', &(0x7f0000000240)='jfs\x00'], &(0x7f0000000440)=[&(0x7f0000000300)='nointegrity', &(0x7f0000000340)='&\x00', &(0x7f0000000380)='!{%(-Y%,[]\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\'\x00'], 0x800) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0xf99}, {&(0x7f0000000140)="10c4645f010000000100000093426c74c863dd927ca64476d6a4ceaac22c7850f6b1fd59f307019187dce4e3164150a90000000000000000", 0x38, 0xb200}], 0x0, &(0x7f0000000480)={[{@usrquota='usrquota'}]}) 17:05:01 executing program 1: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x8000}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:05:01 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x8000}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:05:01 executing program 5: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f0000010000)="cefaad1b", 0x4}, {0x0, 0x0, 0x200}], 0x3, &(0x7f0000000040)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0xc, &(0x7f0000000040), &(0x7f0000000080)=0x4) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x1108008, &(0x7f0000000140)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',cache=fscache,cache=none,version=9p2000.u,fowner<', @ANYRESDEC=0xee01, @ANYBLOB=',measure,fowner>', @ANYRESDEC=0x0, @ANYBLOB="0000ee0300000000"]) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@private1, @in=@empty}}, {{@in6=@private0}}}, &(0x7f00000005c0)=0xe8) 17:05:01 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645501000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:05:01 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x8000}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) [ 1296.523592] BFS-fs: bfs_fill_super(): Superblock is corrupted [ 1296.551184] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1296.551184] 17:05:01 executing program 1: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x8000}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:05:01 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f00000002c0)) execveat(r1, &(0x7f0000000080)='./file0\x00', &(0x7f0000000280)=[&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='\x00', &(0x7f0000000180)='(\xa3+[\x00', &(0x7f00000001c0)='nointegrity', &(0x7f0000000240)='jfs\x00'], &(0x7f0000000440)=[&(0x7f0000000300)='nointegrity', &(0x7f0000000340)='&\x00', &(0x7f0000000380)='!{%(-Y%,[]\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\'\x00'], 0x800) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0xf99}, {&(0x7f0000000140)="10c4645f010000000100000093426c74c863dd927ca64476d6a4ceaac22c7850f6b1fd59f307019187dce4e3164150a90000000000000000", 0x38, 0xb200}], 0x0, &(0x7f0000000480)={[{@usrquota='usrquota'}]}) 17:05:01 executing program 5: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f0000010000)="cefaad1b", 0x4}, {0x0, 0x0, 0x200}], 0x3, &(0x7f0000000040)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0xc, &(0x7f0000000040), &(0x7f0000000080)=0x4) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x1108008, &(0x7f0000000140)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',cache=fscache,cache=none,version=9p2000.u,fowner<', @ANYRESDEC=0xee01, @ANYBLOB=',measure,fowner>', @ANYRESDEC=0x0, @ANYBLOB="0000ee0300000000"]) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) 17:05:01 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x8000}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:05:02 executing program 0: socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f0000000480)={0x0, 0xfb, 0x84, 0x0, 0x3, "48d26d032ccc146906a78db4aacb9e98", "1a78fee3cb9e845981a61fd12539cbc472cf90ccf7b35e9c22ba97ed9edd98ac4dff6070dd4d697d75d88eaa028caf1bf980a2f0f8285df93bcdf403effbf6cd693848677d27e71b5912c861902297b63d46d89d9b380254b124227581e2e9af90da4ba161d932c91acf51307f2e67"}, 0x84, 0x3) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f0000000280)=ANY=[@ANYBLOB="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"]) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x4, 0x0, 0x3, 0x3, 0x0, 0xffff, 0x10000, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x4}, 0x9860, 0x401, 0x7fffffff, 0x1, 0x1, 0x9a, 0x7}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0xa, &(0x7f00000000c0)=0xbb1, 0x4) bind$inet(r1, &(0x7f0000000440)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000000200)={0x2, 0x4e23, @local}, 0x10) r2 = fork() wait4(r2, &(0x7f0000000140), 0x0, 0x0) tkill(r2, 0x32) [ 1296.777577] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1296.777577] [ 1296.805630] BFS-fs: bfs_fill_super(): Superblock is corrupted 17:05:02 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645601000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:05:02 executing program 1: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x8000}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:05:02 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f00000002c0)) execveat(r1, &(0x7f0000000080)='./file0\x00', &(0x7f0000000280)=[&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='\x00', &(0x7f0000000180)='(\xa3+[\x00', &(0x7f00000001c0)='nointegrity', &(0x7f0000000240)='jfs\x00'], &(0x7f0000000440)=[&(0x7f0000000300)='nointegrity', &(0x7f0000000340)='&\x00', &(0x7f0000000380)='!{%(-Y%,[]\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\'\x00'], 0x800) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0xf99}, {&(0x7f0000000140)="10c4645f010000000100000093426c74c863dd927ca64476d6a4ceaac22c7850f6b1fd59f307019187dce4e3164150a90000000000000000", 0x38, 0xb200}], 0x0, &(0x7f0000000480)={[{@usrquota='usrquota'}]}) 17:05:02 executing program 1: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x8000}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:05:02 executing program 0: socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f0000000480)={0x0, 0xfb, 0x84, 0x0, 0x3, "48d26d032ccc146906a78db4aacb9e98", "1a78fee3cb9e845981a61fd12539cbc472cf90ccf7b35e9c22ba97ed9edd98ac4dff6070dd4d697d75d88eaa028caf1bf980a2f0f8285df93bcdf403effbf6cd693848677d27e71b5912c861902297b63d46d89d9b380254b124227581e2e9af90da4ba161d932c91acf51307f2e67"}, 0x84, 0x3) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f0000000280)=ANY=[@ANYBLOB="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"]) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x4, 0x0, 0x3, 0x3, 0x0, 0xffff, 0x10000, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x4}, 0x9860, 0x401, 0x7fffffff, 0x1, 0x1, 0x9a, 0x7}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0xa, &(0x7f00000000c0)=0xbb1, 0x4) bind$inet(r1, &(0x7f0000000440)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000000200)={0x2, 0x4e23, @local}, 0x10) r2 = fork() wait4(r2, &(0x7f0000000140), 0x0, 0x0) tkill(r2, 0x32) 17:05:02 executing program 5: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f0000010000)="cefaad1b", 0x4}, {0x0, 0x0, 0x200}], 0x3, &(0x7f0000000040)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0xc, &(0x7f0000000040), &(0x7f0000000080)=0x4) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x1108008, &(0x7f0000000140)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',cache=fscache,cache=none,version=9p2000.u,fowner<', @ANYRESDEC=0xee01, @ANYBLOB=',measure,fowner>', @ANYRESDEC=0x0, @ANYBLOB="0000ee0300000000"]) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) 17:05:02 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600", 0xb, 0x8000}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) [ 1297.176173] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1297.176173] 17:05:02 executing program 0: socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f0000000480)={0x0, 0xfb, 0x84, 0x0, 0x3, "48d26d032ccc146906a78db4aacb9e98", "1a78fee3cb9e845981a61fd12539cbc472cf90ccf7b35e9c22ba97ed9edd98ac4dff6070dd4d697d75d88eaa028caf1bf980a2f0f8285df93bcdf403effbf6cd693848677d27e71b5912c861902297b63d46d89d9b380254b124227581e2e9af90da4ba161d932c91acf51307f2e67"}, 0x84, 0x3) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f0000000280)=ANY=[@ANYBLOB="00005200514ae9f125090000e3ddd5741f43b1912a7d4430e532d5bd4e332f724900001aeacfabd5667bc58bec327653674169f8b4c8908d3fbdc0320df8c8a2b67383249930234ae6af4500ef08383580af9121ca4dcd55006044e996b6993f6a1422ddc5ed3599f14080e0108171a616346079f745ed97a7fb1952e083bb57fbf4bc5ca92acf54fcab92810d7924b0e437d8e736b1008ce1b42450f8b47b97f33e1b9128fcb3dec3517fb95e62d7fccf859301ce17d75a67cf08a98a22e465dcc16b912663af711bae9bd67065d327d13adf4cec5f6103d0c8fbb5b8293d336b2b15c2f1ca13acc79195b4302e269602696e94bc6de1ad67c996c00f5b35ccf09853c3367f2ac8dcbd54588908c348e6d179210a3e0fbab349f013df39eeb713e04427f786cf825556016a3e87adeebc7de8c940d06309b56a9d0cf98b801fbfaa9996233167"]) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x4, 0x0, 0x3, 0x3, 0x0, 0xffff, 0x10000, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x4}, 0x9860, 0x401, 0x7fffffff, 0x1, 0x1, 0x9a, 0x7}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0xa, &(0x7f00000000c0)=0xbb1, 0x4) bind$inet(r1, &(0x7f0000000440)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000000200)={0x2, 0x4e23, @local}, 0x10) wait4(0x0, &(0x7f0000000140), 0x0, 0x0) setpgid(0x0, 0x0) tkill(0x0, 0x32) 17:05:02 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) execveat(r1, &(0x7f0000000080)='./file0\x00', &(0x7f0000000280)=[&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='\x00', &(0x7f0000000180)='(\xa3+[\x00', &(0x7f00000001c0)='nointegrity', &(0x7f0000000240)='jfs\x00'], &(0x7f0000000440)=[&(0x7f0000000300)='nointegrity', &(0x7f0000000340)='&\x00', &(0x7f0000000380)='!