ffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3, 0xe}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:25:36 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:25:36 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000", 0x2c, 0x400}], 0x4801, 0x0) 13:25:36 executing program 1: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x8ec0, 0x0) timer_create(0x0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r4, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) 13:25:36 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x517000, 0x0, 0x0) 13:25:36 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3, 0x11}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:25:36 executing program 1: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x8ec0, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r4, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) [ 495.909165][T11985] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 13:25:37 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x607100, 0x0, 0x0) [ 495.975784][T11983] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 495.990863][T11983] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 496.019338][T11983] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock 13:25:37 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r1 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r1, 0xe201}], 0x1, 0x100) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup2(r0, r1) [ 496.093922][T11983] EXT4-fs error (device loop2): ext4_fill_super:4488: inode #2: comm syz-executor.2: iget: root inode unallocated 13:25:37 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe", 0x33, 0x400}], 0x4801, 0x0) 13:25:37 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3, 0x21}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 496.162673][T11983] EXT4-fs (loop2): get root inode failed [ 496.224881][T11983] EXT4-fs (loop2): mount failed 13:25:37 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x705100, 0x0, 0x0) [ 496.339370][T12010] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 13:25:37 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:25:37 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe", 0x33, 0x400}], 0x4801, 0x0) 13:25:37 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3, 0x57}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:25:37 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x716000, 0x0, 0x0) 13:25:37 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r1 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r1}], 0x1, 0x100) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup2(r0, r1) [ 496.762593][T12048] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 496.824060][T12035] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 13:25:38 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3, 0x60}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 496.890799][T12035] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 496.930418][T12035] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 496.950985][T12035] EXT4-fs error (device loop2): ext4_fill_super:4488: inode #2: comm syz-executor.2: iget: root inode unallocated [ 496.976348][T12035] EXT4-fs (loop2): get root inode failed [ 496.990099][T12035] EXT4-fs (loop2): mount failed 13:25:40 executing program 1: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x8ec0, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r4, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) 13:25:40 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe", 0x33, 0x400}], 0x4801, 0x0) 13:25:40 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x71f000, 0x0, 0x0) 13:25:40 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3, 0x300}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:25:40 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:25:40 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r1 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r1, 0x0, 0x2}], 0x1, 0x100) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup2(r0, r1) 13:25:40 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x760000, 0x0, 0x0) 13:25:40 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3, 0x5ac}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 499.142547][T12100] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 499.160900][T12100] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 499.181591][T12102] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 13:25:40 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x960000, 0x0, 0x0) [ 499.213882][T12100] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 499.280764][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 499.287217][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 499.297379][T12100] EXT4-fs error (device loop2): ext4_fill_super:4488: inode #2: comm syz-executor.2: iget: root inode unallocated [ 499.323164][T12100] EXT4-fs (loop2): get root inode failed [ 499.334196][T12100] EXT4-fs (loop2): mount failed 13:25:40 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ff", 0x37, 0x400}], 0x4801, 0x0) 13:25:40 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3, 0x5c4}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:25:40 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 499.610822][T12126] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 499.830883][T12136] EXT4-fs (loop2): bad geometry: block count 1080 exceeds size of device (1 blocks) 13:25:43 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r1 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r1, 0x0, 0x3}], 0x1, 0x100) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup2(r0, r1) 13:25:43 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0xf07100, 0x0, 0x0) 13:25:43 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3, 0x700}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:25:43 executing program 1: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x8ec0, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r4, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) 13:25:43 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ff", 0x37, 0x400}], 0x4801, 0x0) 13:25:43 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:25:43 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x1000000, 0x0, 0x0) 13:25:43 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3, 0x900}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 502.192969][ T26] kauditd_printk_skb: 209 callbacks suppressed [ 502.193036][ T26] audit: type=1326 audit(1579440343.293:842055): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12165 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45df9a code=0x50000 [ 502.225853][ T26] audit: type=1326 audit(1579440343.313:842056): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12165 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 502.254458][ T26] audit: type=1326 audit(1579440343.313:842057): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12165 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 502.283947][T12160] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 502.320764][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 502.327590][ C0] protocol 88fb is buggy, dev hsr_slave_1 13:25:43 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x2000000, 0x0, 0x0) [ 502.355480][ T26] audit: type=1326 audit(1579440343.313:842058): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12165 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 502.383366][ T26] audit: type=1326 audit(1579440343.313:842059): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12165 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 502.412977][ T26] audit: type=1326 audit(1579440343.313:842060): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12165 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 502.445970][ T26] audit: type=1326 audit(1579440343.313:842061): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12165 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 502.497948][T12173] EXT4-fs (loop2): bad geometry: block count 1080 exceeds size of device (1 blocks) 13:25:43 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3, 0xa00}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:25:43 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x3000000, 0x0, 0x0) 13:25:43 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ff", 0x37, 0x400}], 0x4801, 0x0) [ 502.600808][ T26] audit: type=1326 audit(1579440343.313:842062): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12165 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 502.700760][ T26] audit: type=1326 audit(1579440343.313:842063): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12165 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 13:25:43 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r1 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r1, 0x0, 0x8}], 0x1, 0x100) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup2(r0, r1) 13:25:43 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 502.858533][ T26] audit: type=1326 audit(1579440343.313:842064): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12165 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 13:25:44 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x4000000, 0x0, 0x0) [ 502.968685][T12204] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 503.159353][T12217] EXT4-fs (loop2): bad geometry: block count 1080 exceeds size of device (1 blocks) 13:25:46 executing program 1: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x8ec0, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r4, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) 13:25:46 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3, 0xe00}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:25:46 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x5000000, 0x0, 0x0) 13:25:46 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53", 0x39, 0x400}], 0x4801, 0x0) 13:25:46 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:25:46 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r1 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r1, 0x0, 0x64}], 0x1, 0x100) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup2(r0, r1) 13:25:46 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x6000000, 0x0, 0x0) [ 505.339613][T12246] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 13:25:46 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3, 0x1100}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 505.422806][T12239] EXT4-fs (loop2): bad geometry: block count 1080 exceeds size of device (1 blocks) 13:25:46 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53", 0x39, 0x400}], 0x4801, 0x0) 13:25:46 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x7000000, 0x0, 0x0) [ 505.520783][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 505.527963][ C1] protocol 88fb is buggy, dev hsr_slave_1 13:25:46 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:25:46 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x7e000000, 0x0, 0x0) [ 505.799388][T12281] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 506.015810][T12285] EXT4-fs (loop2): bad geometry: block count 1080 exceeds size of device (1 blocks) 13:25:49 executing program 1: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x8ec0, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r4, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) 13:25:49 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3, 0x2100}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:25:49 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r1 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r1, 0x0, 0x1e2}], 0x1, 0x100) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup2(r0, r1) 13:25:49 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53", 0x39, 0x400}], 0x4801, 0x0) 13:25:49 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0xff600000, 0x0, 0x0) 13:25:49 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:25:49 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x400000000000, 0x0, 0x0) [ 508.474791][ T26] kauditd_printk_skb: 134 callbacks suppressed [ 508.474816][ T26] audit: type=1326 audit(1579440349.573:842199): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12306 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45df9a code=0x50000 13:25:49 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3, 0x5700}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 508.506799][ T26] audit: type=1326 audit(1579440349.583:842200): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12306 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 508.542193][ T26] audit: type=1326 audit(1579440349.583:842201): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12306 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 508.560765][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 508.572316][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 508.579626][ T26] audit: type=1326 audit(1579440349.583:842202): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12306 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 508.652278][T12321] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 508.663726][T12323] EXT4-fs (loop2): bad geometry: block count 1080 exceeds size of device (1 blocks) 13:25:49 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x60ffffffffff, 0x0, 0x0) [ 508.738968][ T26] audit: type=1326 audit(1579440349.583:842203): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12306 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 508.762793][ T26] audit: type=1326 audit(1579440349.583:842204): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12306 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 508.786480][ T26] audit: type=1326 audit(1579440349.583:842205): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12306 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 508.809361][ T26] audit: type=1326 audit(1579440349.583:842206): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12306 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 508.832671][ T26] audit: type=1326 audit(1579440349.583:842207): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12306 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 508.855892][ T26] audit: type=1326 audit(1579440349.583:842208): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12306 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 13:25:50 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3, 0x6000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:25:50 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a}], 0x4801, 0x0) 13:25:50 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 509.207129][T12352] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 13:25:52 executing program 1: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x8ec0, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r4, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) 13:25:52 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r1 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r1, 0x0, 0x300}], 0x1, 0x100) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup2(r0, r1) 13:25:52 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x760000000000, 0x0, 0x0) 13:25:52 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3, 0x7db0}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:25:52 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a}], 0x4801, 0x0) 13:25:52 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:25:52 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x7fb4fd0f9000, 0x0, 0x0) 13:25:52 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3, 0xac05}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 511.587871][T12392] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 13:25:52 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x7fffffffefff, 0x0, 0x0) 13:25:52 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3, 0xb07d}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 511.681990][T12377] EXT4-fs (loop2): bad geometry: block count 1080 exceeds size of device (1 blocks) [ 511.760785][ C1] protocol 88fb is buggy, dev hsr_slave_0 13:25:52 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a}], 0x4801, 0x0) 13:25:52 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x960000000000, 0x0, 0x0) [ 512.087856][T12418] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 13:25:55 executing program 1: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x8ec0, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r4, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) 13:25:55 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:25:55 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r1 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r1, 0x0, 0x6400}], 0x1, 0x100) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup2(r0, r1) 13:25:55 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3, 0xc405}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:25:55 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x20000000000000, 0x0, 0x0) 13:25:55 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 13:25:55 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x60710000000000, 0x0, 0x0) [ 514.664043][T12438] EXT4-fs (loop4): bad geometry: block count 1080 exceeds size of device (1 blocks) [ 514.694110][T12443] EXT4-fs (loop2): bad geometry: block count 1080 exceeds size of device (1 blocks) 13:25:55 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x70510000000000, 0x0, 0x0) 13:25:55 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3, 0x34000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 514.800749][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 514.806591][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 514.814726][ T26] kauditd_printk_skb: 102 callbacks suppressed [ 514.814748][ T26] audit: type=1326 audit(1579440355.913:842311): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12445 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45df9a code=0x50000 13:25:56 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 514.957557][ T26] audit: type=1326 audit(1579440355.913:842312): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12445 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 13:25:56 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[]}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:25:56 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x900ffdb47f0000, 0x0, 0x0) [ 515.013700][ T26] audit: type=1326 audit(1579440355.913:842313): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12445 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 515.047518][ T26] audit: type=1326 audit(1579440355.913:842314): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12445 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 515.135851][ T26] audit: type=1326 audit(1579440355.913:842315): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12445 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 515.205420][ T26] audit: type=1326 audit(1579440355.913:842316): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12445 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 515.309862][ T26] audit: type=1326 audit(1579440355.913:842317): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12445 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 515.336049][ T26] audit: type=1326 audit(1579440355.943:842318): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12445 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 515.363556][ T26] audit: type=1326 audit(1579440355.953:842319): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12445 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=219 compat=0 ip=0x45b159 code=0x50000 [ 515.389841][ T26] audit: type=1326 audit(1579440355.953:842320): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12445 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45df9a code=0x50000 [ 515.430814][T12483] EXT4-fs (loop2): bad geometry: block count 1080 exceeds size of device (1 blocks) [ 515.463014][T12490] EXT4-fs (loop4): bad geometry: block count 1080 exceeds size of device (1 blocks) 13:25:58 executing program 1: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x8ec0, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r4, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) 13:25:58 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3, 0x400300}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:25:58 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r1 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r1, 0x0, 0xe201}], 0x1, 0x100) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup2(r0, r1) 13:25:58 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0xf0710000000000, 0x0, 0x0) 13:25:58 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[]}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:25:58 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 13:25:58 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x100000000000000, 0x0, 0x0) [ 517.844170][T12508] EXT4-fs (loop4): bad geometry: block count 1080 exceeds size of device (1 blocks) 13:25:59 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3, 0x1000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 517.964704][T12523] EXT4-fs (loop2): bad geometry: block count 1080 exceeds size of device (1 blocks) [ 518.000783][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 518.006602][ C1] protocol 88fb is buggy, dev hsr_slave_1 13:25:59 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[]}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:25:59 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:25:59 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x200000000000000, 0x0, 0x0) 13:25:59 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r1 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r1}], 0x2, 0x100) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup2(r0, r1) [ 518.561411][T12557] EXT4-fs (loop2): bad geometry: block count 1080 exceeds size of device (1 blocks) [ 518.650789][T12555] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 518.695406][T12555] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 518.743879][T12555] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 518.807012][T12555] EXT4-fs error (device loop4): ext4_fill_super:4488: inode #2: comm syz-executor.4: iget: root inode unallocated [ 518.882694][T12555] EXT4-fs (loop4): get root inode failed [ 518.930767][T12555] EXT4-fs (loop4): mount failed [ 518.960765][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 519.820814][ T26] kauditd_printk_skb: 35296 callbacks suppressed [ 519.820895][ T26] audit: type=1326 audit(1579440360.903:877516): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12511 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 519.850318][ T26] audit: type=1326 audit(1579440360.923:877619): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12511 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 519.873200][ T26] audit: type=1326 audit(1579440360.923:877620): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12511 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 519.896173][ T26] audit: type=1326 audit(1579440360.923:877621): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12511 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 519.920266][ T26] audit: type=1326 audit(1579440360.923:877622): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12511 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 519.943361][ T26] audit: type=1326 audit(1579440360.923:877623): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12511 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 519.966268][ T26] audit: type=1326 audit(1579440360.923:877624): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12511 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 519.989162][ T26] audit: type=1326 audit(1579440360.923:877625): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12511 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 520.012265][ T26] audit: type=1326 audit(1579440360.923:877626): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12511 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 520.036327][ T26] audit: type=1326 audit(1579440360.923:877627): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12511 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 13:26:01 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x300000000000000, 0x0, 0x0) 13:26:01 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3, 0x2000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:26:01 executing program 1: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x8ec0, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r4, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) 13:26:01 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB]}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:26:01 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754", 0x91, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:26:01 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r1 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r1}], 0x4, 0x100) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup2(r0, r1) 13:26:01 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x400000000000000, 0x0, 0x0) 13:26:02 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 520.986975][T12586] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 521.003878][T12586] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 521.003891][T12600] EXT4-fs (loop2): bad geometry: block count 1080 exceeds size of device (1 blocks) [ 521.040798][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 521.041076][T12586] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 521.046604][ C0] protocol 88fb is buggy, dev hsr_slave_1 13:26:02 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB]}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:26:02 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x500000000000000, 0x0, 0x0) [ 521.196775][T12586] EXT4-fs error (device loop4): ext4_fill_super:4488: inode #2: comm syz-executor.4: iget: root inode unallocated [ 521.238701][T12586] EXT4-fs (loop4): get root inode failed [ 521.245898][T12586] EXT4-fs (loop4): mount failed 13:26:02 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x600000000000000, 0x0, 0x0) 13:26:02 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3, 0x4000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:26:02 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r1 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r1}], 0x8, 0x100) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup2(r0, r1) 13:26:02 executing program 4: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x8ec0, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r4, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) [ 521.512521][T12625] EXT4-fs (loop2): bad geometry: block count 1080 exceeds size of device (1 blocks) [ 521.680797][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 521.686607][ C1] protocol 88fb is buggy, dev hsr_slave_1 13:26:04 executing program 1: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x8ec0, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r3, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) 13:26:04 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x700000000000000, 0x0, 0x0) 13:26:04 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB]}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:26:04 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3, 0x7000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:26:04 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r1 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r1}], 0xf, 0x100) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup2(r0, r1) 13:26:05 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x7e00000000000000, 0x0, 0x0) 13:26:05 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3, 0x9000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 524.077351][T12661] EXT4-fs (loop2): bad geometry: block count 1080 exceeds size of device (1 blocks) 13:26:05 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f900000000800000"], 0x12}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 524.240793][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 524.246607][ C1] protocol 88fb is buggy, dev hsr_slave_1 13:26:05 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0) 13:26:05 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3, 0xa000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:26:05 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r1 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r1}], 0xe0, 0x100) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup2(r0, r1) 13:26:05 executing program 4 (fault-call:2 fault-nth:0): syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 524.735311][T12690] EXT4-fs (loop2): bad geometry: block count 1080 exceeds size of device (1 blocks) [ 524.833177][ T26] kauditd_printk_skb: 39468 callbacks suppressed [ 524.833203][ T26] audit: type=1326 audit(1579440365.933:917095): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12664 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 524.883924][ T26] audit: type=1326 audit(1579440365.973:917097): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12664 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 524.906943][ T26] audit: type=1326 audit(1579440365.973:917096): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12664 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 524.929994][ T26] audit: type=1326 audit(1579440365.973:917099): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12664 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 524.953161][ T26] audit: type=1326 audit(1579440365.973:917100): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12664 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 524.975956][ T26] audit: type=1326 audit(1579440365.973:917101): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12664 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 525.001405][T12712] FAULT_INJECTION: forcing a failure. [ 525.001405][T12712] name failslab, interval 1, probability 0, space 0, times 0 [ 525.014473][T12712] CPU: 0 PID: 12712 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 525.023223][T12712] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 525.033274][T12712] Call Trace: [ 525.036571][T12712] dump_stack+0x11d/0x181 [ 525.040934][T12712] should_fail.cold+0xa/0x1a [ 525.045567][T12712] __should_failslab+0xee/0x130 [ 525.050480][T12712] should_failslab+0x9/0x14 [ 525.055002][T12712] __kmalloc+0x53/0x690 [ 525.059246][T12712] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 525.065493][T12712] ? fput_many+0xec/0x130 [ 525.069837][T12712] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 525.076083][T12712] ? strnlen_user+0x1a8/0x220 [ 525.081237][T12712] ? __x64_sys_memfd_create+0xdb/0x370 [ 525.086710][T12712] __x64_sys_memfd_create+0xdb/0x370 [ 525.092041][T12712] do_syscall_64+0xcc/0x3a0 [ 525.096613][T12712] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 525.102513][T12712] RIP: 0033:0x45b159 [ 525.106421][T12712] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 525.126039][T12712] RSP: 002b:00007fbdc6b1ca68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 525.134458][T12712] RAX: ffffffffffffffda RBX: 00007fbdc6b1d6d4 RCX: 000000000045b159 [ 525.142445][T12712] RDX: 0000000020010288 RSI: 0000000000000000 RDI: 00000000004c01f8 [ 525.150433][T12712] RBP: 000000000075bfc8 R08: fe03f80fe03f80ff R09: 0000000000000001 [ 525.158488][T12712] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 525.166655][T12712] R13: 0000000000000b72 R14: 00000000004cc2b6 R15: 0000000000000000 [ 525.226401][ T26] audit: type=1326 audit(1579440365.973:917102): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12664 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 525.364147][ T26] audit: type=1326 audit(1579440365.973:917103): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12664 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 525.505450][ T26] audit: type=1326 audit(1579440365.973:917104): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12664 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 525.534848][ T26] audit: type=1326 audit(1579440365.973:917105): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12664 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 13:26:08 executing program 1: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x8ec0, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r3, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) 13:26:08 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0xffefffffff7f0000, 0x0, 0x0) 13:26:08 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3, 0xe000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:26:08 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f900000000800000"], 0x12}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:26:08 executing program 4 (fault-call:2 fault-nth:1): syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:26:08 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r1 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r1}], 0x3c1, 0x100) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup2(r0, r1) [ 527.129061][T12741] FAULT_INJECTION: forcing a failure. [ 527.129061][T12741] name failslab, interval 1, probability 0, space 0, times 0 [ 527.195945][T12741] CPU: 0 PID: 12741 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 527.204853][T12741] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 527.214907][T12741] Call Trace: [ 527.218207][T12741] dump_stack+0x11d/0x181 [ 527.222560][T12741] should_fail.cold+0xa/0x1a [ 527.227173][T12741] __should_failslab+0xee/0x130 [ 527.232083][T12741] should_failslab+0x9/0x14 [ 527.236614][T12741] kmem_cache_alloc+0x29/0x5d0 [ 527.241395][T12741] ? _kstrtoull+0xfc/0x130 [ 527.245872][T12741] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 527.251649][T12741] ? shmem_destroy_inode+0x70/0x70 [ 527.256780][T12741] shmem_alloc_inode+0x31/0x60 [ 527.261556][T12741] alloc_inode+0x48/0x130 [ 527.265950][T12741] new_inode_pseudo+0x35/0xe0 [ 527.270689][T12741] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 527.277167][T12741] new_inode+0x28/0x50 [ 527.281313][T12741] shmem_get_inode+0x85/0x490 [ 527.286004][T12741] ? _raw_spin_unlock+0x4b/0x60 [ 527.290865][T12741] __shmem_file_setup.part.0+0x6f/0x1f0 [ 527.296426][T12741] shmem_file_setup+0x7b/0xa0 [ 527.301393][T12741] __x64_sys_memfd_create+0x20d/0x370 [ 527.306782][T12741] do_syscall_64+0xcc/0x3a0 [ 527.311301][T12741] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 527.317237][T12741] RIP: 0033:0x45b159 [ 527.321144][T12741] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 13:26:08 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0xffffffff00000000, 0x0, 0x0) 13:26:08 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0xffffffffff600000, 0x0, 0x0) [ 527.340799][T12741] RSP: 002b:00007fbdc6b1ca68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 527.349253][T12741] RAX: ffffffffffffffda RBX: 00007fbdc6b1d6d4 RCX: 000000000045b159 [ 527.357230][T12741] RDX: 0000000020010288 RSI: 0000000000000000 RDI: 00000000004c01f8 [ 527.365207][T12741] RBP: 000000000075bfc8 R08: fe03f80fe03f80ff R09: 0000000000000001 [ 527.373208][T12741] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 527.381183][T12741] R13: 0000000000000b72 R14: 00000000004cc2b6 R15: 0000000000000001 13:26:08 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3, 0x11000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 527.406598][T12727] EXT4-fs (loop2): bad geometry: block count 1080 exceeds size of device (1 blocks) 13:26:08 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f900000000800000"], 0x12}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:26:08 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r1 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r1}], 0xffe0, 0x100) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup2(r0, r1) 13:26:08 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3, 0x21000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 527.886592][T12762] EXT4-fs (loop2): bad geometry: block count 1080 exceeds size of device (1 blocks) [ 529.840792][ T26] kauditd_printk_skb: 46529 callbacks suppressed [ 529.840816][ T26] audit: type=1326 audit(1579440370.933:963635): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12733 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 529.869768][ T26] audit: type=1326 audit(1579440370.943:963636): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12733 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 529.893260][ T26] audit: type=1326 audit(1579440370.943:963637): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12733 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 529.915847][ T26] audit: type=1326 audit(1579440370.943:963638): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12733 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 529.938336][ T26] audit: type=1326 audit(1579440370.943:963639): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12733 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 529.960913][ T26] audit: type=1326 audit(1579440370.943:963640): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12733 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 529.983520][ T26] audit: type=1326 audit(1579440370.943:963641): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12733 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 530.006965][ T26] audit: type=1326 audit(1579440370.943:963642): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12733 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 13:26:11 executing program 1: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x8ec0, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r3, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) 13:26:11 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x2) 13:26:11 executing program 4 (fault-call:2 fault-nth:2): syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:26:11 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3, 0x57000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:26:11 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e210000020000"], 0x1b}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:26:11 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r1 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r1}], 0x1a000, 0x100) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup2(r0, r1) [ 530.029605][ T26] audit: type=1326 audit(1579440370.943:963643): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12733 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 530.052282][ T26] audit: type=1326 audit(1579440370.943:963644): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12733 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 13:26:11 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x3) [ 530.268404][T12801] FAULT_INJECTION: forcing a failure. [ 530.268404][T12801] name failslab, interval 1, probability 0, space 0, times 0 [ 530.309359][T12801] CPU: 1 PID: 12801 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 530.318064][T12801] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 530.328123][T12801] Call Trace: [ 530.331425][T12801] dump_stack+0x11d/0x181 [ 530.335780][T12801] should_fail.cold+0xa/0x1a [ 530.340379][T12801] __should_failslab+0xee/0x130 [ 530.345358][T12801] should_failslab+0x9/0x14 [ 530.349934][T12801] kmem_cache_alloc+0x29/0x5d0 [ 530.354720][T12801] ? __write_once_size+0x5a/0xe0 [ 530.359671][T12801] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 530.365660][T12801] __d_alloc+0x52/0x4b0 [ 530.369809][T12801] ? timestamp_truncate+0x11b/0x160 [ 530.375023][T12801] d_alloc_pseudo+0x27/0x70 [ 530.379707][T12801] alloc_file_pseudo+0x96/0x1b0 [ 530.384648][T12801] __shmem_file_setup.part.0+0xd4/0x1f0 [ 530.390333][T12801] shmem_file_setup+0x7b/0xa0 [ 530.395069][T12801] __x64_sys_memfd_create+0x20d/0x370 [ 530.400478][T12801] do_syscall_64+0xcc/0x3a0 13:26:11 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x4) [ 530.405002][T12801] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 530.410892][T12801] RIP: 0033:0x45b159 [ 530.414777][T12801] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 530.434655][T12801] RSP: 002b:00007fbdc6b1ca68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 530.443117][T12801] RAX: ffffffffffffffda RBX: 00007fbdc6b1d6d4 RCX: 000000000045b159 [ 530.451331][T12801] RDX: 0000000020010288 RSI: 0000000000000000 RDI: 00000000004c01f8 13:26:11 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3, 0x60000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 530.459311][T12801] RBP: 000000000075bfc8 R08: fe03f80fe03f80ff R09: 0000000000000001 [ 530.467388][T12801] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 530.475356][T12801] R13: 0000000000000b72 R14: 00000000004cc2b6 R15: 0000000000000002 [ 530.525780][T12794] EXT4-fs (loop2): bad geometry: block count 1080 exceeds size of device (1 blocks) 13:26:11 executing program 4 (fault-call:2 fault-nth:3): syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:26:11 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r1 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r1}], 0xffffffe0, 0x100) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup2(r0, r1) 13:26:11 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e210000020000"], 0x1b}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 530.919282][T12824] FAULT_INJECTION: forcing a failure. [ 530.919282][T12824] name failslab, interval 1, probability 0, space 0, times 0 [ 530.980379][T12824] CPU: 0 PID: 12824 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 530.989094][T12824] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 530.999147][T12824] Call Trace: [ 531.002457][T12824] dump_stack+0x11d/0x181 [ 531.006852][T12824] should_fail.cold+0xa/0x1a [ 531.011461][T12824] __should_failslab+0xee/0x130 [ 531.016342][T12824] should_failslab+0x9/0x14 [ 531.020864][T12824] kmem_cache_alloc+0x29/0x5d0 [ 531.025642][T12824] ? memcg_kmem_put_cache+0x7c/0xc0 [ 531.031008][T12824] ? kmem_cache_alloc+0x1f3/0x5d0 [ 531.036119][T12824] __alloc_file+0x4d/0x210 [ 531.040538][T12824] alloc_empty_file+0x8f/0x180 [ 531.045320][T12824] alloc_file+0x4e/0x2b0 [ 531.049628][T12824] ? _raw_spin_unlock+0x4b/0x60 [ 531.054488][T12824] alloc_file_pseudo+0x11c/0x1b0 [ 531.059442][T12824] __shmem_file_setup.part.0+0xd4/0x1f0 [ 531.065041][T12824] shmem_file_setup+0x7b/0xa0 [ 531.069787][T12824] __x64_sys_memfd_create+0x20d/0x370 [ 531.075178][T12824] do_syscall_64+0xcc/0x3a0 [ 531.079787][T12824] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 531.085682][T12824] RIP: 0033:0x45b159 [ 531.089586][T12824] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 531.109416][T12824] RSP: 002b:00007fbdc6b3da68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 531.117841][T12824] RAX: ffffffffffffffda RBX: 00007fbdc6b3e6d4 RCX: 000000000045b159 [ 531.125820][T12824] RDX: 0000000020010288 RSI: 0000000000000000 RDI: 00000000004c01f8 [ 531.133795][T12824] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 0000000000000001 [ 531.141774][T12824] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 531.149753][T12824] R13: 0000000000000b72 R14: 00000000004cc2b6 R15: 0000000000000003 [ 531.236469][T12838] EXT4-fs (loop2): bad geometry: block count 1080 exceeds size of device (1 blocks) 13:26:14 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x5) 13:26:14 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3, 0xac050000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:26:14 executing program 4 (fault-call:2 fault-nth:4): syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:26:14 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e210000020000"], 0x1b}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:26:14 executing program 1: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x8ec0, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r3, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) 13:26:14 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r1 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r1}], 0xffffffffffffffe0, 0x100) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup2(r0, r1) 13:26:14 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x6) [ 533.328210][T12865] FAULT_INJECTION: forcing a failure. [ 533.328210][T12865] name failslab, interval 1, probability 0, space 0, times 0 [ 533.379064][T12854] EXT4-fs (loop2): bad geometry: block count 1080 exceeds size of device (1 blocks) [ 533.439331][T12865] CPU: 1 PID: 12865 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 533.448044][T12865] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 533.458181][T12865] Call Trace: [ 533.461597][T12865] dump_stack+0x11d/0x181 [ 533.465931][T12865] should_fail.cold+0xa/0x1a [ 533.470615][T12865] __should_failslab+0xee/0x130 [ 533.475481][T12865] should_failslab+0x9/0x14 [ 533.480139][T12865] kmem_cache_alloc+0x29/0x5d0 [ 533.484954][T12865] ? kmem_cache_alloc+0x1f3/0x5d0 [ 533.490162][T12865] ? memcg_kmem_put_cache+0x7c/0xc0 [ 533.495362][T12865] security_file_alloc+0x48/0x110 [ 533.500387][T12865] __alloc_file+0xa3/0x210 [ 533.504912][T12865] alloc_empty_file+0x8f/0x180 [ 533.509676][T12865] alloc_file+0x4e/0x2b0 [ 533.513930][T12865] ? _raw_spin_unlock+0x4b/0x60 [ 533.518831][T12865] alloc_file_pseudo+0x11c/0x1b0 [ 533.523782][T12865] __shmem_file_setup.part.0+0xd4/0x1f0 [ 533.529389][T12865] shmem_file_setup+0x7b/0xa0 [ 533.534145][T12865] __x64_sys_memfd_create+0x20d/0x370 [ 533.539542][T12865] do_syscall_64+0xcc/0x3a0 [ 533.544049][T12865] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 533.549948][T12865] RIP: 0033:0x45b159 [ 533.553851][T12865] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 533.573566][T12865] RSP: 002b:00007fbdc6b1ca68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 533.581981][T12865] RAX: ffffffffffffffda RBX: 00007fbdc6b1d6d4 RCX: 000000000045b159 [ 533.589991][T12865] RDX: 0000000020010288 RSI: 0000000000000000 RDI: 00000000004c01f8 [ 533.598049][T12865] RBP: 000000000075bfc8 R08: fe03f80fe03f80ff R09: 0000000000000001 [ 533.606019][T12865] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 533.613989][T12865] R13: 0000000000000b72 R14: 00000000004cc2b6 R15: 0000000000000004 13:26:14 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x7) 13:26:14 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3, 0xb07d0000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:26:14 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r1 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r1}], 0x1, 0x4) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup2(r0, r1) 13:26:14 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e2100000200000000000000"], 0x20}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:26:15 executing program 4 (fault-call:2 fault-nth:5): syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:26:15 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x7e) 13:26:15 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3, 0xc4050000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 534.161978][T12894] EXT4-fs (loop2): bad geometry: block count 1080 exceeds size of device (1 blocks) 13:26:15 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r1 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r1}], 0x1, 0x102) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup2(r0, r1) 13:26:15 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x300) [ 534.289846][T12915] FAULT_INJECTION: forcing a failure. [ 534.289846][T12915] name failslab, interval 1, probability 0, space 0, times 0 [ 534.441093][T12915] CPU: 0 PID: 12915 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 534.449824][T12915] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 534.460069][T12915] Call Trace: [ 534.463373][T12915] dump_stack+0x11d/0x181 [ 534.467790][T12915] should_fail.cold+0xa/0x1a [ 534.472393][T12915] __should_failslab+0xee/0x130 [ 534.477291][T12915] should_failslab+0x9/0x14 [ 534.481832][T12915] __kmalloc+0x53/0x690 [ 534.486059][T12915] ? tomoyo_realpath_from_path+0x83/0x4c0 [ 534.491971][T12915] tomoyo_realpath_from_path+0x83/0x4c0 [ 534.497525][T12915] ? tomoyo_get_mode.part.0+0x5c/0xb0 [ 534.503011][T12915] tomoyo_path_perm+0x15d/0x390 [ 534.508079][T12915] tomoyo_path_truncate+0x26/0x40 [ 534.513159][T12915] security_path_truncate+0x9b/0xd0 [ 534.518998][T12915] do_sys_ftruncate+0x27d/0x340 [ 534.523864][T12915] __x64_sys_ftruncate+0x3f/0x50 [ 534.528816][T12915] do_syscall_64+0xcc/0x3a0 [ 534.533392][T12915] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 534.539285][T12915] RIP: 0033:0x45b127 [ 534.543195][T12915] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 534.562972][T12915] RSP: 002b:00007fbdc6b1ca68 EFLAGS: 00000213 ORIG_RAX: 000000000000004d [ 534.571495][T12915] RAX: ffffffffffffffda RBX: 00007fbdc6b1d6d4 RCX: 000000000045b127 [ 534.579685][T12915] RDX: 0000000020010288 RSI: 0000000008100000 RDI: 0000000000000006 [ 534.587659][T12915] RBP: 000000000075bfc8 R08: fe03f80fe03f80ff R09: 0000000000000001 [ 534.595686][T12915] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000000000005 [ 534.603697][T12915] R13: 0000000000000b72 R14: 00000000004cc2b6 R15: 0000000000000005 [ 534.693776][T12915] ERROR: Out of memory at tomoyo_realpath_from_path. [ 534.735945][T12915] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 534.745878][T12915] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 534.759744][T12915] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 534.780961][T12915] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 534.850811][ T26] kauditd_printk_skb: 26369 callbacks suppressed [ 534.850872][ T26] audit: type=1326 audit(1579440375.943:990014): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12866 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 534.879908][ T26] audit: type=1326 audit(1579440375.933:989919): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12866 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45df9a code=0x50000 [ 534.902412][ T26] audit: type=1326 audit(1579440375.953:990015): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12866 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=35 compat=0 ip=0x459621 code=0x50000 [ 534.924827][ T26] audit: type=1326 audit(1579440375.953:990016): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12866 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45df9a code=0x50000 [ 534.947297][ T26] audit: type=1326 audit(1579440375.953:990017): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12866 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=35 compat=0 ip=0x459621 code=0x50000 [ 534.960756][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 534.970873][ T26] audit: type=1326 audit(1579440375.953:990018): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12866 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45df9a code=0x50000 [ 534.975409][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 534.997981][ T26] audit: type=1326 audit(1579440375.953:990019): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12866 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=35 compat=0 ip=0x459621 code=0x50000 [ 535.026023][ T26] audit: type=1326 audit(1579440375.953:990020): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12866 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45df9a code=0x50000 [ 535.048538][ T26] audit: type=1326 audit(1579440375.953:990021): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12866 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=35 compat=0 ip=0x459621 code=0x50000 [ 535.071985][ T26] audit: type=1326 audit(1579440375.953:990022): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12866 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45df9a code=0x50000 13:26:17 executing program 1: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x8ec0, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r3, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) 13:26:17 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e2100000200000000000000"], 0x20}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:26:17 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3, 0xffffff7f}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:26:17 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x500) 13:26:17 executing program 4 (fault-call:2 fault-nth:6): syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:26:17 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r1 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r1}], 0x1, 0x103) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup2(r0, r1) 13:26:17 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x600) [ 536.543821][T12955] FAULT_INJECTION: forcing a failure. [ 536.543821][T12955] name failslab, interval 1, probability 0, space 0, times 0 [ 536.617026][T12955] CPU: 0 PID: 12955 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 536.625749][T12955] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 536.635819][T12955] Call Trace: [ 536.639173][T12955] dump_stack+0x11d/0x181 [ 536.643525][T12955] should_fail.cold+0xa/0x1a [ 536.648153][T12955] __should_failslab+0xee/0x130 [ 536.653030][T12955] should_failslab+0x9/0x14 [ 536.657540][T12955] __kmalloc+0x53/0x690 13:26:17 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 536.661717][T12955] ? memcg_kmem_put_cache+0x7c/0xc0 [ 536.667861][T12955] ? debug_smp_processor_id+0x43/0x137 [ 536.673330][T12955] ? tomoyo_encode2.part.0+0xd9/0x260 [ 536.678723][T12955] tomoyo_encode2.part.0+0xd9/0x260 [ 536.683983][T12955] ? dynamic_dname+0x150/0x150 [ 536.688803][T12955] tomoyo_encode+0x34/0x50 [ 536.693305][T12955] tomoyo_realpath_from_path+0x14a/0x4c0 [ 536.698947][T12955] ? tomoyo_get_mode.part.0+0x5c/0xb0 [ 536.705639][T12955] tomoyo_path_perm+0x15d/0x390 [ 536.710525][T12955] tomoyo_path_truncate+0x26/0x40 [ 536.715685][T12955] security_path_truncate+0x9b/0xd0 [ 536.720962][T12955] do_sys_ftruncate+0x27d/0x340 [ 536.725821][T12955] __x64_sys_ftruncate+0x3f/0x50 [ 536.730785][T12955] do_syscall_64+0xcc/0x3a0 [ 536.735362][T12955] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 536.741248][T12955] RIP: 0033:0x45b127 [ 536.745232][T12955] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 536.764837][T12955] RSP: 002b:00007fbdc6b1ca68 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 536.773249][T12955] RAX: ffffffffffffffda RBX: 00007fbdc6b1d6d4 RCX: 000000000045b127 [ 536.781217][T12955] RDX: 0000000020010288 RSI: 0000000008100000 RDI: 0000000000000004 [ 536.789249][T12955] RBP: 000000000075bfc8 R08: fe03f80fe03f80ff R09: 0000000000000001 [ 536.797221][T12955] R10: 0000000000000000 R11: 0000000000000217 R12: 0000000000000005 [ 536.805260][T12955] R13: 0000000000000b72 R14: 00000000004cc2b6 R15: 0000000000000006 [ 536.820792][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 536.826571][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 536.836538][T12955] ERROR: Out of memory at tomoyo_realpath_from_path. [ 536.885269][T12954] EXT4-fs (loop2): bad geometry: block count 1080 exceeds size of device (1 blocks) 13:26:18 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x700) [ 536.963405][T12955] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 536.981058][T12955] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 536.999177][T12955] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 537.111359][T12955] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 13:26:18 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e2100000200000000000000"], 0x20}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:26:18 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r1 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r1}], 0x1, 0x108) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup2(r0, r1) 13:26:18 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3, 0x0, 0x2}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 537.432297][T12985] EXT4-fs (loop2): bad geometry: block count 1080 exceeds size of device (1 blocks) 13:26:20 executing program 1: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x8ec0, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r3, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) 13:26:20 executing program 4 (fault-call:2 fault-nth:7): syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:26:20 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x2000) 13:26:20 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088"], 0x22}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:26:20 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3, 0x0, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:26:20 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r1 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r1}], 0x1, 0x164) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup2(r0, r1) 13:26:20 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x4000) [ 539.723651][T13027] FAULT_INJECTION: forcing a failure. [ 539.723651][T13027] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 539.790920][T13014] EXT4-fs (loop2): bad geometry: block count 1080 exceeds size of device (34 blocks) [ 539.840755][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 539.846550][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 539.853245][T13027] CPU: 1 PID: 13027 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 539.862040][T13027] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 539.872138][T13027] Call Trace: [ 539.875440][T13027] dump_stack+0x11d/0x181 [ 539.879794][T13027] should_fail.cold+0xa/0x1a [ 539.884404][T13027] should_fail_alloc_page+0x50/0x60 [ 539.889617][T13027] __alloc_pages_nodemask+0xd2/0x310 [ 539.894920][T13027] alloc_pages_vma+0xc1/0x3a0 [ 539.899635][T13027] shmem_alloc_page+0x67/0xf0 [ 539.904329][T13027] shmem_alloc_and_acct_page+0x125/0x450 [ 539.909979][T13027] shmem_getpage_gfp+0x2f2/0x1390 [ 539.915712][T13027] ? shmem_xattr_handler_set+0x70/0x70 [ 539.921222][T13027] shmem_write_begin+0x9f/0x140 [ 539.926079][T13027] generic_perform_write+0x136/0x320 [ 539.931384][T13027] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 539.937747][T13027] __generic_file_write_iter+0x251/0x380 [ 539.943442][T13027] ? generic_write_check_limits.isra.0+0x168/0x1c0 [ 539.950093][T13027] generic_file_write_iter+0x28c/0x38c [ 539.951081][ T26] kauditd_printk_skb: 41859 callbacks suppressed [ 539.951101][ T26] audit: type=1326 audit(1579440380.993:1031883): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13018 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 539.955650][T13027] new_sync_write+0x388/0x4a0 [ 539.970763][ T26] audit: type=1326 audit(1579440380.993:1031884): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13018 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 539.984523][T13027] __vfs_write+0xb1/0xc0 [ 539.984546][T13027] vfs_write+0x18a/0x390 [ 539.984615][T13027] ksys_pwrite64+0xee/0x120 [ 539.984656][T13027] __x64_sys_pwrite64+0x5e/0x80 [ 540.000818][ T26] audit: type=1326 audit(1579440380.993:1031885): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13018 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 540.011948][T13027] do_syscall_64+0xcc/0x3a0 [ 540.011973][T13027] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 540.011994][T13027] RIP: 0033:0x414f57 [ 540.030774][ T26] audit: type=1326 audit(1579440380.993:1031886): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13018 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 13:26:21 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3, 0x0, 0x4}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:26:21 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x60ff) [ 540.052713][T13027] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 a7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 ed f9 ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 540.052723][T13027] RSP: 002b:00007fbdc6b1ca60 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 540.052780][T13027] RAX: ffffffffffffffda RBX: 00007fbdc6b1d6d4 RCX: 0000000000414f57 [ 540.052790][T13027] RDX: 00000000000004db RSI: 00000000200000c0 RDI: 0000000000000003 [ 540.052826][T13027] RBP: 000000000075bfc8 R08: fe03f80fe03f80ff R09: 0000000000000001 [ 540.052892][T13027] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000005 [ 540.052912][T13027] R13: 0000000000000b72 R14: 00000000004cc2b6 R15: 0000000000000007 [ 540.081065][ T26] audit: type=1326 audit(1579440380.993:1031887): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13018 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 540.090087][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 540.154437][ T26] audit: type=1326 audit(1579440380.993:1031888): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13018 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 540.158222][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 540.213458][ T26] audit: type=1326 audit(1579440380.993:1031889): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13018 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 540.284939][T13027] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 540.294652][ T26] audit: type=1326 audit(1579440380.993:1031890): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13018 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 13:26:21 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088"], 0x22}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 540.318257][ T26] audit: type=1326 audit(1579440380.993:1031891): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13018 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 540.342367][ T26] audit: type=1326 audit(1579440380.993:1031892): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13018 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 13:26:21 executing program 4 (fault-call:2 fault-nth:8): syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:26:21 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x7600) [ 540.733538][T13055] FAULT_INJECTION: forcing a failure. [ 540.733538][T13055] name failslab, interval 1, probability 0, space 0, times 0 [ 540.864434][T13052] EXT4-fs (loop2): bad geometry: block count 1080 exceeds size of device (34 blocks) [ 540.880750][T13055] CPU: 1 PID: 13055 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 540.889439][T13055] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 540.899529][T13055] Call Trace: [ 540.902828][T13055] dump_stack+0x11d/0x181 [ 540.907180][T13055] should_fail.cold+0xa/0x1a [ 540.911846][T13055] __should_failslab+0xee/0x130 [ 540.917251][T13055] should_failslab+0x9/0x14 [ 540.921810][T13055] kmem_cache_alloc+0x29/0x5d0 [ 540.926588][T13055] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 540.932519][T13055] getname_flags+0x91/0x380 [ 540.937016][T13055] ? __sb_end_write+0xbe/0x100 [ 540.941785][T13055] getname+0x23/0x40 [ 540.945699][T13055] do_sys_open+0x27f/0x4f0 [ 540.950190][T13055] __x64_sys_open+0x55/0x70 [ 540.954709][T13055] do_syscall_64+0xcc/0x3a0 [ 540.959329][T13055] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 540.965219][T13055] RIP: 0033:0x414ef1 [ 540.969119][T13055] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 540.988897][T13055] RSP: 002b:00007fbdc6b3da60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 540.997313][T13055] RAX: ffffffffffffffda RBX: 00007fbdc6b3e6d4 RCX: 0000000000414ef1 [ 541.005330][T13055] RDX: 00007fbdc6b3db0a RSI: 0000000000000002 RDI: 00007fbdc6b3db00 [ 541.013306][T13055] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 541.021277][T13055] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000003 [ 541.029279][T13055] R13: 0000000000000b72 R14: 00000000004cc2b6 R15: 0000000000000008 13:26:23 executing program 1: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x8ec0, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r3, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) 13:26:23 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r1 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r1}], 0x1, 0xf00) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup2(r0, r1) 13:26:23 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3, 0x0, 0x7}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:26:23 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x7e00) 13:26:23 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088"], 0x22}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:26:23 executing program 4 (fault-call:2 fault-nth:9): syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:26:23 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3, 0x0, 0x9}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 542.846129][T13079] EXT4-fs (loop2): bad geometry: block count 1080 exceeds size of device (34 blocks) [ 542.886765][T13082] FAULT_INJECTION: forcing a failure. [ 542.886765][T13082] name failslab, interval 1, probability 0, space 0, times 0 [ 542.906125][T13082] CPU: 1 PID: 13082 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 542.914868][T13082] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 542.924966][T13082] Call Trace: [ 542.928267][T13082] dump_stack+0x11d/0x181 13:26:24 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x9600) [ 542.932722][T13082] should_fail.cold+0xa/0x1a [ 542.937402][T13082] __should_failslab+0xee/0x130 [ 542.942264][T13082] should_failslab+0x9/0x14 [ 542.946781][T13082] kmem_cache_alloc+0x29/0x5d0 [ 542.951600][T13082] ? update_load_avg+0x7b/0x5d0 [ 542.956628][T13082] __alloc_file+0x4d/0x210 [ 542.961056][T13082] alloc_empty_file+0x8f/0x180 [ 542.965833][T13082] path_openat+0x74/0x3580 [ 542.970270][T13082] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 542.976517][T13082] ? aa_file_perm+0x3a1/0xc20 [ 542.981227][T13082] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 542.987129][T13082] ? __read_once_size+0x41/0xe0 [ 542.991992][T13082] do_filp_open+0x11e/0x1b0 [ 542.996497][T13082] ? __check_object_size+0x5f/0x346 [ 543.001699][T13082] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 543.007601][T13082] ? __alloc_fd+0x2ef/0x3b0 [ 543.012103][T13082] do_sys_open+0x3b3/0x4f0 [ 543.016514][T13082] __x64_sys_open+0x55/0x70 [ 543.021012][T13082] do_syscall_64+0xcc/0x3a0 [ 543.025521][T13082] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 543.031404][T13082] RIP: 0033:0x414ef1 [ 543.035306][T13082] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 543.054961][T13082] RSP: 002b:00007fbdc6b3da60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 543.063401][T13082] RAX: ffffffffffffffda RBX: 00007fbdc6b3e6d4 RCX: 0000000000414ef1 [ 543.071359][T13082] RDX: 00007fbdc6b3db0a RSI: 0000000000000002 RDI: 00007fbdc6b3db00 [ 543.079325][T13082] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 543.087329][T13082] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000003 [ 543.095310][T13082] R13: 0000000000000b72 R14: 00000000004cc2b6 R15: 0000000000000009 [ 543.103450][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 543.109260][ C1] protocol 88fb is buggy, dev hsr_slave_1 13:26:24 executing program 4 (fault-call:2 fault-nth:10): syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 543.280750][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 543.286565][ C0] protocol 88fb is buggy, dev hsr_slave_1 13:26:24 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e2100000200000000000000008805"], 