{%(-Y%,[]\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\'\x00'], 0x800) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0xf99}, {&(0x7f0000000140)="10c4645f010000000100000093426c74c863dd927ca64476d6a4ceaac22c7850f6b1fd59f307019187dce4e3164150a90000000000000000", 0x38, 0xb200}], 0x0, &(0x7f0000000480)={[{@usrquota='usrquota'}]}) [ 1297.324861] BFS-fs: bfs_fill_super(): Superblock is corrupted [ 1297.332657] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1297.332657] 17:05:02 executing program 1: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x8000}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:05:02 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)='J', 0x1, 0x8000}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:05:02 executing program 0: socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f0000000480)={0x0, 0xfb, 0x84, 0x0, 0x3, "48d26d032ccc146906a78db4aacb9e98", "1a78fee3cb9e845981a61fd12539cbc472cf90ccf7b35e9c22ba97ed9edd98ac4dff6070dd4d697d75d88eaa028caf1bf980a2f0f8285df93bcdf403effbf6cd693848677d27e71b5912c861902297b63d46d89d9b380254b124227581e2e9af90da4ba161d932c91acf51307f2e67"}, 0x84, 0x3) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f0000000280)=ANY=[@ANYBLOB="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"]) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x4, 0x0, 0x3, 0x3, 0x0, 0xffff, 0x10000, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x4}, 0x9860, 0x401, 0x7fffffff, 0x1, 0x1, 0x9a, 0x7}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0xa, &(0x7f00000000c0)=0xbb1, 0x4) bind$inet(r1, &(0x7f0000000440)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000000200)={0x2, 0x4e23, @local}, 0x10) wait4(0x0, &(0x7f0000000140), 0x0, 0x0) setpgid(0x0, 0x0) tkill(0x0, 0x32) 17:05:02 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645701000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:05:02 executing program 5: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f0000010000)="cefaad1b", 0x4}, {0x0, 0x0, 0x200}], 0x3, &(0x7f0000000040)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0xc, &(0x7f0000000040), &(0x7f0000000080)=0x4) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x1108008, &(0x7f0000000140)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',cache=fscache,cache=none,version=9p2000.u,fowner<', @ANYRESDEC=0xee01, @ANYBLOB=',measure,fowner>', @ANYRESDEC=0x0, @ANYBLOB="0000ee0300000000"]) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) 17:05:02 executing program 0: socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f0000000480)={0x0, 0xfb, 0x84, 0x0, 0x3, "48d26d032ccc146906a78db4aacb9e98", "1a78fee3cb9e845981a61fd12539cbc472cf90ccf7b35e9c22ba97ed9edd98ac4dff6070dd4d697d75d88eaa028caf1bf980a2f0f8285df93bcdf403effbf6cd693848677d27e71b5912c861902297b63d46d89d9b380254b124227581e2e9af90da4ba161d932c91acf51307f2e67"}, 0x84, 0x3) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f0000000280)=ANY=[@ANYBLOB="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"]) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x4, 0x0, 0x3, 0x3, 0x0, 0xffff, 0x10000, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x4}, 0x9860, 0x401, 0x7fffffff, 0x1, 0x1, 0x9a, 0x7}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0xa, &(0x7f00000000c0)=0xbb1, 0x4) bind$inet(r1, &(0x7f0000000440)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000000200)={0x2, 0x4e23, @local}, 0x10) wait4(0x0, &(0x7f0000000140), 0x0, 0x0) setpgid(0x0, 0x0) tkill(0x0, 0x32) 17:05:02 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) execveat(r1, &(0x7f0000000080)='./file0\x00', &(0x7f0000000280)=[&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='\x00', &(0x7f0000000180)='(\xa3+[\x00', &(0x7f00000001c0)='nointegrity', &(0x7f0000000240)='jfs\x00'], &(0x7f0000000440)=[&(0x7f0000000300)='nointegrity', &(0x7f0000000340)='&\x00', &(0x7f0000000380)='!{%(-Y%,[]\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\'\x00'], 0x800) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0xf99}, {&(0x7f0000000140)="10c4645f010000000100000093426c74c863dd927ca64476d6a4ceaac22c7850f6b1fd59f307019187dce4e3164150a90000000000000000", 0x38, 0xb200}], 0x0, &(0x7f0000000480)={[{@usrquota='usrquota'}]}) [ 1297.589187] BFS-fs: bfs_fill_super(): Superblock is corrupted 17:05:02 executing program 1: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x8000}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:05:02 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)='J', 0x1, 0x8000}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:05:03 executing program 0: socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f0000000480)={0x0, 0xfb, 0x84, 0x0, 0x3, "48d26d032ccc146906a78db4aacb9e98", "1a78fee3cb9e845981a61fd12539cbc472cf90ccf7b35e9c22ba97ed9edd98ac4dff6070dd4d697d75d88eaa028caf1bf980a2f0f8285df93bcdf403effbf6cd693848677d27e71b5912c861902297b63d46d89d9b380254b124227581e2e9af90da4ba161d932c91acf51307f2e67"}, 0x84, 0x3) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f0000000280)=ANY=[@ANYBLOB="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"]) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x4, 0x0, 0x3, 0x3, 0x0, 0xffff, 0x10000, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x4}, 0x9860, 0x401, 0x7fffffff, 0x1, 0x1, 0x9a, 0x7}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0xa, &(0x7f00000000c0)=0xbb1, 0x4) bind$inet(r1, &(0x7f0000000440)={0x2, 0x4e23, @local}, 0x10) r2 = fork() wait4(r2, &(0x7f0000000140), 0x0, 0x0) setpgid(r2, 0x0) tkill(r2, 0x32) 17:05:03 executing program 5: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f0000010000)="cefaad1b", 0x4}, {0x0, 0x0, 0x200}], 0x3, &(0x7f0000000040)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0xc, &(0x7f0000000040), &(0x7f0000000080)=0x4) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x1108008, &(0x7f0000000140)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',cache=fscache,cache=none,version=9p2000.u,fowner<', @ANYRESDEC=0xee01, @ANYBLOB=',measure,fowner>', @ANYRESDEC=0x0, @ANYBLOB="0000ee0300000000"]) socket(0x10, 0x803, 0x0) [ 1297.763912] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1297.763912] [ 1297.902960] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1297.902960] 17:05:03 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) execveat(r1, &(0x7f0000000080)='./file0\x00', &(0x7f0000000280)=[&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='\x00', &(0x7f0000000180)='(\xa3+[\x00', &(0x7f00000001c0)='nointegrity', &(0x7f0000000240)='jfs\x00'], &(0x7f0000000440)=[&(0x7f0000000300)='nointegrity', &(0x7f0000000340)='&\x00', &(0x7f0000000380)='!{%(-Y%,[]\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\'\x00'], 0x800) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0xf99}, {&(0x7f0000000140)="10c4645f010000000100000093426c74c863dd927ca64476d6a4ceaac22c7850f6b1fd59f307019187dce4e3164150a90000000000000000", 0x38, 0xb200}], 0x0, &(0x7f0000000480)={[{@usrquota='usrquota'}]}) 17:05:03 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)='J', 0x1, 0x8000}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:05:03 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645801000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:05:03 executing program 1: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600", 0xb, 0x8000}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) [ 1298.043575] BFS-fs: bfs_fill_super(): Superblock is corrupted 17:05:03 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) execveat(r1, &(0x7f0000000080)='./file0\x00', &(0x7f0000000280)=[&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='\x00', &(0x7f0000000180)='(\xa3+[\x00', &(0x7f00000001c0)='nointegrity', &(0x7f0000000240)='jfs\x00'], &(0x7f0000000440)=[&(0x7f0000000300)='nointegrity', &(0x7f0000000340)='&\x00', &(0x7f0000000380)='!{%(-Y%,[]\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\'\x00'], 0x800) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0xf99}, {&(0x7f0000000140)="10c4645f010000000100000093426c74c863dd927ca64476d6a4ceaac22c7850f6b1fd59f307019187dce4e3164150a90000000000000000", 0x38, 0xb200}], 0x0, &(0x7f0000000480)={[{@usrquota='usrquota'}]}) 17:05:03 executing program 5: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f0000010000)="cefaad1b", 0x4}, {0x0, 0x0, 0x200}], 0x3, &(0x7f0000000040)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0xc, &(0x7f0000000040), &(0x7f0000000080)=0x4) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x1108008, &(0x7f0000000140)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',cache=fscache,cache=none,version=9p2000.u,fowner<', @ANYRESDEC=0xee01, @ANYBLOB=',measure,fowner>', @ANYRESDEC=0x0, @ANYBLOB="0000ee0300000000"]) 17:05:03 executing program 1: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)='J', 0x1, 0x8000}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:05:03 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100", 0x6, 0x8000}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) [ 1298.354108] BFS-fs: bfs_fill_super(): Superblock is corrupted [ 1298.360873] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1298.360873] 17:05:03 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645901000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:05:03 executing program 5: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f0000010000)="cefaad1b", 0x4}, {0x0, 0x0, 0x200}], 0x3, &(0x7f0000000040)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0xc, &(0x7f0000000040), &(0x7f0000000080)=0x4) [ 1298.640415] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1298.640415] 17:05:03 executing program 0: socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f0000000480)={0x0, 0xfb, 0x84, 0x0, 0x3, "48d26d032ccc146906a78db4aacb9e98", "1a78fee3cb9e845981a61fd12539cbc472cf90ccf7b35e9c22ba97ed9edd98ac4dff6070dd4d697d75d88eaa028caf1bf980a2f0f8285df93bcdf403effbf6cd693848677d27e71b5912c861902297b63d46d89d9b380254b124227581e2e9af90da4ba161d932c91acf51307f2e67"}, 0x84, 0x3) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f0000000280)=ANY=[@ANYBLOB="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"]) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x4, 0x0, 0x3, 0x3, 0x0, 0xffff, 0x10000, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x4}, 0x9860, 0x401, 0x7fffffff, 0x1, 0x1, 0x9a, 0x7}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0xa, &(0x7f00000000c0)=0xbb1, 0x4) bind$inet(r1, &(0x7f0000000440)={0x2, 0x4e23, @local}, 0x10) r2 = fork() wait4(r2, &(0x7f0000000140), 0x0, 0x0) setpgid(r2, 0x0) tkill(r2, 0x32) 17:05:03 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) execveat(r1, &(0x7f0000000080)='./file0\x00', &(0x7f0000000280)=[&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='\x00', &(0x7f0000000180)='(\xa3+[\x00', &(0x7f00000001c0)='nointegrity', &(0x7f0000000240)='jfs\x00'], &(0x7f0000000440)=[&(0x7f0000000300)='nointegrity', &(0x7f0000000340)='&\x00', &(0x7f0000000380)='!{%(-Y%,[]\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\'\x00'], 0x800) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0xf99}, {&(0x7f0000000140)="10c4645f010000000100000093426c74c863dd927ca64476d6a4ceaac22c7850f6b1fd59f307019187dce4e3164150a90000000000000000", 0x38, 0xb200}], 0x0, &(0x7f0000000480)={[{@usrquota='usrquota'}]}) 17:05:03 executing program 1: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)='J', 0x1, 0x8000}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:05:03 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)='J', 0x1, 0x8000}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) [ 1298.741853] BFS-fs: bfs_fill_super(): Superblock is corrupted [ 1298.748783] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1298.748783] 17:05:04 executing program 5: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f0000010000)="cefaad1b", 0x4}, {0x0, 0x0, 0x200}], 0x3, &(0x7f0000000040)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) 17:05:04 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645a01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:05:04 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)='J', 0x1, 0x8000}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:05:04 executing program 1: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)='J', 0x1, 0x8000}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:05:04 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) execveat(r1, &(0x7f0000000080)='./file0\x00', &(0x7f0000000280)=[&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='\x00', &(0x7f0000000180)='(\xa3+[\x00', &(0x7f00000001c0)='nointegrity', &(0x7f0000000240)='jfs\x00'], &(0x7f0000000440)=[&(0x7f0000000300)='nointegrity', &(0x7f0000000340)='&\x00', &(0x7f0000000380)='!