0x23}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:26:24 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x200000) 13:26:24 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3, 0x0, 0xa}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 543.518861][T13108] FAULT_INJECTION: forcing a failure. [ 543.518861][T13108] name failslab, interval 1, probability 0, space 0, times 0 [ 543.545192][T13108] CPU: 0 PID: 13108 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 543.553925][T13108] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 543.563978][T13108] Call Trace: [ 543.567384][T13108] dump_stack+0x11d/0x181 [ 543.571725][T13108] should_fail.cold+0xa/0x1a [ 543.576408][T13108] __should_failslab+0xee/0x130 [ 543.581268][T13108] should_failslab+0x9/0x14 [ 543.585777][T13108] kmem_cache_alloc+0x29/0x5d0 [ 543.590742][T13108] ? kmem_cache_alloc+0x1f3/0x5d0 [ 543.595781][T13108] security_file_alloc+0x48/0x110 [ 543.600862][T13108] __alloc_file+0xa3/0x210 [ 543.605316][T13108] alloc_empty_file+0x8f/0x180 [ 543.610114][T13108] path_openat+0x74/0x3580 [ 543.614645][T13108] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 543.620901][T13108] ? aa_file_perm+0x3a1/0xc20 [ 543.625587][T13108] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 543.631493][T13108] ? __read_once_size+0x41/0xe0 [ 543.636350][T13108] do_filp_open+0x11e/0x1b0 [ 543.640887][T13108] ? __check_object_size+0x5f/0x346 [ 543.646164][T13108] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 543.652234][T13108] ? __alloc_fd+0x2ef/0x3b0 [ 543.656776][T13108] do_sys_open+0x3b3/0x4f0 [ 543.661214][T13108] __x64_sys_open+0x55/0x70 [ 543.665794][T13108] do_syscall_64+0xcc/0x3a0 [ 543.670312][T13108] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 543.676221][T13108] RIP: 0033:0x414ef1 [ 543.680122][T13108] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 543.699831][T13108] RSP: 002b:00007fbdc6b3da60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 543.708692][T13108] RAX: ffffffffffffffda RBX: 00007fbdc6b3e6d4 RCX: 0000000000414ef1 [ 543.716668][T13108] RDX: 00007fbdc6b3db0a RSI: 0000000000000002 RDI: 00007fbdc6b3db00 [ 543.724647][T13108] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 543.732618][T13108] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000003 [ 543.740726][T13108] R13: 0000000000000b72 R14: 00000000004cc2b6 R15: 000000000000000a [ 543.999222][T13113] EXT4-fs (loop2): bad geometry: block count 1080 exceeds size of device (354 blocks) [ 544.960775][ T26] kauditd_printk_skb: 29697 callbacks suppressed [ 544.960827][ T26] audit: type=1326 audit(1579440386.053:1061589): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13081 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 544.994351][ T26] audit: type=1326 audit(1579440386.063:1061591): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13081 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 545.020651][ T26] audit: type=1326 audit(1579440386.063:1061592): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13081 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 545.046739][ T26] audit: type=1326 audit(1579440386.063:1061593): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13081 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 545.072946][ T26] audit: type=1326 audit(1579440386.063:1061594): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13081 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 545.098973][ T26] audit: type=1326 audit(1579440386.063:1061595): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13081 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 545.125737][ T26] audit: type=1326 audit(1579440386.063:1061596): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13081 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 545.151810][ T26] audit: type=1326 audit(1579440386.063:1061597): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13081 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 545.177761][ T26] audit: type=1326 audit(1579440386.063:1061598): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13081 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 545.204009][ T26] audit: type=1326 audit(1579440386.063:1061599): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13081 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 13:26:26 executing program 1: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x8ec0, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r3, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) 13:26:26 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x400000) 13:26:26 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3, 0x0, 0xe}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:26:26 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r1 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r1}], 0x1, 0x2000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup2(r0, r1) 13:26:26 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e2100000200000000000000008805"], 0x23}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:26:26 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:26:26 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x517000) [ 545.891822][T13158] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 545.901784][T13158] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 545.912115][T13158] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 545.933611][T13158] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 13:26:27 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:26:27 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3, 0x0, 0x11}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 546.064683][T13162] EXT4-fs (loop2): bad geometry: block count 1080 exceeds size of device (354 blocks) [ 546.080840][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 546.086630][ C0] protocol 88fb is buggy, dev hsr_slave_1 13:26:27 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x607100) 13:26:27 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3, 0x0, 0x21}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:26:27 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e2100000200000000000000008805"], 0x23}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 546.287821][T13174] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 546.326910][T13174] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 546.400751][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 546.406584][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 546.421505][T13174] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 546.509732][T13174] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 546.640742][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 546.646560][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 546.748123][T13191] EXT4-fs (loop2): bad geometry: block count 1080 exceeds size of device (354 blocks) 13:26:29 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x3, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:26:29 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x705100) 13:26:29 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3, 0x0, 0x57}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:26:29 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r1 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r1}], 0x1, 0xc103) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup2(r0, r1) 13:26:29 executing program 1: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x8ec0, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r3, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) 13:26:29 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 13:26:30 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x716000) 13:26:30 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 13:26:30 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3, 0x0, 0x60}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 549.105493][T13223] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 549.186054][T13223] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 13:26:30 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x71f000) [ 549.280750][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 549.286819][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 549.311837][T13223] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 549.345468][T13223] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 549.520806][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 549.527164][ C0] protocol 88fb is buggy, dev hsr_slave_1 13:26:30 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x760000) 13:26:30 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3, 0x0, 0x300}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:26:30 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x4, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:26:30 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 13:26:31 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r1 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r1}], 0x1, 0xe0ff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup2(r0, r1) 13:26:31 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x960000) [ 549.975289][ T26] kauditd_printk_skb: 29728 callbacks suppressed [ 549.975310][ T26] audit: type=1326 audit(1579440391.073:1091328): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13219 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 550.020292][T13288] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 550.043750][T13288] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 550.053823][T13288] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 550.074444][T13288] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 550.223297][ T26] audit: type=1326 audit(1579440391.053:1091326): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13219 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 550.268810][ T26] audit: type=1326 audit(1579440391.073:1091329): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13219 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 550.291672][ T26] audit: type=1326 audit(1579440391.073:1091330): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13219 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 550.314591][ T26] audit: type=1326 audit(1579440391.073:1091331): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13219 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 550.346155][ T26] audit: type=1326 audit(1579440391.073:1091332): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13219 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 550.377393][ T26] audit: type=1326 audit(1579440391.073:1091333): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13219 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 550.404865][ T26] audit: type=1326 audit(1579440391.073:1091334): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13219 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 550.453116][ T26] audit: type=1326 audit(1579440391.173:1091336): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13219 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 550.493154][ T26] audit: type=1326 audit(1579440391.173:1091337): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13219 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 13:26:32 executing program 1: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x8ec0, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r4, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) 13:26:32 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3, 0x0, 0x5ac}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:26:32 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 13:26:32 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x5, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:26:32 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xf07100) 13:26:32 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r1 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r1}], 0x1, 0xff03) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup2(r0, r1) 13:26:33 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x1000000) 13:26:33 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3, 0x0, 0x5c4}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:26:33 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 13:26:33 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x2000000) [ 552.130082][T13325] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 552.179911][T13325] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 552.265660][T13325] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock 13:26:33 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3, 0x0, 0x700}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 552.320748][ C0] net_ratelimit: 6 callbacks suppressed [ 552.320758][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 552.332183][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 552.386739][T13325] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 13:26:33 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x3000000) [ 552.640740][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 552.646538][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 552.880738][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 552.886527][ C1] protocol 88fb is buggy, dev hsr_slave_1 13:26:36 executing program 1: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x8ec0, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r4, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) 13:26:36 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 13:26:36 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3, 0x0, 0x900}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:26:36 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x6, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:26:36 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x4000000) 13:26:36 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VHOST_VSOCK_SET_GUEST_CID(r2, 0x4008af60, &(0x7f0000000080)={@host}) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r5, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)={0x28, r6, 0x535, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x14, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}]}]}, 0x28}}, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r2, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000140)={&(0x7f0000000640)={0x370, r6, 0x200, 0x70bd26, 0x25dfdbfd, {}, [@TIPC_NLA_NET={0x2c, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8205}, @TIPC_NLA_NET_ADDR={0x8}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xd84}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x9}]}, @TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xffff42b1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfff}]}, @TIPC_NLA_LINK={0xb4, 0x4, [@TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}, @TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_NET={0x2c, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x80000001}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7f}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x6}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x511}]}, @TIPC_NLA_BEARER={0xec, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'macvlan0\x00'}}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x1000, @loopback, 0x1}}, {0x14, 0x2, @in={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, @TIPC_NLA_BEARER_PROP={0x44, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xe89}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x7, @loopback}}, {0x14, 0x2, @in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3ff}]}, @TIPC_NLA_MON={0x3c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xcb95}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7528}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}]}, @TIPC_NLA_NET={0x24, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x3}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x100000001}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7}]}, @TIPC_NLA_BEARER={0x40, 0x1, [@TIPC_NLA_BEARER_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x769}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}]}]}, @TIPC_NLA_BEARER={0x9c, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x5}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @multicast1}}, {0x14, 0x2, @in={0x2, 0x4e24, @multicast2}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x6, @remote, 0x1}}, {0x14, 0x2, @in={0x2, 0x4e21, @empty}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @rand_addr=0x6f}}, {0x14, 0x2, @in={0x2, 0x4e24, @rand_addr=0x1}}}}]}]}, 0x370}, 0x1, 0x0, 0x0, 0x4000080}, 0x0) poll(&(0x7f0000000040)=[{r4}], 0x1, 0x100) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)) r7 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) read$FUSE(r7, &(0x7f0000007380), 0x1000) socket$packet(0x11, 0x3, 0x300) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) dup2(r3, r4) syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x80000001, 0x20200) 13:26:36 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x5000000) [ 555.169134][ T26] kauditd_printk_skb: 46101 callbacks suppressed [ 555.169157][ T26] audit: type=1326 audit(1579440396.263:1137438): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13402 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45df9a code=0x50000 13:26:36 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3, 0x0, 0xa00}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:26:36 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x6000000) [ 555.212174][ T26] audit: type=1326 audit(1579440396.263:1137439): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13402 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 555.236245][ T26] audit: type=1326 audit(1579440396.263:1137440): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13402 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 13:26:36 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x7000000) 13:26:36 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r1 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r1}], 0x1, 0x100) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RATTACH(r6, &(0x7f00000000c0)={0xffffff8b}, 0x14) fsconfig$FSCONFIG_SET_BINARY(r6, 0x2, &(0x7f0000000340)='/dev/input/mice\x00', &(0x7f0000000400)="6305072e8c658887f4363fa5b2da9f71fe35abf0c38ba081e2577d5767c292c60c09d0b5740f3855a0def721018e79e40d3350688ad775f92ac7756fa74574d9c0e54578693176b46ddd5cc86a2b3901957f7f61345a8e7be9fd3534509c4496b6f1b83b5f455952986995cbb3305ec9d6028e9be5e912", 0x77) r7 = socket$inet6(0xa, 0x1, 0x0) fcntl$dupfd(r5, 0x0, r7) ioctl$FS_IOC_MEASURE_VERITY(r7, 0xc0046686, &(0x7f0000000280)=ANY=[@ANYBLOB="020039004c96a9b3f0b3a312c38cf73514c0076bdc840125b581492af49526efe9b769f0f22b90cfb83112a5020088a5c87f2e57900000000000000000"]) r8 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) read$FUSE(r8, &(0x7f0000007380), 0x1000) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) setsockopt$inet6_buf(r4, 0x29, 0x45, &(0x7f0000000100)="2437c2fa18f85c982f11726e3fa5d1b04adda256763ba4abd2d6bde6dfdbefe48037f8f9421c02f0ba65b2c39bb34f8978e4a74b37d08105011bb1c7971975af677d9ed5eb7d5f5fe932be62f8781228b33eb1d48139d52beaec618e0fa1936abe51b088dff40b7c9110f287b06fbee1dbc950f183d6c8061aab3ea62848d3defd0660250b2444c29ffacf93c3deda852798098827bc662de7966c157d0c8dc042189b3bf98d6ebfd4192f4829b74e9697a6bcbcc7a17fbeb392a290d9f5a9a9d24dcb979c9c4a12ab5db57f52137a7915f3593d21703739ffd7c413a5e33cf4", 0xe0) r9 = socket$inet6(0xa, 0x1, 0x0) r10 = fcntl$dupfd(r4, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$KVM_X86_SETUP_MCE(r10, 0x4008ae9c, &(0x7f0000000000)={0x5, 0x2, 0x5}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000200)=0x14) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_open_dev$mice(&(0x7f0000000240)='/dev/input/mice\x00', 0x0, 0x0) dup2(r0, r1) [ 555.343000][T13403] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 555.431858][T13403] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 13:26:36 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x4801, 0x0) [ 555.475636][ T26] audit: type=1326 audit(1579440396.263:1137441): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13402 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 555.487045][T13403] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 555.530766][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 555.536640][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 555.636164][ T26] audit: type=1326 audit(1579440396.263:1137442): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13402 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 555.689150][T13403] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 555.746151][ T26] audit: type=1326 audit(1579440396.263:1137443): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13402 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 555.768813][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 555.768841][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 555.783036][ T26] audit: type=1326 audit(1579440396.263:1137444): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13402 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 555.806274][ T26] audit: type=1326 audit(1579440396.263:1137445): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13402 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 555.830099][ T26] audit: type=1326 audit(1579440396.263:1137446): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13402 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 555.897662][T13443] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 555.904321][ T26] audit: type=1326 audit(1579440396.263:1137447): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13402 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 13:26:39 executing program 1: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x8ec0, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r4, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) 13:26:39 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3, 0x0, 0xe00}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:26:39 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x7e000000) 13:26:39 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r1 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r1}], 0x1, 0x100) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000100)={0x5, 0x3, 0x4, 0x2000000, 0x4, {0x77359400}, {0x5, 0x2, 0x5, 0xa4, 0x5, 0x19, "b4b37dd0"}, 