{%(-Y%,[]\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\'\x00'], 0x800) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0xf99}, {&(0x7f0000000140)="10c4645f010000000100000093426c74c863dd927ca64476d6a4ceaac22c7850f6b1fd59f307019187dce4e3164150a90000000000000000", 0x38, 0xb200}], 0x0, &(0x7f0000000480)={[{@usrquota='usrquota'}]}) 17:05:04 executing program 0: socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f0000000480)={0x0, 0xfb, 0x84, 0x0, 0x3, "48d26d032ccc146906a78db4aacb9e98", "1a78fee3cb9e845981a61fd12539cbc472cf90ccf7b35e9c22ba97ed9edd98ac4dff6070dd4d697d75d88eaa028caf1bf980a2f0f8285df93bcdf403effbf6cd693848677d27e71b5912c861902297b63d46d89d9b380254b124227581e2e9af90da4ba161d932c91acf51307f2e67"}, 0x84, 0x3) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f0000000280)=ANY=[@ANYBLOB="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"]) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x4, 0x0, 0x3, 0x3, 0x0, 0xffff, 0x10000, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x4}, 0x9860, 0x401, 0x7fffffff, 0x1, 0x1, 0x9a, 0x7}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0xa, &(0x7f00000000c0)=0xbb1, 0x4) r2 = fork() wait4(r2, &(0x7f0000000140), 0x0, 0x0) setpgid(r2, 0x0) tkill(r2, 0x32) [ 1299.052935] BFS-fs: bfs_fill_super(): Superblock is corrupted [ 1299.097921] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1299.097921] 17:05:04 executing program 5: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f0000010000)="cefaad1b", 0x4}, {0x0, 0x0, 0x200}], 0x3, &(0x7f0000000040)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 1299.252277] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1299.252277] 17:05:04 executing program 1: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100", 0x6, 0x8000}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:05:04 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)='J', 0x1, 0x8000}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:05:04 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) execveat(r1, &(0x7f0000000080)='./file0\x00', &(0x7f0000000280)=[&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='\x00', &(0x7f0000000180)='(\xa3+[\x00', &(0x7f00000001c0)='nointegrity', &(0x7f0000000240)='jfs\x00'], &(0x7f0000000440)=[&(0x7f0000000300)='nointegrity', &(0x7f0000000340)='&\x00', &(0x7f0000000380)='!{%(-Y%,[]\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\'\x00'], 0x800) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0xf99}, {&(0x7f0000000140)="10c4645f010000000100000093426c74c863dd927ca64476d6a4ceaac22c7850f6b1fd59f307019187dce4e3164150a90000000000000000", 0x38, 0xb200}], 0x0, &(0x7f0000000480)={[{@usrquota='usrquota'}]}) 17:05:04 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645b01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) [ 1299.408145] BFS-fs: bfs_fill_super(): Superblock is corrupted 17:05:04 executing program 5: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f0000010000)="cefaad1b", 0x4}, {0x0, 0x0, 0x200}], 0x3, &(0x7f0000000040)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) 17:05:04 executing program 1: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)='J', 0x1, 0x8000}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) [ 1299.592965] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1299.592965] 17:05:04 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f0000000280)=[&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='\x00', &(0x7f0000000180)='(\xa3+[\x00', &(0x7f00000001c0)='nointegrity', &(0x7f0000000240)='jfs\x00'], &(0x7f0000000440)=[&(0x7f0000000300)='nointegrity', &(0x7f0000000340)='&\x00', &(0x7f0000000380)='!{%(-Y%,[]\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\'\x00'], 0x800) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0xf99}, {&(0x7f0000000140)="10c4645f010000000100000093426c74c863dd927ca64476d6a4ceaac22c7850f6b1fd59f307019187dce4e3164150a90000000000000000", 0x38, 0xb200}], 0x0, &(0x7f0000000480)={[{@usrquota='usrquota'}]}) 17:05:04 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)='JFS1', 0x4, 0x8000}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) [ 1299.696633] BFS-fs: bfs_fill_super(): Superblock is corrupted 17:05:05 executing program 5: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f0000010000)="cefaad1b", 0x4}, {0x0, 0x0, 0x200}], 0x3, &(0x7f0000000040)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) 17:05:05 executing program 1: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)='J', 0x1, 0x8000}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) [ 1299.775445] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1299.775445] [ 1299.953896] BFS-fs: bfs_fill_super(): Superblock is corrupted 17:05:05 executing program 0: socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f0000000480)={0x0, 0xfb, 0x84, 0x0, 0x3, "48d26d032ccc146906a78db4aacb9e98", "1a78fee3cb9e845981a61fd12539cbc472cf90ccf7b35e9c22ba97ed9edd98ac4dff6070dd4d697d75d88eaa028caf1bf980a2f0f8285df93bcdf403effbf6cd693848677d27e71b5912c861902297b63d46d89d9b380254b124227581e2e9af90da4ba161d932c91acf51307f2e67"}, 0x84, 0x3) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f0000000280)=ANY=[@ANYBLOB="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"]) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x4, 0x0, 0x3, 0x3, 0x0, 0xffff, 0x10000, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x4}, 0x9860, 0x401, 0x7fffffff, 0x1, 0x1, 0x9a, 0x7}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0xa, &(0x7f00000000c0)=0xbb1, 0x4) r2 = fork() wait4(r2, &(0x7f0000000140), 0x0, 0x0) setpgid(r2, 0x0) tkill(r2, 0x32) 17:05:05 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)='JF', 0x2, 0x8000}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:05:05 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645c01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:05:05 executing program 1: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)='J', 0x1, 0x8000}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:05:05 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f0000000280)=[&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='\x00', &(0x7f0000000180)='(\xa3+[\x00', &(0x7f00000001c0)='nointegrity', &(0x7f0000000240)='jfs\x00'], &(0x7f0000000440)=[&(0x7f0000000300)='nointegrity', &(0x7f0000000340)='&\x00', &(0x7f0000000380)='!{%(-Y%,[]\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\'\x00'], 0x800) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0xf99}, {&(0x7f0000000140)="10c4645f010000000100000093426c74c863dd927ca64476d6a4ceaac22c7850f6b1fd59f307019187dce4e3164150a90000000000000000", 0x38, 0xb200}], 0x0, &(0x7f0000000480)={[{@usrquota='usrquota'}]}) 17:05:05 executing program 5: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f0000010000)="cefaad1b", 0x4}, {0x0, 0x0, 0x200}], 0x3, &(0x7f0000000040)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) [ 1300.093759] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1300.093759] 17:05:05 executing program 1: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)='JFS1', 0x4, 0x8000}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:05:05 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f0000000280)=[&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='\x00', &(0x7f0000000180)='(\xa3+[\x00', &(0x7f00000001c0)='nointegrity', &(0x7f0000000240)='jfs\x00'], &(0x7f0000000440)=[&(0x7f0000000300)='nointegrity', &(0x7f0000000340)='&\x00', &(0x7f0000000380)='!{%(-Y%,[]\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\'\x00'], 0x800) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0xf99}, {&(0x7f0000000140)="10c4645f010000000100000093426c74c863dd927ca64476d6a4ceaac22c7850f6b1fd59f307019187dce4e3164150a90000000000000000", 0x38, 0xb200}], 0x0, &(0x7f0000000480)={[{@usrquota='usrquota'}]}) 17:05:05 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)='JF', 0x2, 0x8000}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) [ 1300.254910] BFS-fs: bfs_fill_super(): Superblock is corrupted [ 1300.275268] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1300.275268] 17:05:05 executing program 5: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f0000010000)="cefaad1b", 0x4}, {0x0, 0x0, 0x200}], 0x3, &(0x7f0000000040)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 17:05:05 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645d01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:05:05 executing program 1: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)='JF', 0x2, 0x8000}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) [ 1300.551135] BFS-fs: bfs_fill_super(): Superblock is corrupted [ 1300.570775] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1300.570775] [ 1300.772155] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1300.772155] 17:05:06 executing program 0: socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f0000000480)={0x0, 0xfb, 0x84, 0x0, 0x3, "48d26d032ccc146906a78db4aacb9e98", "1a78fee3cb9e845981a61fd12539cbc472cf90ccf7b35e9c22ba97ed9edd98ac4dff6070dd4d697d75d88eaa028caf1bf980a2f0f8285df93bcdf403effbf6cd693848677d27e71b5912c861902297b63d46d89d9b380254b124227581e2e9af90da4ba161d932c91acf51307f2e67"}, 0x84, 0x3) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f0000000280)=ANY=[@ANYBLOB="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"]) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x4, 0x0, 0x3, 0x3, 0x0, 0xffff, 0x10000, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x4}, 0x9860, 0x401, 0x7fffffff, 0x1, 0x1, 0x9a, 0x7}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0xa, &(0x7f00000000c0)=0xbb1, 0x4) r2 = fork() wait4(r2, &(0x7f0000000140), 0x0, 0x0) setpgid(r2, 0x0) tkill(r2, 0x32) 17:05:06 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000280)=[&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='\x00', &(0x7f0000000180)='(\xa3+[\x00', &(0x7f00000001c0)='nointegrity', &(0x7f0000000240)='jfs\x00'], &(0x7f0000000440)=[&(0x7f0000000300)='nointegrity', &(0x7f0000000340)='&\x00', &(0x7f0000000380)='!