0xffffffff, 0x4, @offset=0xffffff80, 0x1f, 0x0, r1}) statx(r2, &(0x7f0000000000)='./file0\x00', 0x400, 0x8, &(0x7f0000000180)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup2(r0, r1) 13:26:39 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x7, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:26:39 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x4801, 0x0) 13:26:39 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xff600000) [ 558.339924][T13474] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 13:26:39 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3, 0x0, 0x1100}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 558.415729][T13464] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 13:26:39 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x400000000000) [ 558.468606][T13464] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 13:26:39 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x4801, 0x0) [ 558.532166][T13464] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 558.566544][T13464] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 13:26:39 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3, 0x0, 0x2100}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:26:39 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x60ffffffffff) [ 559.032347][T13500] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 560.173896][ T26] kauditd_printk_skb: 44918 callbacks suppressed [ 560.173915][ T26] audit: type=1326 audit(1579440401.263:1182354): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13466 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 560.206182][ T26] audit: type=1326 audit(1579440401.273:1182368): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13466 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 560.231946][ T26] audit: type=1326 audit(1579440401.273:1182369): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13466 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 560.257415][ T26] audit: type=1326 audit(1579440401.273:1182370): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13466 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 560.283807][ T26] audit: type=1326 audit(1579440401.273:1182371): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13466 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 560.309549][ T26] audit: type=1326 audit(1579440401.273:1182372): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13466 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 560.335587][ T26] audit: type=1326 audit(1579440401.273:1182373): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13466 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 560.362070][ T26] audit: type=1326 audit(1579440401.273:1182374): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13466 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 560.388316][ T26] audit: type=1326 audit(1579440401.273:1182375): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13466 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 560.415235][ T26] audit: type=1326 audit(1579440401.273:1182376): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13466 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 13:26:42 executing program 1: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x8ec0, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_settime(0x0, 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r4, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) 13:26:42 executing program 0: epoll_create1(0x0) r0 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000007380), 0x1000) sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x38, 0x0, 0x800, 0x70bd29, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1ff}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7fff}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xe9}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x1f}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x8000}, 0x400c000) r1 = socket$packet(0x11, 0x3, 0x300) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000200)='threaded\x00', 0x175d900f) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x46800) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0x175d900f) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x7, 0x1000, 0x8, 0x6, 0xde3, 0x0, 0x4}, 0x1c) r3 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r3}], 0x1, 0x100) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0x200000, 0x0) sendmsg$IPSET_CMD_HEADER(r4, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x5c, 0xc, 0x6, 0x3, 0x0, 0x0, {0x5, 0x0, 0x9}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x5c}}, 0x20004000) syz_extract_tcp_res(&(0x7f0000000000), 0x8f7f, 0x9) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) dup2(r1, r3) 13:26:42 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3, 0x0, 0x5700}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:26:42 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x8, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:26:42 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x760000000000) 13:26:42 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x4801, 0x0) 13:26:42 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x7fb4fd0f9000) [ 561.522355][T13538] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 561.530468][T13525] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 561.577946][T13525] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 13:26:42 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3, 0x0, 0x6000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 561.625580][T13525] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 561.679054][T13525] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 13:26:43 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x4801, 0x0) 13:26:43 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x7fffffffefff) 13:26:43 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x9, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:26:43 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r1 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r1}], 0x1, 0x100) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) read$FUSE(r4, &(0x7f0000007380), 0x1000) r5 = inotify_add_watch(r4, &(0x7f0000000000)='./file0\x00', 0xf1000020) inotify_rm_watch(0xffffffffffffffff, r5) dup2(r0, r1) [ 562.185364][T13568] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 562.404825][T13580] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 562.424278][T13580] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 562.491422][T13580] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 562.513442][T13580] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 13:26:45 executing program 1: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x8ec0, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_settime(0x0, 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r4, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) 13:26:45 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3, 0x0, 0x7db0}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:26:45 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x4801, 0x0) 13:26:45 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x960000000000) 13:26:45 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xa, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:26:45 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r1 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r1}], 0x1, 0x100) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0xee00, r4, 0x0) ioprio_get$uid(0x3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup2(r0, r1) 13:26:45 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x20000000000000) [ 564.583033][T13605] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 13:26:45 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x60710000000000) 13:26:45 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3, 0x0, 0xac05}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:26:45 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x400}], 0x4801, 0x0) [ 564.717274][T13610] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 564.727411][T13610] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 564.737876][T13610] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 564.785771][T13610] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 13:26:46 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x70510000000000) 13:26:46 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3, 0x0, 0xb07d}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 564.956320][T13642] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 13:26:48 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r1 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r1}], 0x1, 0x100) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup2(r0, r1) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$inet6(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) statx(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xc00, 0x4, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ENTRY(r6, &(0x7f0000000200)={0x90, 0x0, 0x6, {0x5, 0x2, 0x820, 0x7fffffff, 0x3, 0x6, {0x0, 0x1, 0xd8f, 0x7f, 0x5, 0x20, 0x1, 0x6000, 0x8d1, 0x0, 0x7, r7, 0xee01, 0x5, 0x3}}}, 0x90) r8 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) read$FUSE(r8, &(0x7f0000007380), 0x1000) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) r10 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RATTACH(r10, &(0x7f00000000c0)={0xffffff8b}, 0x14) r11 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r11, 0x4, 0x46800) write$cgroup_type(r11, &(0x7f0000000200)='threaded\x00', 0x175d900f) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r11, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x4, 0x30}, &(0x7f0000000380)=0xc) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r10, 0x84, 0x18, &(0x7f0000000400)={r12, 0x6}, 0x8) r13 = socket$inet6(0xa, 0x1, 0x0) fcntl$dupfd(r9, 0x0, r13) ioctl(r9, 0x5, &(0x7f0000000300)="5390a860e1c0c2691fd7b2f4ee684430e9afcb0276382d7508282e0a1958c47973c17d092a6ee79d311212") ioctl$EVIOCSABS20(r8, 0x401845e0, &(0x7f00000002c0)={0x6, 0x100, 0xb03b, 0x7, 0x800, 0x3}) r14 = socket$inet6_tcp(0xa, 0x1, 0x0) r15 = socket$inet6(0xa, 0x1, 0x0) fcntl$dupfd(r14, 0x0, r15) fallocate(r15, 0x4, 0x7, 0x5) ioctl$TIOCSERGETLSR(r6, 0x5459, &(0x7f0000000000)) 13:26:48 executing program 1: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x8ec0, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_settime(0x0, 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r4, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) 13:26:48 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x900ffdb47f0000) 13:26:48 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xc, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:26:48 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x400}], 0x4801, 0x0) 13:26:48 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3, 0x0, 0xc405}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:26:48 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xf0710000000000) [ 567.668658][ T26] kauditd_printk_skb: 7958 callbacks suppressed [ 567.668753][ T26] audit: type=1326 audit(1579440408.763:1190334): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13673 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45df9a code=0x50000 [ 567.708099][ T26] audit: type=1326 audit(1579440408.763:1190335): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13673 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 567.741232][ T26] audit: type=1326 audit(1579440408.763:1190336): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13673 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 567.810788][ T26] audit: type=1326 audit(1579440408.763:1190337): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13673 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 13:26:48 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3, 0x0, 0x34000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 567.861252][T13687] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 567.872422][T13675] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 567.885611][T13675] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 567.896033][ T26] audit: type=1326 audit(1579440408.763:1190338): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13673 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 567.900812][T13675] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 567.924576][ T26] audit: type=1326 audit(1579440408.763:1190339): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13673 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 13:26:49 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r1 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r1}], 0x1, 0x100) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup2(r0, r1) r4 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RATTACH(r4, &(0x7f00000000c0)={0xffffff8b}, 0x14) ioctl$BLKROSET(r4, 0x125d, &(0x7f0000000000)=0x1) [ 567.954190][ T26] audit: type=1326 audit(1579440408.763:1190340): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13673 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 13:26:49 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x100000000000000) 13:26:49 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x400}], 0x4801, 0x0) [ 568.088050][T13675] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 568.118072][ T26] audit: type=1326 audit(1579440408.763:1190341): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13673 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 568.174117][ T26] audit: type=1326 audit(1579440408.763:1190342): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13673 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 568.209309][ T26] audit: type=1326 audit(1579440408.763:1190343): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13673 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 568.240769][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 568.246829][ C0] protocol 88fb is buggy, dev hsr_slave_1 13:26:49 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3, 0x0, 0x400300}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 568.277366][T13711] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 13:26:49 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0), 0x0, 0x400}], 0x4801, 0x0) [ 568.627996][T13733] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 13:26:51 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x200000000000000) 13:26:51 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x23, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:26:51 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3, 0x0, 0x1000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:26:51 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0), 0x0, 0x400}], 0x4801, 0x0) 13:26:51 executing program 1: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x8ec0, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, 0x0, &(0x7f0000000200)=0x0) timer_settime(r4, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) 13:26:51 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r1 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r1}], 0x1, 0x100) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000080)={0x7, 0x4, 0x8000, 0x4b2b1ff5, 0x9, 0x0, 0xb4d, 0x800, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r3, 0x84, 0x23, &(0x7f0000000140)={r4, 0x5}, 0x8) dup2(r0, r1) 13:26:51 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x300000000000000) 13:26:52 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3, 0x0, 0x2000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 570.882721][T13751] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 13:26:52 executing program 1: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x8ec0, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, 0x0, &(0x7f0000000200)=0x0) timer_settime(r4, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) [ 570.942655][T13766] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 13:26:52 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x400000000000000) 13:26:52 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0), 0x0, 0x400}], 0x4801, 0x0) [ 571.050792][T13766] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 571.088713][T13766] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock 13:26:52 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3, 0x0, 0x3000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 571.131692][T13766] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 13:26:52 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) read$FUSE(r1, &(0x7f0000007380), 0x1000) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000100)={{0x0, 0x3, 0x1000, 0x1, 0x2}, 0xfff, 0x3}) r2 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r2}], 0x1, 0x100) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup2(r0, r2) [ 571.297357][T13792] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 13:26:52 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2d, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:26:52 executing program 1: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x8ec0, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, 0x0, &(0x7f0000000200)=0x0) timer_settime(r4, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) 13:26:52 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x500000000000000) 13:26:52 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001", 0x1d, 0x400}], 0x4801, 0x0) 13:26:52 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3, 0x0, 0x4000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 571.600800][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 571.606622][ C1] protocol 88fb is buggy, dev hsr_slave_1 13:26:52 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x600000000000000) 13:26:52 executing program 1: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x8ec0, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r4, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) 13:26:53 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001", 0x1d, 0x400}], 0x4801, 0x0) 13:26:53 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3, 0x0, 0x7000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 571.971998][T13826] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 13:26:53 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x700000000000000) [ 572.092246][T13842] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 572.099451][T13826] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 572.118417][T13826] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock 13:26:53 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r1 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r1}], 0x1, 0x100) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x422000, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r3, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x82, 0x7, [0x2, 0xea0b, 0x1ff, 0x2d3, 0x5, 0x2, 0x3]}, &(0x7f0000000100)=0x16) r4 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup2(r0, r1) [ 572.140100][T13826] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 13:26:53 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001", 0x1d, 0x400}], 0x4801, 0x0) [ 572.400772][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 572.406779][ C0] protocol 88fb is buggy, dev hsr_slave_1 13:26:53 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x48, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:26:53 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x7e00000000000000) [ 572.474148][T13861] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 13:26:53 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3, 0x0, 0x9000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:26:53 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000) 13:26:53 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000", 0x2c, 0x400}], 0x4801, 0x0) [ 572.670856][ T26] kauditd_printk_skb: 4085 callbacks suppressed [ 572.670875][ T26] audit: type=1326 audit(1579440413.773:1194429): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13825 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45df9a code=0x50000 [ 572.758704][ T26] audit: type=1326 audit(1579440413.813:1194430): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13825 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 572.782579][ T26] audit: type=1326 audit(1579440413.813:1194431): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13825 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 572.805860][ T26] audit: type=1326 audit(1579440413.813:1194432): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13825 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 13:26:54 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3, 0x0, 0xa000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 572.923265][ T26] audit: type=1326 audit(1579440413.813:1194433): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13825 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 572.962132][ T26] audit: type=1326 audit(1579440413.813:1194435): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13825 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=35 compat=0 ip=0x459621 code=0x50000 [ 572.989304][ T26] audit: type=1326 audit(1579440413.813:1194436): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13825 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45df9a code=0x50000 [ 573.049080][ T26] audit: type=1326 audit(1579440413.813:1194437): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13825 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=35 compat=0 ip=0x459621 code=0x50000 [ 573.051485][T13877] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 573.073156][ T26] audit: type=1326 audit(1579440413.813:1194438): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13825 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45df9a code=0x50000 [ 573.105493][ T26] audit: type=1326 audit(1579440413.813:1194439): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13825 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=35 compat=0 ip=0x459621 code=0x50000 [ 573.134110][T13885] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 573.151156][T13877] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 573.179545][T13877] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 573.213140][T13877] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 13:26:55 