{%(-Y%,[]\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\'\x00'], 0x800) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0xf99}, {&(0x7f0000000140)="10c4645f010000000100000093426c74c863dd927ca64476d6a4ceaac22c7850f6b1fd59f307019187dce4e3164150a90000000000000000", 0x38, 0xb200}], 0x0, &(0x7f0000000480)={[{@usrquota='usrquota'}]}) 17:05:06 executing program 1: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)='JF', 0x2, 0x8000}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:05:06 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)='JF', 0x2, 0x8000}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:05:06 executing program 5: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f0000010000)="cefaad1b", 0x4}, {0x0, 0x0, 0x200}], 0x3, &(0x7f0000000040)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 17:05:06 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645e01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) [ 1301.071481] BFS-fs: bfs_fill_super(): Superblock is corrupted 17:05:06 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000280)=[&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='\x00', &(0x7f0000000180)='(\xa3+[\x00', &(0x7f00000001c0)='nointegrity', &(0x7f0000000240)='jfs\x00'], &(0x7f0000000440)=[&(0x7f0000000300)='nointegrity', &(0x7f0000000340)='&\x00', &(0x7f0000000380)='!{%(-Y%,[]\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\'\x00'], 0x800) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0xf99}, {&(0x7f0000000140)="10c4645f010000000100000093426c74c863dd927ca64476d6a4ceaac22c7850f6b1fd59f307019187dce4e3164150a90000000000000000", 0x38, 0xb200}], 0x0, &(0x7f0000000480)={[{@usrquota='usrquota'}]}) [ 1301.167468] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1301.167468] 17:05:06 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)='JFS', 0x3, 0x8000}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:05:06 executing program 5: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f0000010000)="cefaad1b", 0x4}, {0x0, 0x0, 0x200}], 0x3, &(0x7f0000000040)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 17:05:06 executing program 1: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)='JF', 0x2, 0x8000}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:05:06 executing program 0: socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f0000000480)={0x0, 0xfb, 0x84, 0x0, 0x3, "48d26d032ccc146906a78db4aacb9e98", "1a78fee3cb9e845981a61fd12539cbc472cf90ccf7b35e9c22ba97ed9edd98ac4dff6070dd4d697d75d88eaa028caf1bf980a2f0f8285df93bcdf403effbf6cd693848677d27e71b5912c861902297b63d46d89d9b380254b124227581e2e9af90da4ba161d932c91acf51307f2e67"}, 0x84, 0x3) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f0000000280)=ANY=[@ANYBLOB="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"]) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x4, 0x0, 0x3, 0x3, 0x0, 0xffff, 0x10000, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x4}, 0x9860, 0x401, 0x7fffffff, 0x1, 0x1, 0x9a, 0x7}, 0x0, 0x1, 0xffffffffffffffff, 0x8) socket$inet(0x2, 0x4000000000000001, 0x0) r1 = fork() wait4(r1, &(0x7f0000000140), 0x0, 0x0) setpgid(r1, 0x0) tkill(r1, 0x32) [ 1301.299462] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1301.299462] 17:05:06 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c464bf01000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:05:06 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)='JFS', 0x3, 0x8000}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) [ 1301.462629] BFS-fs: bfs_fill_super(): Superblock is corrupted 17:05:06 executing program 1: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)='JFS', 0x3, 0x8000}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:05:06 executing program 5: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f0000010000)="cefaad1b", 0x4}, {0x0, 0x0, 0x200}], 0x3, &(0x7f0000000040)=ANY=[]) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 17:05:06 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000280)=[&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='\x00', &(0x7f0000000180)='(\xa3+[\x00', &(0x7f00000001c0)='nointegrity', &(0x7f0000000240)='jfs\x00'], &(0x7f0000000440)=[&(0x7f0000000300)='nointegrity', &(0x7f0000000340)='&\x00', &(0x7f0000000380)='!{%(-Y%,[]\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\'\x00'], 0x800) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0xf99}, {&(0x7f0000000140)="10c4645f010000000100000093426c74c863dd927ca64476d6a4ceaac22c7850f6b1fd59f307019187dce4e3164150a90000000000000000", 0x38, 0xb200}], 0x0, &(0x7f0000000480)={[{@usrquota='usrquota'}]}) [ 1301.612786] ieee802154 phy0 wpan0: encryption failed: -22 [ 1301.618808] ieee802154 phy1 wpan1: encryption failed: -22 [ 1301.651628] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1301.651628] 17:05:07 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)='JFS', 0x3, 0x8000}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) [ 1301.765481] BFS-fs: bfs_fill_super(): Superblock is corrupted 17:05:07 executing program 5: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f0000010000)="cefaad1b", 0x4}, {0x0, 0x0, 0x200}], 0x3, &(0x7f0000000040)=ANY=[]) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 1301.806078] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1301.806078] 17:05:07 executing program 1: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)='JFS', 0x3, 0x8000}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:05:07 executing program 2: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000280)=[&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='\x00', &(0x7f0000000180)='(\xa3+[\x00', &(0x7f00000001c0)='nointegrity', &(0x7f0000000240)='jfs\x00'], &(0x7f0000000440)=[&(0x7f0000000300)='nointegrity', &(0x7f0000000340)='&\x00', &(0x7f0000000380)='!{%(-Y%,[]\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\'\x00'], 0x800) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0xf99}, {&(0x7f0000000140)="10c4645f010000000100000093426c74c863dd927ca64476d6a4ceaac22c7850f6b1fd59f307019187dce4e3164150a90000000000000000", 0x38, 0xb200}], 0x0, &(0x7f0000000480)={[{@usrquota='usrquota'}]}) 17:05:07 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f02000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:05:07 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)='JFS1', 0x4}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) [ 1302.022306] BFS-fs: bfs_fill_super(): Superblock is corrupted [ 1302.084719] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1302.084719] 17:05:07 executing program 0: socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f0000000480)={0x0, 0xfb, 0x84, 0x0, 0x3, "48d26d032ccc146906a78db4aacb9e98", "1a78fee3cb9e845981a61fd12539cbc472cf90ccf7b35e9c22ba97ed9edd98ac4dff6070dd4d697d75d88eaa028caf1bf980a2f0f8285df93bcdf403effbf6cd693848677d27e71b5912c861902297b63d46d89d9b380254b124227581e2e9af90da4ba161d932c91acf51307f2e67"}, 0x84, 0x3) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f0000000280)=ANY=[@ANYBLOB="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"]) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x4, 0x0, 0x3, 0x3, 0x0, 0xffff, 0x10000, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x4}, 0x9860, 0x401, 0x7fffffff, 0x1, 0x1, 0x9a, 0x7}, 0x0, 0x1, 0xffffffffffffffff, 0x8) socket$inet(0x2, 0x4000000000000001, 0x0) r1 = fork() wait4(r1, &(0x7f0000000140), 0x0, 0x0) setpgid(r1, 0x0) tkill(r1, 0x32) 17:05:07 executing program 1: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)='JFS', 0x3, 0x8000}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:05:07 executing program 2: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000280)=[&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='\x00', &(0x7f0000000180)='(\xa3+[\x00', &(0x7f00000001c0)='nointegrity', &(0x7f0000000240)='jfs\x00'], &(0x7f0000000440)=[&(0x7f0000000300)='nointegrity', &(0x7f0000000340)='&\x00', &(0x7f0000000380)='!{%(-Y%,[]\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\'\x00'], 0x800) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0xf99}, {&(0x7f0000000140)="10c4645f010000000100000093426c74c863dd927ca64476d6a4ceaac22c7850f6b1fd59f307019187dce4e3164150a90000000000000000", 0x38, 0xb200}], 0x0, &(0x7f0000000480)={[{@usrquota='usrquota'}]}) 17:05:07 executing program 5: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f0000010000)="cefaad1b", 0x4}, {0x0, 0x0, 0x200}], 0x3, &(0x7f0000000040)=ANY=[]) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 17:05:07 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f03000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:05:07 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)='JFS1', 0x4}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:05:07 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)='JFS1', 0x4}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:05:07 executing program 1: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)='JFS1', 0x4}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) [ 1302.351671] BFS-fs: bfs_fill_super(): Superblock is corrupted [ 1302.393252] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1302.393252] 17:05:07 executing program 2: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000280)=[&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='\x00', &(0x7f0000000180)='(\xa3+[\x00', &(0x7f00000001c0)='nointegrity', &(0x7f0000000240)='jfs\x00'], &(0x7f0000000440)=[&(0x7f0000000300)='nointegrity', &(0x7f0000000340)='&\x00', &(0x7f0000000380)='!{%(-Y%,[]\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\'\x00'], 0x800) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0xf99}, {&(0x7f0000000140)="10c4645f010000000100000093426c74c863dd927ca64476d6a4ceaac22c7850f6b1fd59f307019187dce4e3164150a90000000000000000", 0x38, 0xb200}], 0x0, &(0x7f0000000480)={[{@usrquota='usrquota'}]}) 17:05:07 executing program 5: syz_mount_image$bfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f0000010000)="cefaad1b", 0x4}, {0x0, 0x0, 0x200}], 0x3, &(0x7f0000000040)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 17:05:07 executing program 0: socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f0000000480)={0x0, 0xfb, 0x84, 0x0, 0x3, "48d26d032ccc146906a78db4aacb9e98", "1a78fee3cb9e845981a61fd12539cbc472cf90ccf7b35e9c22ba97ed9edd98ac4dff6070dd4d697d75d88eaa028caf1bf980a2f0f8285df93bcdf403effbf6cd693848677d27e71b5912c861902297b63d46d89d9b380254b124227581e2e9af90da4ba161d932c91acf51307f2e67"}, 0x84, 0x3) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f0000000280)=ANY=[@ANYBLOB="00005200514ae9f125090000e3ddd5741f43b1912a7d4430e532d5bd4e332f724900001aeacfabd5667bc58bec327653674169f8b4c8908d3fbdc0320df8c8a2b67383249930234ae6af4500ef08383580af9121ca4dcd55006044e996b6993f6a1422ddc5ed3599f14080e0108171a616346079f745ed97a7fb1952e083bb57fbf4bc5ca92acf54fcab92810d7924b0e437d8e736b1008ce1b42450f8b47b97f33e1b9128fcb3dec3517fb95e62d7fccf859301ce17d75a67cf08a98a22e465dcc16b912663af711bae9bd67065d327d13adf4cec5f6103d0c8fbb5b8293d336b2b15c2f1ca13acc79195b4302e269602696e94bc6de1ad67c996c00f5b35ccf09853c3367f2ac8dcbd54588908c348e6d179210a3e0fbab349f013df39eeb713e04427f786cf825556016a3e87adeebc7de8c940d06309b56a9d0cf98b801fbfaa9996233167"]) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x4, 0x0, 0x3, 0x3, 0x0, 0xffff, 0x10000, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x4}, 0x9860, 0x401, 0x7fffffff, 0x1, 0x1, 0x9a, 0x7}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r1 = fork() wait4(r1, &(0x7f0000000140), 0x0, 0x0) setpgid(r1, 0x0) tkill(r1, 0x32) 17:05:07 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f04000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:05:07 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)='JFS1', 0x4, 0x8000}], 0x0, 0x0) 17:05:07 executing program 1: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)='JFS1', 0x4}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:05:07 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000280)=[&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='\x00', &(0x7f0000000180)='(\xa3+[\x00', &(0x7f00000001c0)='nointegrity', &(0x7f0000000240)='jfs\x00'], &(0x7f0000000440)=[&(0x7f0000000300)='nointegrity', &(0x7f0000000340)='&\x00', &(0x7f0000000380)='!{%(-Y%,[]\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\'\x00'], 0x800) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0xf99}, {&(0x7f0000000140)="10c4645f010000000100000093426c74c863dd927ca64476d6a4ceaac22c7850f6b1fd59f307019187dce4e3164150a90000000000000000", 0x38, 0xb200}], 0x0, &(0x7f0000000480)={[{@usrquota='usrquota'}]}) 17:05:07 executing program 5: syz_mount_image$bfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f0000010000)="cefaad1b", 0x4}, {0x0, 0x0, 0x200}], 0x3, &(0x7f0000000040)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 17:05:07 executing program 0: socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f0000000480)={0x0, 0xfb, 0x84, 0x0, 0x3, "48d26d032ccc146906a78db4aacb9e98", "1a78fee3cb9e845981a61fd12539cbc472cf90ccf7b35e9c22ba97ed9edd98ac4dff6070dd4d697d75d88eaa028caf1bf980a2f0f8285df93bcdf403effbf6cd693848677d27e71b5912c861902297b63d46d89d9b380254b124227581e2e9af90da4ba161d932c91acf51307f2e67"}, 0x84, 0x3) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f0000000280)=ANY=[@ANYBLOB="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"]) r1 = fork() wait4(r1, &(0x7f0000000140), 0x0, 0x0) setpgid(r1, 0x0) tkill(r1, 0x32) 17:05:08 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000280)=[&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='\x00', &(0x7f0000000180)='(\xa3+[\x00', &(0x7f00000001c0)='nointegrity', &(0x7f0000000240)='jfs\x00'], &(0x7f0000000440)=[&(0x7f0000000300)='nointegrity', &(0x7f0000000340)='&\x00', &(0x7f0000000380)='!{%(-Y%,[]\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\'\x00'], 0x800) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0xf99}, {&(0x7f0000000140)="10c4645f010000000100000093426c74c863dd927ca64476d6a4ceaac22c7850f6b1fd59f307019187dce4e3164150a90000000000000000", 0x38, 0xb200}], 0x0, &(0x7f0000000480)={[{@usrquota='usrquota'}]}) [ 1302.841904] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1302.841904] 17:05:08 executing program 1: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)='JFS1', 0x4}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:05:08 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000280)=[&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='\x00', &(0x7f0000000180)='(\xa3+[\x00', &(0x7f00000001c0)='nointegrity', &(0x7f0000000240)='jfs\x00'], &(0x7f0000000440)=[&(0x7f0000000300)='nointegrity', &(0x7f0000000340)='&\x00', &(0x7f0000000380)='!{%(-Y%,[]\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\'\x00'], 0x800) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0xf99}, {&(0x7f0000000140)="10c4645f010000000100000093426c74c863dd927ca64476d6a4ceaac22c7850f6b1fd59f307019187dce4e3164150a90000000000000000", 0x38, 0xb200}], 0x0, &(0x7f0000000480)={[{@usrquota='usrquota'}]}) 17:05:08 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)='JFS1', 0x4, 0x8000}], 0x0, 0x0) 17:05:08 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000280)=[&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='\x00', &(0x7f0000000180)='(\xa3+[\x00', &(0x7f00000001c0)='nointegrity', &(0x7f0000000240)='jfs\x00'], &(0x7f0000000440)=[&(0x7f0000000300)='nointegrity', &(0x7f0000000340)='&\x00', &(0x7f0000000380)='!{%(-Y%,[]\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\'\x00'], 0x800) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0xf99}, {&(0x7f0000000140)="10c4645f010000000100000093426c74c863dd927ca64476d6a4ceaac22c7850f6b1fd59f307019187dce4e3164150a90000000000000000", 0x38, 0xb200}], 0x0, &(0x7f0000000480)={[{@usrquota='usrquota'}]}) 17:05:08 executing program 5: syz_mount_image$bfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f0000010000)="cefaad1b", 0x4}, {0x0, 0x0, 0x200}], 0x3, &(0x7f0000000040)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 1303.087819] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1303.087819] 17:05:08 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f05000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:05:08 executing program 1: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)='JFS1', 0x4, 0x8000}], 0x0, 0x0) 17:05:08 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)='JFS1', 0x4, 0x8000}], 0x0, 0x0) 17:05:08 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000280)=[&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='\x00', &(0x7f0000000180)='(\xa3+[\x00', &(0x7f00000001c0)='nointegrity', &(0x7f0000000240)='jfs\x00'], &(0x7f0000000440)=[&(0x7f0000000300)='nointegrity', &(0x7f0000000340)='&\x00', &(0x7f0000000380)='!{%(-Y%,[]\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\'\x00'], 0x800) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0xf99}, {&(0x7f0000000140)="10c4645f010000000100000093426c74c863dd927ca64476d6a4ceaac22c7850f6b1fd59f307019187dce4e3164150a90000000000000000", 0x38, 0xb200}], 0x0, &(0x7f0000000480)={[{@usrquota='usrquota'}]}) 17:05:08 executing program 1: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)='JFS1', 0x4, 0x8000}], 0x0, 0x0) [ 1303.465798] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1303.465798] 17:05:08 executing program 0: socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f0000000480)={0x0, 0xfb, 0x84, 0x0, 0x3, "48d26d032ccc146906a78db4aacb9e98", "1a78fee3cb9e845981a61fd12539cbc472cf90ccf7b35e9c22ba97ed9edd98ac4dff6070dd4d697d75d88eaa028caf1bf980a2f0f8285df93bcdf403effbf6cd693848677d27e71b5912c861902297b63d46d89d9b380254b124227581e2e9af90da4ba161d932c91acf51307f2e67"}, 0x84, 0x3) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f0000000280)=ANY=[@ANYBLOB="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"]) r1 = fork() wait4(r1, &(0x7f0000000140), 0x0, 0x0) setpgid(r1, 0x0) tkill(r1, 0x32) 17:05:08 executing program 5: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f0000010000)="cefaad1b", 0x4}, {0x0, 0x0, 0x200}], 0x3, &(0x7f0000000040)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 17:05:08 executing program 1: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)='JFS1', 0x4, 0x8000}], 0x0, 0x0) 17:05:08 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000280)=[&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='\x00', &(0x7f0000000180)='(\xa3+[\x00', &(0x7f00000001c0)='nointegrity', &(0x7f0000000240)='jfs\x00'], &(0x7f0000000440)=[&(0x7f0000000300)='nointegrity', &(0x7f0000000340)='&\x00', &(0x7f0000000380)='!{%(-Y%,[]\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\'\x00'], 0x800) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0xf99}, {&(0x7f0000000140)="10c4645f010000000100000093426c74c863dd927ca64476d6a4ceaac22c7850f6b1fd59f307019187dce4e3164150a90000000000000000", 0x38, 0xb200}], 0x0, &(0x7f0000000480)={[{@usrquota='usrquota'}]}) 17:05:08 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)='JFS1', 0x4, 0x8000}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) 17:05:09 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f06000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:05:09 executing program 1: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)='JFS1', 0x4, 0x8000}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) 17:05:09 executing program 0: socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f0000000480)={0x0, 0xfb, 0x84, 0x0, 0x3, "48d26d032ccc146906a78db4aacb9e98", "1a78fee3cb9e845981a61fd12539cbc472cf90ccf7b35e9c22ba97ed9edd98ac4dff6070dd4d697d75d88eaa028caf1bf980a2f0f8285df93bcdf403effbf6cd693848677d27e71b5912c861902297b63d46d89d9b380254b124227581e2e9af90da4ba161d932c91acf51307f2e67"}, 0x84, 0x3) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r0 = fork() wait4(r0, &(0x7f0000000140), 0x0, 0x0) setpgid(r0, 0x0) tkill(r0, 0x32) 17:05:09 executing program 5: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f0000010000)="cefaad1b", 0x4}, {0x0, 0x0, 0x200}], 0x3, &(0x7f0000000040)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 17:05:09 executing program 0: socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f0000000480)={0x0, 0xfb, 0x84, 0x0, 0x3, "48d26d032ccc146906a78db4aacb9e98", "1a78fee3cb9e845981a61fd12539cbc472cf90ccf7b35e9c22ba97ed9edd98ac4dff6070dd4d697d75d88eaa028caf1bf980a2f0f8285df93bcdf403effbf6cd693848677d27e71b5912c861902297b63d46d89d9b380254b124227581e2e9af90da4ba161d932c91acf51307f2e67"}, 0x84, 0x3) r0 = fork() wait4(r0, &(0x7f0000000140), 0x0, 0x0) setpgid(r0, 0x0) tkill(r0, 0x32) [ 1304.000628] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1304.000628] 17:05:09 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000280)=[&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='\x00', &(0x7f0000000180)='(\xa3+[\x00', &(0x7f00000001c0)='nointegrity', &(0x7f0000000240)='jfs\x00'], &(0x7f0000000440)=[&(0x7f0000000300)='nointegrity', &(0x7f0000000340)='&\x00', &(0x7f0000000380)='!{%(-Y%,[]\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\'\x00'], 0x800) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0xf99}, {&(0x7f0000000140)="10c4645f010000000100000093426c74c863dd927ca64476d6a4ceaac22c7850f6b1fd59f307019187dce4e3164150a90000000000000000", 0x38, 0xb200}], 0x0, &(0x7f0000000480)={[{@usrquota='usrquota'}]}) 17:05:09 executing program 5: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f0000010000)="cefaad1b", 0x4}, {0x0, 0x0, 0x200}], 0x3, &(0x7f0000000040)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 17:05:09 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f07000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:05:09 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)='JFS1', 0x4, 0x8000}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}]}) 17:05:09 executing program 1: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)='JFS1', 0x4, 0x8000}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}]}) 17:05:09 executing program 0: socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f0000000480)={0x0, 0xfb, 0x84, 0x0, 0x3, "48d26d032ccc146906a78db4aacb9e98", "1a78fee3cb9e845981a61fd12539cbc472cf90ccf7b35e9c22ba97ed9edd98ac4dff6070dd4d697d75d88eaa028caf1bf980a2f0f8285df93bcdf403effbf6cd693848677d27e71b5912c861902297b63d46d89d9b380254b124227581e2e9af90da4ba161d932c91acf51307f2e67"}, 0x84, 0x3) r0 = fork() wait4(r0, &(0x7f0000000140), 0x0, 0x0) setpgid(r0, 0x0) tkill(r0, 0x32) [ 1304.335992] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1304.335992] 17:05:09 executing program 5: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x3, &(0x7f0000000040)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 17:05:09 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)='JFS1', 0x4, 0x8000}], 0x0, &(0x7f00000000c0)) 17:05:09 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000280)=[&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='\x00', &(0x7f0000000180)='(\xa3+[\x00', &(0x7f00000001c0)='nointegrity', &(0x7f0000000240)='jfs\x00'], &(0x7f0000000440)=[&(0x7f0000000300)='nointegrity', &(0x7f0000000340)='&\x00', &(0x7f0000000380)='!