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffefffffff7f0000) 13:26:55 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x823d, 0x6, 0x800}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r1}], 0x1, 0x100) r2 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1, 0x60800) ioctl$SIOCAX25GETINFO(r2, 0x89ed, &(0x7f0000000100)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup2(r0, r1) 13:26:55 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3, 0x0, 0xe000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:26:55 executing program 1: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x8ec0, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r4, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) 13:26:55 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x4c, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:26:55 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000", 0x2c, 0x400}], 0x4801, 0x0) 13:26:56 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000) 13:26:56 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3, 0x0, 0x11000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 575.008074][T13939] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 13:26:56 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffff600000) [ 575.168590][T13940] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 575.200747][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 575.206582][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 575.300760][T13940] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 575.322888][T13940] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock 13:26:56 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000", 0x2c, 0x400}], 0x4801, 0x0) [ 575.353166][T13940] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 13:26:56 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RATTACH(r1, &(0x7f00000000c0)={0xffffff8b}, 0x14) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000300)={'veth1\x00', 0x0}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000002700)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_MASTER={0x8, 0xa, r7}]}, 0x28}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'batadv_slave_1\x00', r7}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'veth1_to_team\x00', r8}) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r9 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r9}], 0x1, 0x100) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = dup(r10) r12 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) read$FUSE(r12, &(0x7f0000007380), 0x1000) name_to_handle_at(r12, &(0x7f0000000000)='./file0\x00', &(0x7f0000001500)=ANY=[@ANYBLOB="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"], &(0x7f0000000080), 0x1800) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) dup2(r0, r9) 13:26:56 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x60, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:26:56 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3, 0x0, 0x21000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:26:56 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) socket$inet(0x2, 0x2, 0x1) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) syz_open_dev$ttys(0xc, 0x2, 0x1) r2 = socket(0x10, 0x80002, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) [ 575.569393][T13964] bridge1: port 1(veth1) entered blocking state [ 575.590841][T13964] bridge1: port 1(veth1) entered disabled state [ 575.638398][T13964] device veth1 entered promiscuous mode [ 575.760828][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 575.766731][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 575.841069][T13970] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 13:26:57 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe", 0x33, 0x400}], 0x4801, 0x0) [ 576.029538][T13979] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 576.051660][T13968] device veth1 left promiscuous mode [ 576.057065][T13968] bridge1: port 1(veth1) entered disabled state [ 576.136036][T13979] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 576.192663][T13979] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 576.200773][T13991] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 576.232940][T13979] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 577.680799][ T26] kauditd_printk_skb: 40670 callbacks suppressed [ 577.680819][ T26] audit: type=1326 audit(1579440418.773:1235109): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13925 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45df9a code=0x50000 [ 577.709969][ T26] audit: type=1326 audit(1579440418.773:1235110): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13925 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 577.733639][ T26] audit: type=1326 audit(1579440418.783:1235111): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13925 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 577.756396][ T26] audit: type=1326 audit(1579440418.783:1235112): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13925 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 577.778944][ T26] audit: type=1326 audit(1579440418.783:1235113): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13925 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 577.801821][ T26] audit: type=1326 audit(1579440418.783:1235114): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13925 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 577.825083][ T26] audit: type=1326 audit(1579440418.783:1235115): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13925 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 577.847706][ T26] audit: type=1326 audit(1579440418.783:1235116): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13925 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 13:26:59 executing program 1: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x8ec0, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r4, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) 13:26:59 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3, 0x0, 0x57000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:26:59 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x68, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:26:59 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe", 0x33, 0x400}], 0x4801, 0x0) 13:26:59 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r1 = socket$packet(0x11, 0x0, 0x300) poll(&(0x7f0000000040)=[{r1}], 0x1, 0x100) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000001600)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x1c, r5, 0x401}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x34, r5, 0x200, 0x70bd2a, 0x25dfdbfd, {{}, {}, {0x18, 0x13, @l2={'eth', 0x3a, 'veth0_to_bond\x00'}}}, ["", "", "", "", ""]}, 0x34}, 0x1, 0x0, 0x0, 0x40d230784c20f3c4}, 0x0) dup2(r0, r1) r6 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) alarm(0xb772) read$FUSE(r6, &(0x7f0000007380), 0x1000) r7 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RATTACH(r7, &(0x7f00000000c0)={0x14, 0x69, 0x80}, 0x14) r8 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') r9 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r9, 0x4, 0x46800) write$cgroup_type(r9, &(0x7f0000000200)='threaded\x00', 0x175d900f) getsockopt$inet_IP_XFRM_POLICY(r9, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@mcast1, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000380)=0xe8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r11, 0x8933, &(0x7f0000000300)={'veth1\x00', 0x0}) r14 = socket$nl_route(0x10, 0x3, 0x0) r15 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r15, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r15, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r14, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r16}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route(r12, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000002700)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r13}, [@IFLA_MASTER={0x8, 0xa, r16}]}, 0x28}}, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(r7, &(0x7f00000004c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x42000020}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x5c, r8, 0x2, 0x70bd25, 0x25dfdbfb, {}, [{{0x8, 0x1, r10}, {0x40, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r16}}}]}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x20000849}, 0x2000c800) getpeername$unix(r6, &(0x7f0000000100), &(0x7f0000000000)=0x6e) 13:26:59 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_NUM(r1, 0x4008af10, &(0x7f0000000040)={0x2, 0xff}) r2 = socket(0x10, 0x80002, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) [ 577.870335][ T26] audit: type=1326 audit(1579440418.783:1235117): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13925 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 577.892954][ T26] audit: type=1326 audit(1579440418.783:1235118): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13925 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 13:26:59 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3, 0x0, 0x60000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 578.153299][T14021] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 578.154485][T14017] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 578.163361][T14021] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 578.181151][T14021] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 578.204744][T14021] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 13:26:59 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") r2 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RATTACH(r2, &(0x7f00000000c0)={0xffffff8b}, 0x14) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) [ 578.253795][T14034] bridge2: port 1(veth1) entered blocking state [ 578.269487][T14034] bridge2: port 1(veth1) entered disabled state [ 578.280299][T14034] device veth1 entered promiscuous mode 13:26:59 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe", 0x33, 0x400}], 0x4801, 0x0) 13:26:59 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x6c, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:26:59 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3, 0x0, 0xac050000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 578.590947][T14047] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 13:26:59 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) read$FUSE(r1, &(0x7f0000007380), 0x1000) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f00000000c0)=@req={0x6, 0x6, 0x5, 0x200}, 0x45) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read$char_usb(r5, &(0x7f0000000140)=""/119, 0x77) r6 = socket$alg(0x26, 0x5, 0x0) poll(&(0x7f0000000000)=[{r2}, {r6, 0x1400}], 0x2, 0x100) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) fgetxattr(r7, &(0x7f0000000080)=@random={'security.', ':\x00'}, &(0x7f0000000100)=""/14, 0xe) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) r10 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x444000, 0x0) ioctl$KVM_SET_REGS(r10, 0x4090ae82, &(0x7f0000000200)={[0xffffffffffff8be0, 0x10001, 0xff, 0x4, 0xffff, 0xfffffffffffffffd, 0x800, 0x8, 0x1f, 0x5, 0xfffffffffffffff8, 0x0, 0x3, 0x80000000, 0x2, 0x6], 0xd000, 0x6094}) dup2(r0, r2) [ 578.969470][T14060] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 578.999840][T14060] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 579.010898][T14060] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 579.042437][T14060] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 13:27:02 executing program 1: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x8ec0, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) 13:27:02 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3, 0x0, 0xb07d0000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:27:02 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ff", 0x37, 0x400}], 0x4801, 0x0) 13:27:02 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008812, &(0x7f00000001c0)="080db5055e0bcfe8697071") r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x46800) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0x175d900f) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) r6 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x2d, 0x0) getsockopt$inet6_tcp_buf(r6, 0x6, 0xb, &(0x7f0000000240)=""/169, &(0x7f00000000c0)=0xa9) r7 = creat(&(0x7f0000000440)='./bus\x00', 0x8) fcntl$setstatus(r7, 0x4, 0x46800) write$cgroup_type(r7, &(0x7f0000000200)='threaded\x00', 0x175d900f) setsockopt$ax25_int(r7, 0x101, 0x6, &(0x7f0000000180)=0x7fff, 0x4) r8 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r8, 0x4, 0x46800) write$cgroup_type(r8, &(0x7f0000000200)='threaded\x00', 0x175d900f) r9 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') sendmsg$SEG6_CMD_SET_TUNSRC(r8, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x28, r9, 0x400, 0x70bd26, 0x25dfdbff, {}, [@SEG6_ATTR_DST={0x14, 0x1, @mcast1}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000000}, 0x48880) ioctl$PPPIOCSMRU1(r5, 0x40047452, &(0x7f0000000140)=0x4) ioctl$VIDIOC_QBUF(r2, 0xc058560f, &(0x7f0000000000)={0x83eb, 0x0, 0x4, 0x10, 0x7, {0x77359400}, {0x2, 0x8, 0x6, 0x1, 0x32, 0x81}, 0x8000, 0x4, @userptr=0xffffffffffffffff, 0x6, 0x0, r4}) syz_kvm_setup_cpu$x86(r0, r10, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x13, 0x0, 0x0) 13:27:02 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x74, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:27:02 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r1 = socket$packet(0x11, 0x3, 0x300) fcntl$getownex(r0, 0x10, &(0x7f0000000000)) poll(&(0x7f0000000040)=[{r1}], 0x1, 0x100) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup2(r0, 0xffffffffffffffff) 13:27:02 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3, 0x0, 0xc4050000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 581.230866][T14092] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 13:27:02 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3, 0x0, 0xffffff7f}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:27:02 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ff", 0x37, 0x400}], 0x4801, 0x0) [ 581.421893][T14090] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 581.440762][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 581.446570][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 581.543686][T14090] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 581.553692][T14090] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 581.587381][T14090] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 13:27:02 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0xc, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:27:02 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x795740, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6(0xa, 0x1, 0x0) fcntl$dupfd(r2, 0x0, r3) setsockopt$sock_int(r3, 0x1, 0x1d, &(0x7f0000000100)=0x1, 0x4) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/seq/timer\x00', 0x0, 0x0) setsockopt$sock_int(r4, 0x1, 0x12, &(0x7f0000000080)=0x1ff, 0x4) ioctl$VFIO_IOMMU_GET_INFO(r4, 0x3b70, &(0x7f0000000040)={0x18, 0x0, 0x0, 0xfff}) syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(0xffffffffffffffff, 0x5386, &(0x7f00000000c0)) [ 581.717604][T14123] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 13:27:02 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x7fff, 0x6, 0x8000, 0x2}, 0x1c) r1 = socket$packet(0x11, 0x2, 0x300) poll(&(0x7f0000000040)=[{r1}], 0x1, 0x100) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup2(r0, r1) [ 582.690790][ T26] kauditd_printk_skb: 40487 callbacks suppressed [ 582.690811][ T26] audit: type=1326 audit(1579440423.783:1275606): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14093 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=35 compat=0 ip=0x459621 code=0x50000 [ 582.719827][ T26] audit: type=1326 audit(1579440423.793:1275608): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14093 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45df9a code=0x50000 [ 582.742457][ T26] audit: type=1326 audit(1579440423.793:1275609): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14093 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=35 compat=0 ip=0x459621 code=0x50000 [ 582.765186][ T26] audit: type=1326 audit(1579440423.793:1275610): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14093 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45df9a code=0x50000 [ 582.787718][ T26] audit: type=1326 audit(1579440423.793:1275611): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14093 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=35 compat=0 ip=0x459621 code=0x50000 [ 582.810745][ T26] audit: type=1326 audit(1579440423.793:1275612): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14093 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45df9a code=0x50000 [ 582.833476][ T26] audit: type=1326 audit(1579440423.793:1275613): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14093 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=35 compat=0 ip=0x459621 code=0x50000 [ 582.855986][ T26] audit: type=1326 audit(1579440423.793:1275614): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14093 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45df9a code=0x50000 [ 582.878682][ T26] audit: type=1326 audit(1579440423.793:1275615): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14093 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=35 compat=0 ip=0x459621 code=0x50000 [ 582.901451][ T26] audit: type=1326 audit(1579440423.793:1275616): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14093 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45df9a code=0x50000 13:27:05 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x13, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:27:05 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x7a, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:27:05 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ff", 0x37, 0x400}], 0x4801, 0x0) 13:27:05 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) r1 = syz_open_dev$ttys(0xc, 0x2, 0x1) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x10, 0x0, 0x1fc, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x4}, 0x20) ioctl$FS_IOC_SETVERSION(r1, 0x40087602, &(0x7f0000000000)=0xffff) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)={0x2, 0x5, 0x4, 0x2, 0x23, 0x0, 0x70bd2d, 0x25dfdbfc, [@sadb_key={0x18, 0x8, 0x5b8, 0x0, "72f03cc367feb35a2fb3ccc7e02d0d089add5d787ca17b62e4ba9399802dc696b8c9336036308ab6b8c50515ab0b2863f64d1b809ab087ba5049b217dd9618ee88b65dc1e54b80e3beb1997d26baae55f9a2ba5adeb3521b5dfab78c0890565582404af12e8db118f62c1aa3dd11763b69d7c544c2e770ae83da2cc78aed9b23d5be0c928ae752c6826b6229cc2342f5eb686d3ffd63915b8ec7821662ae11fbf4d3b8d13435302aa40d3a92e89d0c042c031822b4ae27"}, @sadb_ident={0x2, 0xb, 0x8}, @sadb_x_kmaddress={0x7, 0x19, 0x0, @in6={0xa, 0x4e20, 0x6b, @dev={0xfe, 0x80, [], 0x24}, 0xffffffff}, @in={0x2, 0x4e24, @loopback}}]}, 0x118}}, 0x2000c0c4) openat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x100, 0x101) openat$cgroup_int(r2, &(0x7f0000000080)='memory.swap.max\x00', 0x2, 0x0) socket(0x15, 0x5, 0x0) ioctl(r1, 0xd82, &(0x7f0000000240)="080db5055e0bcfe869707117f3e56c0d83262f1986ae0c6b5b5ea6228cbe10afc5cf380ada7039150000000000000000000000000000bf9648f1fda8d95bd2ba") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 13:27:05 executing program 1: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x8ec0, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) 13:27:05 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r1 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r1}], 0x1, 0x100) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x8401, 0x0) ioctl$SOUND_MIXER_INFO(r3, 0x805c4d65, &(0x7f0000000100)) r4 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup2(r0, r1) 13:27:05 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) read$FUSE(r1, &(0x7f0000007380), 0x1000) ioctl$DRM_IOCTL_WAIT_VBLANK(r1, 0xc018643a, &(0x7f0000000080)={0x3e, 0x6, 0x1a}) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x46800) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0x175d900f) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) read$FUSE(r6, &(0x7f0000007380), 0x1000) r7 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000740)={{{@in6=@mcast2, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@empty}}, &(0x7f0000000140)=0xe8) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r8 = socket(0x2, 0x800, 0x0) ioctl(r8, 0x1000008912, &(0x7f0000000000)="08f4e8d3703e35b9983a2b0f8c197a57649a9c7e450e70a92ceb89e75fd413f46fae0b047e1874d2da22aac3449b025c4ccb00b8b90900000000000000f3d5f4feb0cbacc7a097ad1c15cb7a40db4700000000000000") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) [ 584.324255][T14174] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 584.336180][T14171] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 584.370805][T14171] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 13:27:05 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0xa0, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:27:05 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53", 0x39, 0x400}], 0x4801, 0x0) [ 584.416002][T14171] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 584.490017][T14171] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 584.608952][T14187] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 13:27:05 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x148, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:27:05 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53", 0x39, 0x400}], 0x4801, 0x0) 13:27:05 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x9000000, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:27:05 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x101000, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000000)=@req3={0x4, 0xfffffffd, 0xb1, 0x4, 0x7, 0x401, 0x1}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r1}], 0x1, 0x100) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) r3 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) read$FUSE(r3, &(0x7f0000007380), 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400204) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$SCSI_IOCTL_DOORUNLOCK(0xffffffffffffffff, 0x5381) r5 = socket$inet6(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) bind$bt_sco(r6, &(0x7f0000000080)={0x1f, {0x8, 0x4, 0x40, 0x1, 0x40}}, 0x8) dup2(r0, r1) ioctl$UI_SET_MSCBIT(r3, 0x40045568, 0xb) 13:27:06 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000040)=[{&(0x7f0000000180)=',', 0x1}, {&(0x7f00000001c0)="ec", 0x1}], 0x2, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r3 = socket(0x10, 0x80002, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") ioctl$CAPI_NCCI_OPENCOUNT(0xffffffffffffffff, 0x80044326, &(0x7f0000000000)=0x8001) syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 13:27:06 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000340)='/dev/cachefiles\x00', 0x100, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$DRM_IOCTL_AGP_ALLOC(r5, 0xc0206434, &(0x7f0000000380)={0x1000, 0x0, 0x0, 0x7}) ioctl$DRM_IOCTL_AGP_FREE(r2, 0x40206435, &(0x7f00000003c0)={0xfff, r6, 0x2, 0x3}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x80c2, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x1b7301, 0x0) r7 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r8 = eventfd2(0x6, 0x80000) fchdir(r8) ioctl$FS_IOC_ENABLE_VERITY(r7, 0x40806685, &(0x7f0000000140)={0x1, 0x0, 0x1000, 0xfe, &(0x7f0000000200)="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", 0x20, 0x0, &(0x7f0000000080)="ebde81793ed1f834982abbe200b520db3fd6f740360898eb36654a42ac4fb20a"}) r9 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RATTACH(r9, &(0x7f00000000c0)={0xffffff8b}, 0x14) syz_kvm_setup_cpu$x86(r9, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0xfffffffffffffd5a, 0x29, 0x0, 0x0) 13:27:06 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x200000c0, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 585.195505][T14220] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 585.331635][T14215] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 585.457340][T14215] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 585.529613][T14215] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 585.601326][T14215] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 13:27:08 executing program 1: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x8ec0, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) 13:27:08 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53", 0x39, 0x400}], 0x4801, 0x0) 13:27:08 executing program 0: r0 = socket$l2tp6(0xa, 0x2, 0x73) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000100)={'nat\x00'}, &(0x7f0000000000)=0x54) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x202}, 0x1c) r2 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r2}], 0x1, 0x100) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) r5 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RATTACH(r5, &(0x7f00000000c0)={0xffffff8b}, 0x14) getsockopt$inet_sctp_SCTP_EVENTS(r5, 0x84, 0xb, &(0x7f0000000080), &(0x7f0000000180)=0xe) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup2(r1, r2) socket(0x4, 0x4, 0x6) 13:27:08 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0502000023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:27:08 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r1 = syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x450881) ioctl$FS_IOC_GETVERSION(r1, 0x80087601, &(0x7f0000000040)) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r2 = socket(0x2c, 0x80002, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 13:27:08 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x170, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:27:08 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$VIDIOC_ENUMAUDOUT(r0, 0xc0345642, &(0x7f0000000040)={0x80000001, "b7eb4c412a09a27be87de894dfc58a6dced1bcfaeabdd1c775888792b90cbdb5", 0x0, 0x1}) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r1) syz_open_dev$ttys(0xc, 0x2, 0x1) r2 = socket(0x10, 0x80002, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 13:27:08 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a}], 0x4801, 0x0) [ 587.445568][T14266] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 13:27:08 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0503000023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 587.573901][T14262] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 587.633945][T14262] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 587.672560][T14262] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 587.680778][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 587.687994][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 587.704323][ T26] kauditd_printk_skb: 44753 callbacks suppressed [ 587.704386][ T26] audit: type=1326 audit(1579440428.783:1320360): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14272 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 587.746614][T14262] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 13:27:08 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0504000023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 587.800843][T14293] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 587.820935][ T26] audit: type=1326 audit(1579440428.793:1320371): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14272 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 13:27:09 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46800) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) setsockopt$inet_tcp_buf(r1, 0x6, 0xd, &(0x7f0000000000)="65e51ddd3019d89433c3d52d6c5cdd6be692314917a7f9bbca3d62162ce8b4497682ed4abb7ca6d7bbf96c1075b0c63fb2d85ea186ec39b49ebf5e42f911120db0bd3bd70596ef2d47cc56f79724c54ac256053a412353d31064c2fe92cf7e7edfbe9684161c5580e5c0a7557cf9d883b7bb988ba65b92dca4e8831e99327ddee866dc5ecb0e24d9b006001cae5b9bf6923fa8ff90aa26c91c8c0069afa97a217c317702aabf7f5f5ee5c8419693ed9597b845ce318555cd1a3505d6bc86aa303ea839c1262cf970ba", 0xc9) close(r0) ioctl$UFFDIO_ZEROPAGE(r1, 0xc020aa04, &(0x7f0000000240)={{&(0x7f0000fee000/0x4000)=nil, 0x4000}}) getsockopt$IP_SET_OP_VERSION(0xffffffffffffffff, 0x1, 0x53, &(0x7f0000000140), &(0x7f0000000180)=0x8) syz_open_dev$ttys(0xc, 0x2, 0x1) r2 = socket(0x10, 0x80002, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 13:27:09 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x171, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 587.998515][ T26] audit: type=1326 audit(1579440428.793:1320372): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14272 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 588.067151][ T26] audit: type=1326 audit(1579440428.783:1320370): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14272 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45df9a code=0x50000 [ 588.190199][ T26] audit: type=1326 audit(1579440428.793:1320373): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14272 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 588.262030][ T26] audit: type=1326 audit(1579440428.793:1320375): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14272 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 588.288635][ T26] audit: type=1326 audit(1579440428.793:1320374): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14272 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=35 compat=0 ip=0x459621 code=0x50000 [ 588.400480][ T26] audit: type=1326 audit(1579440428.793:1320376): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14272 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 588.439635][T14314] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 588.490626][ T26] audit: type=1326 audit(1579440428.793:1320377): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14272 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45df9a code=0x50000 [ 588.506029][T14314] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 588.535812][ T26] audit: type=1326 audit(1579440428.793:1320378): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14272 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 588.600820][T14314] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 588.675043][T14314] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 13:27:11 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0507000023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:27:11 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a}], 0x4801, 0x0) 13:27:11 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000140)='batadv\x00') sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x3c, r2, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x7}, @BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xfffffeff}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4040011}, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") r3 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RATTACH(r3, &(0x7f00000000c0)={0xffffff8b}, 0x14) getsockopt(r3, 0x1, 0x80000001, &(0x7f0000000000)=""/32, &(0x7f0000000040)=0x20) syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 13:27:11 executing program 1: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x8ec0, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) 13:27:11 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r1 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r1}], 0x1, 0x100) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40240, 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0xee00, r2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0xee00, r3, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000280)={{{@in=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000200)=0xe8) r5 = creat(0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000740)={{{@in6=@loopback, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@local}}, 0x0) getgid() r7 = getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r9 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r9, 0x4, 0x46800) write$cgroup_type(r9, &(0x7f0000000200)='threaded\x00', 0x175d900f) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000840)=ANY=[@ANYBLOB="02000000010001000000000002000400", @ANYRES32=r4, @ANYBLOB="02000400", @ANYRES32, @ANYBLOB="02005bbc", @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32, @ANYBLOB="02000000c568edccf1cd16e04d7dd210370ca6211fced5a452bf90588b552534545595331e875dd1f57000cfd00e07d4ac35db577aa838b0f2f76568ddd9d3988b20f6bf73a03b541b45aaf7b9691b2b06d7390231569f929dfaa87759e5e1c5baa31a2a1a753f", @ANYRES32, @ANYBLOB="02000100", @ANYRES32, @ANYBLOB="02000700", @ANYRES32=r6, @ANYBLOB="040002000000000008000500", @ANYRES32, @ANYBLOB="08000200", @ANYRESHEX=r9, @ANYBLOB="08000500", @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="080003", @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r7, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r8, @ANYBLOB="10000100c6d5cc003cc7e4ab927b000000002000040000000000"], 0x20, 0x0) r10 = open(&(0x7f0000000600)='./bus\x00', 0x400, 0x0) read$FUSE(r10, &(0x7f0000007380), 0x1000) r11 = socket$inet6_tcp(0xa, 0x1, 0x0) r12 = socket$inet6(0xa, 0x1, 0x0) r13 = fcntl$dupfd(r11, 0x0, r12) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) r14 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) read$FUSE(r14, &(0x7f0000007380), 0x1000) r15 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) read$FUSE(r15, &(0x7f0000007380), 0x1000) 13:27:11 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x28f, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:27:11 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x1a, 0x5, 0x4) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 13:27:11 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0509000023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 590.588950][T14340] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 590.681683][T14342] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 590.694335][T14342] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 590.704541][T14342] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 590.737295][T14342] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 13:27:11 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x300, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:27:11 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a}], 0x4801, 0x0) [ 590.890753][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 590.896582][ C1] protocol 88fb is buggy, dev hsr_slave_1 13:27:12 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x40, 0x0, 0x0) 13:27:12 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="050a000023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 591.120763][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 591.126544][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 591.280782][T14385] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 13:27:12 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6(0xa, 0x1, 0x0) fcntl$dupfd(r2, 0x0, r3) ioctl$sock_SIOCSIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r2, 0x8983, &(0x7f0000000000)={0x8, 'ipvlan1\x00', {'veth0_to_batadv\x00'}, 0x8}) poll(&(0x7f0000000040)=[{r1}], 0x1, 0x100) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) dup2(r0, r1) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = socket$inet6(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r6, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$IMSETDEVNAME(r8, 0x80184947, &(0x7f0000000080)={0xfff, 'syz1\x00'}) [ 591.453967][T14389] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 13:27:12 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="050e000023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:27:12 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0xa0080, 0x0) close(r0) r1 = syz_open_dev$ttys(0xc, 0x2, 0x1) r2 = socket(0x10, 0x80002, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RATTACH(r6, &(0x7f00000000c0)={0xffffff8b}, 0x14) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = socket$inet6(0xa, 0x1, 0x0) r9 = fcntl$dupfd(r7, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) r11 = socket$inet6(0xa, 0x1, 0x0) fcntl$dupfd(r10, 0x0, r11) r12 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r12, 0x4, 0x46800) ioctl$SNDRV_PCM_IOCTL_INFO(0xffffffffffffffff, 0x81204101, &(0x7f0000000340)) write$cgroup_type(r12, &(0x7f0000000200)='threaded\x00', 0x175d900f) r13 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000004c0000004c00000007000000020000000000000a030000000600000000000007000000000b0000000000000e0500000001008cc10800000002000085360a00000f000000000000000800000000000000010000000300000000610030005f00"], &(0x7f0000000200)=""/131, 0x6b, 0x83}, 0x20) poll(&(0x7f0000000140)=[{r5, 0x4000}, {r6, 0xe020}, {r1, 0x1000}, {r9, 0x8404}, {r0, 0x1}, {r10, 0x80}, {r1, 0x10}, {r12, 0x1045}, {r13, 0x2280}], 0x9, 0x782) r14 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r14, 0x4, 0x46800) openat$rfkill(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rfkill\x00', 0x700, 0x0) write$cgroup_type(r14, &(0x7f0000000200)='threaded\x00', 0x175d900f) syz_kvm_setup_cpu$x86(r0, r14, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) [ 591.510802][T14389] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 13:27:12 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 591.574165][T14389] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 591.668820][T14389] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 592.032230][T14414] EXT4-fs (loop2): bad geometry: block count 1080 exceeds size of device (1 blocks) [ 592.710792][ T26] kauditd_printk_skb: 36917 callbacks suppressed [ 592.710811][ T26] audit: type=1326 audit(1579440433.803:1357297): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14352 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45df9a code=0x50000 [ 592.739968][ T26] audit: type=1326 audit(1579440433.803:1357296): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14352 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 592.767469][ T26] audit: type=1326 audit(1579440433.813:1357298): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14352 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 592.790835][ T26] audit: type=1326 audit(1579440433.813:1357299): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14352 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 592.813543][ T26] audit: type=1326 audit(1579440433.813:1357300): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14352 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 592.836057][ T26] audit: type=1326 audit(1579440433.813:1357301): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14352 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 592.859813][ T26] audit: type=1326 audit(1579440433.813:1357302): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14352 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 592.882411][ T26] audit: type=1326 audit(1579440433.813:1357303): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14352 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 592.905911][ T26] audit: type=1326 audit(1579440433.813:1357304): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14352 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 592.928718][ T26] audit: type=1326 audit(1579440433.813:1357305): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14352 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 13:27:14 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r4, 0x84, 0x76, &(0x7f0000000240)={r6}, 0x8) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={r6, 0xb5}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f0000000100)=@assoc_value={r7, 0xbf}, 0x8) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r8 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r8}], 0x1, 0x100) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) dup2(r0, r8) 13:27:14 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x410, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:27:14 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0511000023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:27:14 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 13:27:14 executing program 1: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x8ec0, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) 13:27:14 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) close(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46800) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) r2 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) read$FUSE(r2, &(0x7f0000007380), 0x1000) r3 = accept4$llc(r2, &(0x7f0000000140)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f00000002c0)=0x10, 0x80800) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000340)={r3}) syz_open_dev$ttys(0xc, 0x2, 0x0) r4 = socket(0x10, 0x80002, 0x0) ioctl(r4, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x600, 0x0) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RATTACH(r6, &(0x7f00000000c0)={0xffffff8b}, 0x14) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000080)=0x16) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000300)={'veth1\x00', 0x0}) r10 = socket$nl_route(0x10, 0x3, 0x0) r11 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r11, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r11, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r10, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r12}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route(r8, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r9, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r12, @ANYBLOB="1209b2305e8d18ed88f32c8913336a834a8978e4e246fd161a7f612a9e9e0ce8353b1815528c0c012ff3c1438bdc5917c1098ced248047426997b80ede390e0295b03b93a91e"], 0x28}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'vxcan1\x00', r12}) ioctl$sock_inet6_SIOCSIFDSTADDR(r5, 0x8918, &(0x7f0000000400)={@mcast1, 0x4, r13}) syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) [ 593.862246][T14450] EXT4-fs (loop2): bad geometry: block count 1080 exceeds size of device (1 blocks) [ 593.870073][T14437] bridge1: port 1(veth1) entered blocking state 13:27:15 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0521000023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 593.907666][T14437] bridge1: port 1(veth1) entered disabled state [ 593.920755][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 593.926582][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 593.988879][T14451] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 594.045805][T14437] device veth1 entered promiscuous mode [ 594.060409][T14451] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 594.138035][T14451] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock 13:27:15 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 594.193666][T14451] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 13:27:15 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r1 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r1}], 0x1, 0x100) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup2(r0, r1) 13:27:15 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x437, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:27:15 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0557000023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:27:15 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RATTACH(r1, &(0x7f00000000c0)={0xffffff8b}, 0x14) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_DEL_INTERFACE(r1, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x60, r2, 0x20, 0x70bd25, 0x25dfdbfe, {}, [@NL80211_ATTR_IFNAME={0x14, 0x4, 'dummy0\x00'}, @NL80211_ATTR_WDEV={0xc, 0x99, {0xffffff81, 0x3}}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x2, 0x4}}, @NL80211_ATTR_WDEV={0xc, 0x99, {0xca}}, @NL80211_ATTR_IFNAME={0x14, 0x4, 'vlan0\x00'}]}, 0x60}, 0x1, 0x0, 0x0, 0x2000c8c0}, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r3 = socket(0x10, 0x80002, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) [ 594.659036][T14485] EXT4-fs (loop2): bad geometry: block count 1080 exceeds size of device (1 blocks) 13:27:15 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0560000023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:27:16 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x28f, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 594.907212][T14496] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 594.933057][T14496] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 594.954017][T14496] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 595.004314][T14496] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 13:27:16 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") r2 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RATTACH(r2, &(0x7f00000000c0)={0xffffff8b}, 0x14) setsockopt$CAN_RAW_FD_FRAMES(r2, 0x65, 0x5, &(0x7f0000000000)=0x1, 0x4) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140)='nl80211\x00') accept$packet(0xffffffffffffffff, &(0x7f00000028c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002900)=0x14) sendmsg$NL80211_CMD_GET_MESH_CONFIG(r2, &(0x7f00000029c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000002980)={&(0x7f0000002940)={0x3c, r3, 