{%(-Y%,[]\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\'\x00'], 0x800) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0xf99}, {&(0x7f0000000140)="10c4645f010000000100000093426c74c863dd927ca64476d6a4ceaac22c7850f6b1fd59f307019187dce4e3164150a90000000000000000", 0x38, 0xb200}], 0x0, &(0x7f0000000480)={[{@usrquota='usrquota'}]}) 17:05:09 executing program 1: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)='JFS1', 0x4, 0x8000}], 0x0, &(0x7f00000000c0)) 17:05:09 executing program 5: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x3, &(0x7f0000000040)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 1304.596734] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1304.596734] 17:05:09 executing program 0: socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f0000000480)={0x0, 0xfb, 0x84, 0x0, 0x3, "48d26d032ccc146906a78db4aacb9e98", "1a78fee3cb9e845981a61fd12539cbc472cf90ccf7b35e9c22ba97ed9edd98ac4dff6070dd4d697d75d88eaa028caf1bf980a2f0f8285df93bcdf403effbf6cd693848677d27e71b5912c861902297b63d46d89d9b380254b124227581e2e9af90da4ba161d932c91acf51307f2e67"}, 0x84, 0x3) r0 = fork() wait4(r0, &(0x7f0000000140), 0x0, 0x0) setpgid(r0, 0x0) tkill(r0, 0x32) 17:05:09 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f08000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:05:09 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000280)=[&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='\x00', &(0x7f0000000180)='(\xa3+[\x00', &(0x7f00000001c0)='nointegrity', &(0x7f0000000240)='jfs\x00'], &(0x7f0000000440)=[&(0x7f0000000300)='nointegrity', &(0x7f0000000340)='&\x00', &(0x7f0000000380)='!{%(-Y%,[]\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\'\x00'], 0x800) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0xf99}, {&(0x7f0000000140)="10c4645f010000000100000093426c74c863dd927ca64476d6a4ceaac22c7850f6b1fd59f307019187dce4e3164150a90000000000000000", 0x38, 0xb200}], 0x0, &(0x7f0000000480)={[{@usrquota='usrquota'}]}) 17:05:10 executing program 5: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x3, &(0x7f0000000040)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 17:05:10 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f0000000480)={0x0, 0xfb, 0x84, 0x0, 0x3, "48d26d032ccc146906a78db4aacb9e98", "1a78fee3cb9e845981a61fd12539cbc472cf90ccf7b35e9c22ba97ed9edd98ac4dff6070dd4d697d75d88eaa028caf1bf980a2f0f8285df93bcdf403effbf6cd693848677d27e71b5912c861902297b63d46d89d9b380254b124227581e2e9af90da4ba161d932c91acf51307f2e67"}, 0x84, 0x3) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f0000000280)=ANY=[@ANYBLOB="00005200514ae9f125090000e3ddd5741f43b1912a7d4430e532d5bd4e332f724900001aeacfabd5667bc58bec327653674169f8b4c8908d3fbdc0320df8c8a2b67383249930234ae6af4500ef08383580af9121ca4dcd55006044e996b6993f6a1422ddc5ed3599f14080e0108171a616346079f745ed97a7fb1952e083bb57fbf4bc5ca92acf54fcab92810d7924b0e437d8e736b1008ce1b42450f8b47b97f33e1b9128fcb3dec3517fb95e62d7fccf859301ce17d75a67cf08a98a22e465dcc16b912663af711bae9bd67065d327d13adf4cec5f6103d0c8fbb5b8293d336b2b15c2f1ca13acc79195b4302e269602696e94bc6de1ad67c996c00f5b35ccf09853c3367f2ac8dcbd54588908c348e6d179210a3e0fbab349f013df39eeb713e04427f786cf825556016a3e87adeebc7de8c940d06309b56a9d0cf98b801fbfaa9996233167"]) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x4, 0x0, 0x3, 0x3, 0x0, 0xffff, 0x10000, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x4}, 0x9860, 0x401, 0x7fffffff, 0x1, 0x1, 0x9a, 0x7}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r1 = fork() wait4(r1, &(0x7f0000000140), 0x0, 0x0) setpgid(r1, 0x0) tkill(r1, 0x32) [ 1304.885490] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1304.885490] 17:05:10 executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f0000000480)={0x0, 0xfb, 0x84, 0x0, 0x3, "48d26d032ccc146906a78db4aacb9e98", "1a78fee3cb9e845981a61fd12539cbc472cf90ccf7b35e9c22ba97ed9edd98ac4dff6070dd4d697d75d88eaa028caf1bf980a2f0f8285df93bcdf403effbf6cd693848677d27e71b5912c861902297b63d46d89d9b380254b124227581e2e9af90da4ba161d932c91acf51307f2e67"}, 0x84, 0x3) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f0000000280)=ANY=[@ANYBLOB="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"]) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x4, 0x0, 0x3, 0x3, 0x0, 0xffff, 0x10000, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x4}, 0x9860, 0x401, 0x7fffffff, 0x1, 0x1, 0x9a, 0x7}, 0x0, 0x1, 0xffffffffffffffff, 0x8) socket$inet(0x2, 0x4000000000000001, 0x0) r1 = fork() wait4(r1, &(0x7f0000000140), 0x0, 0x0) setpgid(r1, 0x0) tkill(r1, 0x32) 17:05:10 executing program 5: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000010000)="cefaad1b", 0x4}], 0x3, &(0x7f0000000040)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 1304.995752] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1304.995752] 17:05:10 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000280)=[&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='\x00', &(0x7f0000000180)='(\xa3+[\x00', &(0x7f00000001c0)='nointegrity', &(0x7f0000000240)='jfs\x00'], &(0x7f0000000440)=[&(0x7f0000000300)='nointegrity', &(0x7f0000000340)='&\x00', &(0x7f0000000380)='!{%(-Y%,[]\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\'\x00'], 0x800) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0xf99}, {&(0x7f0000000140)="10c4645f010000000100000093426c74c863dd927ca64476d6a4ceaac22c7850f6b1fd59f307019187dce4e3164150a90000000000000000", 0x38, 0xb200}], 0x0, &(0x7f0000000480)={[{@usrquota='usrquota'}]}) 17:05:10 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f09000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) [ 1305.249836] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) [ 1305.363573] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1305.363573] 17:05:10 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000280)=[&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='\x00', &(0x7f0000000180)='(\xa3+[\x00', &(0x7f00000001c0)='nointegrity', &(0x7f0000000240)='jfs\x00'], &(0x7f0000000440)=[&(0x7f0000000300)='nointegrity', &(0x7f0000000340)='&\x00', &(0x7f0000000380)='!{%(-Y%,[]\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\'\x00'], 0x800) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0xf99}, {&(0x7f0000000140)="10c4645f010000000100000093426c74c863dd927ca64476d6a4ceaac22c7850f6b1fd59f307019187dce4e3164150a90000000000000000", 0x38, 0xb200}], 0x0, &(0x7f0000000480)={[{@usrquota='usrquota'}]}) 17:05:10 executing program 5: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000010000)="cefaad1b", 0x4}], 0x3, &(0x7f0000000040)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 17:05:10 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f0a000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:05:10 executing program 0: socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r0 = fork() wait4(r0, &(0x7f0000000140), 0x0, 0x0) setpgid(r0, 0x0) tkill(r0, 0x32) 17:05:10 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000280)=[&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='\x00', &(0x7f0000000180)='(\xa3+[\x00', &(0x7f00000001c0)='nointegrity', &(0x7f0000000240)='jfs\x00'], &(0x7f0000000440)=[&(0x7f0000000300)='nointegrity', &(0x7f0000000340)='&\x00', &(0x7f0000000380)='!{%(-Y%,[]\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\'\x00'], 0x800) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0xf99}, {&(0x7f0000000140)="10c4645f010000000100000093426c74c863dd927ca64476d6a4ceaac22c7850f6b1fd59f307019187dce4e3164150a90000000000000000", 0x38, 0xb200}], 0x0, &(0x7f0000000480)={[{@usrquota='usrquota'}]}) [ 1305.635546] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) 17:05:10 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f0000000480)={0x0, 0xfb, 0x84, 0x0, 0x3, "48d26d032ccc146906a78db4aacb9e98", "1a78fee3cb9e845981a61fd12539cbc472cf90ccf7b35e9c22ba97ed9edd98ac4dff6070dd4d697d75d88eaa028caf1bf980a2f0f8285df93bcdf403effbf6cd693848677d27e71b5912c861902297b63d46d89d9b380254b124227581e2e9af90da4ba161d932c91acf51307f2e67"}, 0x84, 0x3) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f0000000280)=ANY=[@ANYBLOB="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"]) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x4, 0x0, 0x3, 0x3, 0x0, 0xffff, 0x10000, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x4}, 0x9860, 0x401, 0x7fffffff, 0x1, 0x1, 0x9a, 0x7}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r1 = fork() wait4(r1, &(0x7f0000000140), 0x0, 0x0) setpgid(r1, 0x0) tkill(r1, 0x32) 17:05:10 executing program 5: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000010000)="cefaad1b", 0x4}], 0x3, &(0x7f0000000040)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 1305.733526] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1305.733526] 17:05:11 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f0b000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:05:11 executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f0000000480)={0x0, 0xfb, 0x84, 0x0, 0x3, "48d26d032ccc146906a78db4aacb9e98", "1a78fee3cb9e845981a61fd12539cbc472cf90ccf7b35e9c22ba97ed9edd98ac4dff6070dd4d697d75d88eaa028caf1bf980a2f0f8285df93bcdf403effbf6cd693848677d27e71b5912c861902297b63d46d89d9b380254b124227581e2e9af90da4ba161d932c91acf51307f2e67"}, 0x84, 0x3) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f0000000280)=ANY=[@ANYBLOB="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"]) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x4, 0x0, 0x3, 0x3, 0x0, 0xffff, 0x10000, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x4}, 0x9860, 0x401, 0x7fffffff, 0x1, 0x1, 0x9a, 0x7}, 0x0, 0x1, 0xffffffffffffffff, 0x8) socket$inet(0x2, 0x4000000000000001, 0x0) r1 = fork() wait4(r1, &(0x7f0000000140), 0x0, 0x0) setpgid(r1, 0x0) tkill(r1, 0x32) 17:05:11 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000280)=[&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='\x00', &(0x7f0000000180)='(\xa3+[\x00', &(0x7f00000001c0)='nointegrity', &(0x7f0000000240)='jfs\x00'], &(0x7f0000000440)=[&(0x7f0000000300)='nointegrity', &(0x7f0000000340)='&\x00', &(0x7f0000000380)='!{%(-Y%,[]\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\'\x00'], 0x800) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0xf99}, {&(0x7f0000000140)="10c4645f010000000100000093426c74c863dd927ca64476d6a4ceaac22c7850f6b1fd59f307019187dce4e3164150a90000000000000000", 0x38, 0xb200}], 0x0, &(0x7f0000000480)={[{@usrquota='usrquota'}]}) [ 1305.888545] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) 17:05:11 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f0000000480)={0x0, 0xfb, 0x84, 0x0, 0x3, "48d26d032ccc146906a78db4aacb9e98", "1a78fee3cb9e845981a61fd12539cbc472cf90ccf7b35e9c22ba97ed9edd98ac4dff6070dd4d697d75d88eaa028caf1bf980a2f0f8285df93bcdf403effbf6cd693848677d27e71b5912c861902297b63d46d89d9b380254b124227581e2e9af90da4ba161d932c91acf51307f2e67"}, 0x84, 0x3) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f0000000280)=ANY=[@ANYBLOB="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"]) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x4, 0x0, 0x3, 0x3, 0x0, 0xffff, 0x10000, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x4}, 0x9860, 0x401, 0x7fffffff, 0x1, 0x1, 0x9a, 0x7}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r1 = fork() wait4(r1, &(0x7f0000000140), 0x0, 0x0) setpgid(r1, 0x0) tkill(r1, 0x32) [ 1306.018052] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1306.018052] 17:05:11 executing program 5: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f0000010000)="cefaad1b", 0x4}, {0x0}], 0x3, &(0x7f0000000040)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 17:05:11 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000280)=[&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='\x00', &(0x7f0000000180)='(\xa3+[\x00', &(0x7f00000001c0)='nointegrity', &(0x7f0000000240)='jfs\x00'], &(0x7f0000000440)=[&(0x7f0000000300)='nointegrity', &(0x7f0000000340)='&\x00', &(0x7f0000000380)='!{%(-Y%,[]\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\'\x00'], 0x800) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0xf99}, {&(0x7f0000000140)="10c4645f010000000100000093426c74c863dd927ca64476d6a4ceaac22c7850f6b1fd59f307019187dce4e3164150a90000000000000000", 0x38, 0xb200}], 0x0, &(0x7f0000000480)={[{@usrquota='usrquota'}]}) [ 1306.196118] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1306.196118] 17:05:11 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f0c000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) [ 1306.362716] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) 17:05:11 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000280)=[&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='\x00', &(0x7f0000000180)='(\xa3+[\x00', &(0x7f00000001c0)='nointegrity', &(0x7f0000000240)='jfs\x00'], &(0x7f0000000440)=[&(0x7f0000000300)='nointegrity', &(0x7f0000000340)='&\x00', &(0x7f0000000380)='!{%(-Y%,[]\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\'\x00'], 0x800) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0xf99}, {&(0x7f0000000140)="10c4645f010000000100000093426c74c863dd927ca64476d6a4ceaac22c7850f6b1fd59f307019187dce4e3164150a90000000000000000", 0x38, 0xb200}], 0x0, &(0x7f0000000480)={[{@usrquota='usrquota'}]}) 17:05:11 executing program 0: socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r0 = fork() wait4(r0, &(0x7f0000000140), 0x0, 0x0) setpgid(r0, 0x0) tkill(r0, 0x32) 17:05:11 executing program 5: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f0000010000)="cefaad1b", 0x4}, {0x0}], 0x3, &(0x7f0000000040)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 1306.607965] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1306.607965] [ 1306.740125] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) [ 1306.755728] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1306.755728] 17:05:12 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000280)=[&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='\x00', &(0x7f0000000180)='(\xa3+[\x00', &(0x7f00000001c0)='nointegrity', &(0x7f0000000240)='jfs\x00'], &(0x7f0000000440)=[&(0x7f0000000300)='nointegrity', &(0x7f0000000340)='&\x00', &(0x7f0000000380)='!{%(-Y%,[]\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\'\x00'], 0x800) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0xf99}, {&(0x7f0000000140)="10c4645f010000000100000093426c74c863dd927ca64476d6a4ceaac22c7850f6b1fd59f307019187dce4e3164150a90000000000000000", 0x38, 0xb200}], 0x0, &(0x7f0000000480)={[{@usrquota='usrquota'}]}) 17:05:12 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f0d000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:05:12 executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f0000000480)={0x0, 0xfb, 0x84, 0x0, 0x3, "48d26d032ccc146906a78db4aacb9e98", "1a78fee3cb9e845981a61fd12539cbc472cf90ccf7b35e9c22ba97ed9edd98ac4dff6070dd4d697d75d88eaa028caf1bf980a2f0f8285df93bcdf403effbf6cd693848677d27e71b5912c861902297b63d46d89d9b380254b124227581e2e9af90da4ba161d932c91acf51307f2e67"}, 0x84, 0x3) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f0000000280)=ANY=[@ANYBLOB="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"]) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x4, 0x0, 0x3, 0x3, 0x0, 0xffff, 0x10000, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x4}, 0x9860, 0x401, 0x7fffffff, 0x1, 0x1, 0x9a, 0x7}, 0x0, 0x1, 0xffffffffffffffff, 0x8) socket$inet(0x2, 0x4000000000000001, 0x0) r1 = fork() wait4(r1, &(0x7f0000000140), 0x0, 0x0) setpgid(r1, 0x0) tkill(r1, 0x32) 17:05:12 executing program 5: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f0000010000)="cefaad1b", 0x4}, {0x0}], 0x3, &(0x7f0000000040)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 17:05:12 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f0000000480)={0x0, 0xfb, 0x84, 0x0, 0x3, "48d26d032ccc146906a78db4aacb9e98", "1a78fee3cb9e845981a61fd12539cbc472cf90ccf7b35e9c22ba97ed9edd98ac4dff6070dd4d697d75d88eaa028caf1bf980a2f0f8285df93bcdf403effbf6cd693848677d27e71b5912c861902297b63d46d89d9b380254b124227581e2e9af90da4ba161d932c91acf51307f2e67"}, 0x84, 0x3) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f0000000280)=ANY=[@ANYBLOB="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"]) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x4, 0x0, 0x3, 0x3, 0x0, 0xffff, 0x10000, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x4}, 0x9860, 0x401, 0x7fffffff, 0x1, 0x1, 0x9a, 0x7}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r1 = fork() wait4(r1, &(0x7f0000000140), 0x0, 0x0) setpgid(r1, 0x0) [ 1307.007200] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1307.007200] 17:05:12 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000280)=[&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='\x00', &(0x7f0000000180)='(\xa3+[\x00', &(0x7f00000001c0)='nointegrity', &(0x7f0000000240)='jfs\x00'], &(0x7f0000000440)=[&(0x7f0000000300)='nointegrity', &(0x7f0000000340)='&\x00', &(0x7f0000000380)='!{%(-Y%,[]\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\'\x00'], 0x800) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0xf99}, {&(0x7f0000000140)="10c4645f010000000100000093426c74c863dd927ca64476d6a4ceaac22c7850f6b1fd59f307019187dce4e3164150a90000000000000000", 0x38, 0xb200}], 0x0, &(0x7f0000000480)={[{@usrquota='usrquota'}]}) [ 1307.119575] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) [ 1307.138855] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1307.138855] 17:05:12 executing program 5: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{0x0, 0x0, 0x200}], 0x3, &(0x7f0000000040)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 17:05:12 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f0e000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:05:12 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000280)=[&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='\x00', &(0x7f0000000180)='(\xa3+[\x00', &(0x7f00000001c0)='nointegrity', &(0x7f0000000240)='jfs\x00'], &(0x7f0000000440)=[&(0x7f0000000300)='nointegrity', &(0x7f0000000340)='&\x00', &(0x7f0000000380)='!{%(-Y%,[]\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\'\x00'], 0x800) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0xf99}, {&(0x7f0000000140)="10c4645f010000000100000093426c74c863dd927ca64476d6a4ceaac22c7850f6b1fd59f307019187dce4e3164150a90000000000000000", 0x38, 0xb200}], 0x0, &(0x7f0000000480)={[{@usrquota='usrquota'}]}) [ 1307.425853] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) [ 1307.486527] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1307.486527] 17:05:12 executing program 0: socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r0 = fork() wait4(r0, &(0x7f0000000140), 0x0, 0x0) setpgid(r0, 0x0) tkill(r0, 0x32) 17:05:12 executing program 5: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{0x0, 0x0, 0x200}], 0x3, &(0x7f0000000040)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 17:05:12 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f0000000280)=[&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='\x00', &(0x7f0000000180)='(\xa3+[\x00', &(0x7f00000001c0)='nointegrity', &(0x7f0000000240)='jfs\x00'], &(0x7f0000000440)=[&(0x7f0000000300)='nointegrity', &(0x7f0000000340)='&\x00', &(0x7f0000000380)='!{%(-Y%,[]\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\'\x00'], 0x800) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0xf99}, {&(0x7f0000000140)="10c4645f010000000100000093426c74c863dd927ca64476d6a4ceaac22c7850f6b1fd59f307019187dce4e3164150a90000000000000000", 0x38, 0xb200}], 0x0, &(0x7f0000000480)={[{@usrquota='usrquota'}]}) [ 1307.648726] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1307.648726] 17:05:13 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f0f000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:05:13 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f0000000480)={0x0, 0xfb, 0x84, 0x0, 0x3, "48d26d032ccc146906a78db4aacb9e98", "1a78fee3cb9e845981a61fd12539cbc472cf90ccf7b35e9c22ba97ed9edd98ac4dff6070dd4d697d75d88eaa028caf1bf980a2f0f8285df93bcdf403effbf6cd693848677d27e71b5912c861902297b63d46d89d9b380254b124227581e2e9af90da4ba161d932c91acf51307f2e67"}, 0x84, 0x3) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f0000000280)=ANY=[@ANYBLOB="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"]) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x4, 0x0, 0x3, 0x3, 0x0, 0xffff, 0x10000, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x4}, 0x9860, 0x401, 0x7fffffff, 0x1, 0x1, 0x9a, 0x7}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r1 = fork() wait4(r1, &(0x7f0000000140), 0x0, 0x0) setpgid(r1, 0x0) [ 1307.795816] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) 17:05:13 executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f0000000480)={0x0, 0xfb, 0x84, 0x0, 0x3, "48d26d032ccc146906a78db4aacb9e98", "1a78fee3cb9e845981a61fd12539cbc472cf90ccf7b35e9c22ba97ed9edd98ac4dff6070dd4d697d75d88eaa028caf1bf980a2f0f8285df93bcdf403effbf6cd693848677d27e71b5912c861902297b63d46d89d9b380254b124227581e2e9af90da4ba161d932c91acf51307f2e67"}, 0x84, 0x3) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f0000000280)=ANY=[@ANYBLOB="00005200514ae9f125090000e3ddd5741f43b1912a7d4430e532d5bd4e332f724900001aeacfabd5667bc58bec327653674169f8b4c8908d3fbdc0320df8c8a2b67383249930234ae6af4500ef08383580af9121ca4dcd55006044e996b6993f6a1422ddc5ed3599f14080e0108171a616346079f745ed97a7fb1952e083bb57fbf4bc5ca92acf54fcab92810d7924b0e437d8e736b1008ce1b42450f8b47b97f33e1b9128fcb3dec3517fb95e62d7fccf859301ce17d75a67cf08a98a22e465dcc16b912663af711bae9bd67065d327d13adf4cec5f6103d0c8fbb5b8293d336b2b15c2f1ca13acc79195b4302e269602696e94bc6de1ad67c996c00f5b35ccf09853c3367f2ac8dcbd54588908c348e6d179210a3e0fbab349f013df39eeb713e04427f786cf825556016a3e87adeebc7de8c940d06309b56a9d0cf98b801fbfaa9996233167"]) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x4, 0x0, 0x3, 0x3, 0x0, 0xffff, 0x10000, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x4}, 0x9860, 0x401, 0x7fffffff, 0x1, 0x1, 0x9a, 0x7}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0xa, &(0x7f00000000c0)=0xbb1, 0x4) bind$inet(r1, &(0x7f0000000440)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000000200)={0x2, 0x4e23, @local}, 0x10) r2 = fork() wait4(r2, &(0x7f0000000140), 0x0, 0x0) tkill(r2, 0x32) 17:05:13 executing program 5: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{0x0, 0x0, 0x200}], 0x3, &(0x7f0000000040)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 17:05:13 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) execveat(0xffffffffffffffff, 0x0, &(0x7f0000000280)=[&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='\x00', &(0x7f0000000180)='(\xa3+[\x00', &(0x7f00000001c0)='nointegrity', &(0x7f0000000240)='jfs\x00'], &(0x7f0000000440)=[&(0x7f0000000300)='nointegrity', &(0x7f0000000340)='&\x00', &(0x7f0000000380)='!{%(-Y%,[]\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\'\x00'], 0x800) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0xf99}, {&(0x7f0000000140)="10c4645f010000000100000093426c74c863dd927ca64476d6a4ceaac22c7850f6b1fd59f307019187dce4e3164150a90000000000000000", 0x38, 0xb200}], 0x0, &(0x7f0000000480)={[{@usrquota='usrquota'}]}) [ 1308.039195] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1308.039195] 17:05:13 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) execveat(0xffffffffffffffff, 0x0, &(0x7f0000000280)=[&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='\x00', &(0x7f0000000180)='(\xa3+[\x00', &(0x7f00000001c0)='nointegrity', &(0x7f0000000240)='jfs\x00'], &(0x7f0000000440)=[&(0x7f0000000300)='nointegrity', &(0x7f0000000340)='&\x00', &(0x7f0000000380)='!{%(-Y%,[]\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\'\x00'], 0x800) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0xf99}, {&(0x7f0000000140)="10c4645f010000000100000093426c74c863dd927ca64476d6a4ceaac22c7850f6b1fd59f307019187dce4e3164150a90000000000000000", 0x38, 0xb200}], 0x0, &(0x7f0000000480)={[{@usrquota='usrquota'}]}) 17:05:13 executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f0000000480)={0x0, 0xfb, 0x84, 0x0, 0x3, "48d26d032ccc146906a78db4aacb9e98", "1a78fee3cb9e845981a61fd12539cbc472cf90ccf7b35e9c22ba97ed9edd98ac4dff6070dd4d697d75d88eaa028caf1bf980a2f0f8285df93bcdf403effbf6cd693848677d27e71b5912c861902297b63d46d89d9b380254b124227581e2e9af90da4ba161d932c91acf51307f2e67"}, 0x84, 0x3) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f0000000280)=ANY=[@ANYBLOB="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"]) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x4, 0x0, 0x3, 0x3, 0x0, 0xffff, 0x10000, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x4}, 0x9860, 0x401, 0x7fffffff, 0x1, 0x1, 0x9a, 0x7}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0xa, &(0x7f00000000c0)=0xbb1, 0x4) bind$inet(r1, &(0x7f0000000440)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000000200)={0x2, 0x4e23, @local}, 0x10) r2 = fork() wait4(r2, &(0x7f0000000140), 0x0, 0x0) tkill(r2, 0x32) [ 1308.159433] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) [ 1308.180799] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1308.180799] 17:05:13 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f10000000010000000100000004002f9b93426c74c8", 0x19, 0xb200}], 0x0, &(0x7f00000000c0)={[{@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}]}) 17:05:13 executing program 5: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000380)=[{0x0}, {0x0, 0x0, 0x200}], 0x3, &(0x7f0000000040)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 17:05:13 executing program 0: socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f0000000480)={0x0, 0xfb, 0x84, 0x0, 0x3, "48d26d032ccc146906a78db4aacb9e98", "1a78fee3cb9e845981a61fd12539cbc472cf90ccf7b35e9c22ba97ed9edd98ac4dff6070dd4d697d75d88eaa028caf1bf980a2f0f8285df93bcdf403effbf6cd693848677d27e71b5912c861902297b63d46d89d9b380254b124227581e2e9af90da4ba161d932c91acf51307f2e67"}, 0x84, 0x3) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r0 = fork() wait4(r0, &(0x7f0000000140), 0x0, 0x0) setpgid(r0, 0x0) tkill(r0, 0x32) [ 1308.478728] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1308.478728] 17:05:13 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) execveat(0xffffffffffffffff, 0x0, &(0x7f0000000280)=[&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='\x00', &(0x7f0000000180)='(\xa3+[\x00', &(0x7f00000001c0)='nointegrity', &(0x7f0000000240)='jfs\x00'], &(0x7f0000000440)=[&(0x7f0000000300)='nointegrity', &(0x7f0000000340)='&\x00', &(0x7f0000000380)='!{%(-Y%,[]\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\'\x00'], 0x800) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0xf99}, {&(0x7f0000000140)="10c4645f010000000100000093426c74c863dd927ca64476d6a4ceaac22c7850f6b1fd59f307019187dce4e3164150a90000000000000000", 0x38, 0xb200}], 0x0, &(0x7f0000000480)={[{@usrquota='usrquota'}]}) [ 1308.532469] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=00000000) [ 1308.604788] BUG: unable to handle kernel paging request at ffffffffffffff80 [ 1308.612124] PGD 9e6e067 P4D 9e6e067 PUD 9e70067 PMD 0 [ 1308.617577] Oops: 0000 [#1] PREEMPT SMP KASAN [ 1308.622068] CPU: 0 PID: 11023 Comm: syz-executor.4 Not tainted 4.19.188-syzkaller #0 [ 1308.630213] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1308.639573] RIP: 0010:diFree+0x141/0x29c0 [ 1308.643799] Code: 28 48 8d 78 80 48 89 44 24 10 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 13 22 00 00 48 8b 44 24 10 <48> 8b 68 80 48 8b 44 24 18 4c 8d 6d 04 48 c1 e8 0c 4c 89 ea 48 c1 [ 1308.663225] RSP: 0018:ffff88803f44f930 EFLAGS: 00010246 [ 1308.668582] RAX: 0000000000000000 RBX: ffff8880a2569300 RCX: ffffc9000e586000 [ 1308.675851] RDX: 1ffffffffffffff0 RSI: ffffffff8274a672 RDI: ffffffffffffff80 [ 1308.683121] RBP: ffff88803a5cbb68 R08: 0000000000000000 R09: 0000000000000000 [ 1308.690380] R10: 0000000000000001 R11: 0000000000000000 R12: ffff88803a5cbb68 [ 1308.697905] R13: ffff88803a5cbb90 R14: ffffffff889ad700 R15: ffff888022d28fb8 [ 1308.705300] FS: 00007f286c1da700(0000) GS:ffff8880ba000000(0000) knlGS:0000000000000000 [ 1308.713776] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1308.719738] CR2: ffffffffffffff80 CR3: 0000000020691000 CR4: 00000000001406f0 [ 1308.727011] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1308.734281] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 1308.741538] Call Trace: [ 1308.745827] ? mark_held_locks+0xf0/0xf0 [ 1308.749981] ? do_syscall_64+0xf9/0x620 [ 1308.753952] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1308.759371] ? do_read_cache_page+0xfe/0x1170 [ 1308.763868] ? lock_acquire+0x170/0x3c0 [ 1308.768000] ? __dquot_initialize+0x298/0xb70 [ 1308.772508] ? pagevec_lookup_range_tag+0x3b/0x80 [ 1308.777752] ? __inode_wait_for_writeback+0x184/0x1f0 [ 1308.783092] ? dquot_initialize_needed+0x290/0x290 [ 1308.788042] ? diWrite+0x13c0/0x13c0 [ 1308.791887] ? lock_downgrade+0x720/0x720 [ 1308.796056] jfs_evict_inode+0x126/0x170 [ 1308.800312] ? jfs_write_inode+0x1d0/0x1d0 [ 1308.804649] evict+0x2ed/0x760 [ 1308.807852] iput+0x4f1/0x860 [ 1308.811038] diFreeSpecial+0x63/0x80 [ 1308.814738] jfs_mount+0x23f/0x3d0 [ 1308.818289] jfs_fill_super+0x55c/0xb50 [ 1308.822251] ? parse_options+0xe70/0xe70 [ 1308.826353] ? set_blocksize+0x163/0x3f0 [ 1308.830409] mount_bdev+0x2fc/0x3b0 [ 1308.834024] ? parse_options+0xe70/0xe70 [ 1308.838070] mount_fs+0xa3/0x310 [ 1308.841426] vfs_kern_mount.part.0+0x68/0x470 [ 1308.845907] do_mount+0x113c/0x2f10 [ 1308.849522] ? cmp_ex_sort+0xc0/0xc0 [ 1308.853226] ? __do_page_fault+0x180/0xd60 [ 1308.857449] ? copy_mount_string+0x40/0x40 [ 1308.861674] ? memset+0x20/0x40 [ 1308.864940] ? copy_mount_options+0x26f/0x380 [ 1308.869429] ksys_mount+0xcf/0x130 [ 1308.873091] __x64_sys_mount+0xba/0x150 [ 1308.877058] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1308.881638] do_syscall_64+0xf9/0x620 [ 1308.885437] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1308.890623] RIP: 0033:0x46797a [ 1308.894036] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1308.913094] RSP: 002b:00007f286c1d9fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1308.920926] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000046797a [ 1308.928226] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 00007f286c1da000 [ 1308.935711] RBP: 00007f286c1da040 R08: 00007f286c1da040 R09: 0000000020000000 [ 1308.943063] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1308.950414] R13: 0000000020000040 R14: 00007f286c1da000 R15: 00000000200000c0 [ 1308.957677] Modules linked in: [ 1308.960866] CR2: ffffffffffffff80 [ 1308.964312] ---[ end trace ab81d8cf8ef6f6ae ]--- [ 1308.969233] RIP: 0010:diFree+0x141/0x29c0 [ 1308.973627] Code: 28 48 8d 78 80 48 89 44 24 10 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 13 22 00 00 48 8b 44 24 10 <48> 8b 68 80 48 8b 44 24 18 4c 8d 6d 04 48 c1 e8 0c 4c 89 ea 48 c1 [ 1308.992794] RSP: 0018:ffff88803f44f930 EFLAGS: 00010246 [ 1308.998155] RAX: 0000000000000000 RBX: ffff8880a2569300 RCX: ffffc9000e586000 [ 1309.005499] RDX: 1ffffffffffffff0 RSI: ffffffff8274a672 RDI: ffffffffffffff80 [ 1309.012856] RBP: ffff88803a5cbb68 R08: 0000000000000000 R09: 0000000000000000 [ 1309.020375] R10: 0000000000000001 R11: 0000000000000000 R12: ffff88803a5cbb68 [ 1309.028071] R13: ffff88803a5cbb90 R14: ffffffff889ad700 R15: ffff888022d28fb8 [ 1309.035341] FS: 00007f286c1da700(0000) GS:ffff8880ba000000(0000) knlGS:0000000000000000 [ 1309.043609] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1309.049477] CR2: ffffffffffffff80 CR3: 0000000020691000 CR4: 00000000001406f0 [ 1309.056851] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1309.064200] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 1309.071935] Kernel panic - not syncing: Fatal exception [ 1309.079181] Kernel Offset: disabled [ 1309.083608] Rebooting in 86400 seconds..