0x100, 0x70bd28, 0x25dfdbfe, {}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x2, 0x3}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r4}, @NL80211_ATTR_WDEV={0xc, 0x99, {0xfff}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x24040000}, 0x40000) setsockopt$XDP_UMEM_REG(r2, 0x11b, 0x4, &(0x7f0000000040)={&(0x7f0000000200)=""/231, 0x1000000, 0x800, 0x2, 0x1}, 0x20) syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 13:27:16 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x400200, 0x0) ioctl$VHOST_SET_OWNER(r0, 0xaf01, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f0000000100)=@req3={0x71, 0x6, 0x401000, 0x9, 0x3, 0x20, 0x100000}, 0x1c) r2 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r2}], 0x1, 0x100) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup2(r1, r2) getsockopt$inet_mreq(r0, 0x0, 0x20, &(0x7f00000000c0)={@multicast1, @empty}, &(0x7f0000000140)=0x8) ioctl$SNDCTL_DSP_SETFRAGMENT(r0, 0xc004500a, &(0x7f0000000080)=0x9) [ 595.344354][T14522] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 595.371446][T14522] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 595.382233][T14522] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 595.405940][T14522] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 13:27:17 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500030023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:27:17 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x438, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:27:17 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) read$FUSE(r1, &(0x7f0000007380), 0x1000) ioctl$KVM_PPC_GET_PVINFO(r1, 0x4080aea1, &(0x7f0000000000)=""/63) pkey_alloc(0x0, 0x4) syz_open_dev$ttys(0xc, 0x2, 0x1) r2 = socket(0xf, 0x80002, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 13:27:17 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x171, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:27:17 executing program 1: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x8ec0, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) 13:27:17 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r1 = socket$packet(0x11, 0x3, 0x300) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x46800) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0x175d900f) write$vhost_msg(r2, &(0x7f00000002c0)={0x1, {&(0x7f0000000100)=""/139, 0x8b, &(0x7f00000001c0)=""/230, 0x2, 0x6}}, 0x48) poll(&(0x7f0000000040)=[{r1}], 0x1, 0x100) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup2(r0, r1) [ 596.996516][T14545] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 597.022787][T14545] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 13:27:18 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="05ac050023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 597.051759][T14545] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 597.085250][T14545] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 597.120758][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 597.126549][ C1] protocol 88fb is buggy, dev hsr_slave_1 13:27:18 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) socket(0x10, 0x80002, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r3, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000300d5800000000000a5000095002b00000000008b79d92bb407f0e0039511d77b25155221e5dd34dc326cb6e258cf7fa69b917e7f7accbe413191c2018f21856fbc69a964817637b7c203002938a128358d6401d7d7db8d4e2cb0cd640fc0ea9b06bb369ef9"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r5 = socket$kcm(0x29, 0x1000000000002, 0x0) write$FUSE_OPEN(r3, &(0x7f0000000200)={0x20}, 0x20) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f000031aff8)={r3, r4}) close(r5) r6 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl(0xffffffffffffffff, 0xf22, &(0x7f0000000000)="080db5055e0bcfe8697071f9d7cd71fc6db700b6e3fb6042e82bab0837aebab9b5de94f27c98e6599a61f7a881412b2e1e23de88c702e67d6db7de74c1fdeb01d47a76b22c3a55d276c284ce4ea2f892117c1d73f53c6cf25d3af65747682cfa03") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) [ 597.326846][T14548] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 597.345128][T14568] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 597.436593][T14548] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 13:27:18 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x500, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 597.518215][T14548] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 597.565249][T14548] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 13:27:18 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x100, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000080)={@empty, 0x101, 0x2, 0x0, 0x5, 0x6, 0x4}, 0x20) ioctl$TCSETX(r4, 0x5433, &(0x7f0000000000)={0x9, 0x73, [0x9, 0x5, 0x5, 0xff, 0x4], 0x7}) r6 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r6, 0x4, 0x46800) write$cgroup_type(r6, &(0x7f0000000200)='threaded\x00', 0x175d900f) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000140)={0xffffffffffffffff}, 0x2, 0x5}}, 0x20) r8 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r8, 0x4, 0x46800) write$cgroup_type(r8, &(0x7f0000000200)='threaded\x00', 0x175d900f) ioctl$TIOCGDEV(r8, 0x80045432, &(0x7f0000000240)) write$RDMA_USER_CM_CMD_DESTROY_ID(r6, &(0x7f0000000200)={0x1, 0x10, 0xfa00, {&(0x7f00000000c0), r7}}, 0x18) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 13:27:18 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r1 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r1}], 0x1, 0x100) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$ax25(r3, &(0x7f0000000100)="e505ad4e3dd23e4a2d541e77929ee98c4c5862f7fd521ef95612d32ca8bd6eedda71771f78724a82f3fc658beed718a1cb340a7ff363c5e1561127fc94ebe632bcab268aa28950867a706ea21d3e8657c5a1690cc054b864e40c160f5d116010252678fb8b94459c60f1552cca4388e377f50f60a3d879809d6faaec139f532c32dfe9dde7393428095ea187207480eeee290587dd6c2e664dcd5ac2fe01a5b219f008ec5f6b3297aebb0581a51bd0a417e38a3b74173554da9fe8cb8431cb679e94cd67c18919d567ffe48bfe8e6dae452fb2e75f0bd745463b218b66c46f30fcfa711b251b2255", 0xe8, 0x0, &(0x7f0000000200)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x8}, [@default, @null, @default, @default, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default]}, 0x48) dup2(r0, r1) 13:27:18 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) socket(0x10, 0x80002, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r3, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000300d5800000000000a5000095002b00000000008b79d92bb407f0e0039511d77b25155221e5dd34dc326cb6e258cf7fa69b917e7f7accbe413191c2018f21856fbc69a964817637b7c203002938a128358d6401d7d7db8d4e2cb0cd640fc0ea9b06bb369ef9"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r5 = socket$kcm(0x29, 0x1000000000002, 0x0) write$FUSE_OPEN(r3, &(0x7f0000000200)={0x20}, 0x20) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f000031aff8)={r3, r4}) close(r5) r6 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl(0xffffffffffffffff, 0xf22, &(0x7f0000000000)="080db5055e0bcfe8697071f9d7cd71fc6db700b6e3fb6042e82bab0837aebab9b5de94f27c98e6599a61f7a881412b2e1e23de88c702e67d6db7de74c1fdeb01d47a76b22c3a55d276c284ce4ea2f892117c1d73f53c6cf25d3af65747682cfa03") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 13:27:18 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="05c4050023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 597.732303][ T26] kauditd_printk_skb: 38431 callbacks suppressed [ 597.732326][ T26] audit: type=1326 audit(1579440438.833:1395738): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14550 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45df9a code=0x50000 [ 597.787289][ T26] audit: type=1326 audit(1579440438.833:1395739): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14550 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=35 compat=0 ip=0x459621 code=0x50000 [ 597.814067][ T26] audit: type=1326 audit(1579440438.833:1395740): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14550 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45df9a code=0x50000 [ 597.837681][ T26] audit: type=1326 audit(1579440438.833:1395741): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14550 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=35 compat=0 ip=0x459621 code=0x50000 [ 597.864364][ T26] audit: type=1326 audit(1579440438.833:1395742): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14550 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45df9a code=0x50000 [ 597.888098][ T26] audit: type=1326 audit(1579440438.833:1395743): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14550 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=35 compat=0 ip=0x459621 code=0x50000 [ 597.911123][ T26] audit: type=1326 audit(1579440438.833:1395744): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14550 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45df9a code=0x50000 [ 597.934564][ T26] audit: type=1326 audit(1579440438.833:1395745): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14550 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=35 compat=0 ip=0x459621 code=0x50000 [ 597.957194][ T26] audit: type=1326 audit(1579440438.833:1395746): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14550 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45df9a code=0x50000 [ 597.979889][ T26] audit: type=1326 audit(1579440438.833:1395747): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14550 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=35 compat=0 ip=0x459621 code=0x50000 [ 598.003432][T14581] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 598.013458][T14581] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 598.023732][T14581] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 598.044401][T14581] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 598.080758][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 598.086650][ C0] protocol 88fb is buggy, dev hsr_slave_1 13:27:19 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RATTACH(r1, &(0x7f00000000c0)={0xffffff8b}, 0x14) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000300)={'veth1\x00', 0x0}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000002700)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_MASTER={0x8, 0xa, r7}]}, 0x28}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'batadv_slave_1\x00', r7}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'veth1_to_team\x00', r8}) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r9 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r9}], 0x1, 0x100) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = dup(r10) r12 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) read$FUSE(r12, &(0x7f0000007380), 0x1000) name_to_handle_at(r12, &(0x7f0000000000)='./file0\x00', &(0x7f0000001500)=ANY=[@ANYBLOB="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"], &(0x7f0000000080), 0x1800) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) dup2(r0, r9) 13:27:19 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x600, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:27:19 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500070023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 598.410759][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 598.416533][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 598.487084][T14605] bridge1: port 1(veth1) entered blocking state [ 598.521099][T14605] bridge1: port 1(veth1) entered disabled state [ 598.551476][T14605] device veth1 entered promiscuous mode [ 598.640746][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 598.646529][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 598.693138][T14611] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 598.730972][T14611] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 598.762127][T14611] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 598.810137][T14611] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 13:27:21 executing program 1: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x8ec0, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r4, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) 13:27:21 executing program 0: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r0 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r0}], 0x1, 0x100) r1 = dup(r0) ioctl$SNDRV_PCM_IOCTL_REWIND(r1, 0x40084146, &(0x7f0000000080)=0x7) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) r4 = openat$cgroup_ro(r3, &(0x7f0000000000)='cgroup.events\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup2(0xffffffffffffffff, r0) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) 13:27:21 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) fcntl$dupfd(r1, 0x0, r2) fsetxattr$security_capability(r2, &(0x7f0000000000)='security.capability\x00', &(0x7f0000000040)=@v2={0x2000000, [{0xffffffff, 0x8}, {0x3, 0x4}]}, 0x14, 0x3) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) r3 = socket(0x10, 0x80002, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 13:27:21 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500090023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:27:21 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x700, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:27:21 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x100, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000080)={@empty, 0x101, 0x2, 0x0, 0x5, 0x6, 0x4}, 0x20) ioctl$TCSETX(r4, 0x5433, &(0x7f0000000000)={0x9, 0x73, [0x9, 0x5, 0x5, 0xff, 0x4], 0x7}) r6 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r6, 0x4, 0x46800) write$cgroup_type(r6, &(0x7f0000000200)='threaded\x00', 0x175d900f) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000140)={0xffffffffffffffff}, 0x2, 0x5}}, 0x20) r8 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r8, 0x4, 0x46800) write$cgroup_type(r8, &(0x7f0000000200)='threaded\x00', 0x175d900f) ioctl$TIOCGDEV(r8, 0x80045432, &(0x7f0000000240)) write$RDMA_USER_CM_CMD_DESTROY_ID(r6, &(0x7f0000000200)={0x1, 0x10, 0xfa00, {&(0x7f00000000c0), r7}}, 0x18) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 13:27:21 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x2, @mcast2, 0x1}}}, &(0x7f0000000200)=0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000240)={0x8b44, 0x800e, 0x3, 0x1c, r2}, &(0x7f0000000280)=0x10) ioctl(r1, 0x6, &(0x7f0000000000)="080db5055e0bcfe8697071") r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x210000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080), 0x2, 0x1}}, 0x20) syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) [ 600.134387][T14637] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 600.155248][T14637] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 600.165194][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 600.165226][ C0] protocol 88fb is buggy, dev hsr_slave_1 13:27:21 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="05000a0023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:27:21 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6(0xa, 0x1, 0x0) fcntl$dupfd(r2, 0x0, r3) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r4, 0x84, 0x76, &(0x7f0000000240)={r6}, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000000)={0x1, 0xffe0, 0x8005, 0x1, 0x3, 0x4, 0x401, 0x8, r6}, &(0x7f0000000040)=0x20) [ 600.201448][T14637] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 600.241150][T14637] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 13:27:21 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x22, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 13:27:21 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = syz_open_dev$tty1(0xc, 0x4, 0x2) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x1b, 0x28, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r2 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r2}], 0x1, 0x100) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup2(r0, r2) 13:27:21 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x900, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 600.720747][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 600.726549][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 601.015954][T14679] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 601.038901][T14679] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 601.066223][T14679] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 601.091619][T14679] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 602.740732][ T26] kauditd_printk_skb: 31387 callbacks suppressed [ 602.740756][ T26] audit: type=1326 audit(1579440443.833:1427134): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14643 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 602.776113][ T26] audit: type=1326 audit(1579440443.863:1427135): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14643 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 602.798932][ T26] audit: type=1326 audit(1579440443.863:1427136): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14643 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 602.821957][ T26] audit: type=1326 audit(1579440443.863:1427137): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14643 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 602.845520][ T26] audit: type=1326 audit(1579440443.863:1427138): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14643 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 602.868562][ T26] audit: type=1326 audit(1579440443.863:1427139): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14643 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 602.891838][ T26] audit: type=1326 audit(1579440443.873:1427140): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14643 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 602.914785][ T26] audit: type=1326 audit(1579440443.873:1427141): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14643 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 602.937885][ T26] audit: type=1326 audit(1579440443.873:1427142): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14643 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 602.961453][ T26] audit: type=1326 audit(1579440443.873:1427143): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14643 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 13:27:24 executing program 3: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x46800) write$cgroup_type(r0, &(0x7f0000000200)='threaded\x00', 0x175d900f) recvmsg$can_j1939(r0, &(0x7f0000001800)={&(0x7f0000000000)=@hci, 0x80, &(0x7f00000016c0)=[{&(0x7f0000000200)=""/171, 0xab}, {&(0x7f00000002c0)=""/155, 0x9b}, {&(0x7f0000000380)=""/207, 0xcf}, {&(0x7f0000000480)=""/4096, 0x1000}, {&(0x7f0000001480)=""/203, 0xcb}, {&(0x7f0000000080)=""/110, 0x6e}, {&(0x7f0000000140)=""/70, 0x46}, {&(0x7f0000001580)=""/157, 0x9d}, {&(0x7f0000001640)=""/103, 0x67}], 0x9, &(0x7f0000001780)=""/86, 0x56}, 0x20) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r1) syz_open_dev$ttys(0xc, 0x2, 0x1) r2 = socket(0x10, 0x80002, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 13:27:24 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="05000e0023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:27:24 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x700, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:27:24 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r1 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r1}], 0x1, 0x100) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000000)='/dev/capi20\x00', 0x208001, 0x0) r6 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) read$FUSE(r6, &(0x7f0000007380), 0x1000) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r6, 0x6, 0x23, &(0x7f0000000080)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000100)=0x10) dup2(r2, r5) 13:27:24 executing program 1: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x8ec0, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r4, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) 13:27:24 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xa00, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:27:24 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500110023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 603.360765][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 603.366675][ C1] protocol 88fb is buggy, dev hsr_slave_1 13:27:24 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x22, 0x800, 0x0) sendmsg$IPSET_CMD_DEL(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x70, 0xa, 0x6, 0x101, 0x0, 0x0, {0xa, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_DATA={0x44, 0x7, 0x0, 0x1, [@IPSET_ATTR_SKBQUEUE={0x6, 0x1d, 0x1, 0x0, 0x9}, @IPSET_ATTR_PROTO={0x5, 0x7, 0x1}, @IPSET_ATTR_IFACE={0x14, 0x17, 'bond0\x00'}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x5}, @IPSET_ATTR_SKBMARK={0xc, 0x1b, 0x1, 0x0, 0x1}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x80}]}]}, 0x70}, 0x1, 0x0, 0x0, 0x20000810}, 0x19) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r1, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x2, 0x7, 0x3, 0x0, 0x0, {0x7, 0x0, 0x2}, [@NFACCT_FILTER={0xc, 0x7, 0x0, 0x1, [@NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x3}]}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x2}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x38}, 0x1, 0x0, 0x0, 0x4}, 0x40814) r2 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) read$FUSE(r2, &(0x7f0000007380), 0x1000) accept4$x25(r2, &(0x7f00000002c0)={0x9, @remote}, &(0x7f0000000300)=0x12, 0x80800) syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) [ 603.407406][T14713] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 603.476314][T14713] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 603.486589][T14713] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 603.545199][T14705] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 603.561117][T14713] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 603.570071][T14705] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 603.614763][T14705] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock 13:27:24 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500210023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:27:24 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r1 = socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) recvmmsg(r2, &(0x7f0000000440), 0x6f5, 0x2000000022, &(0x7f0000000480)={0x77359400}) sendmsg$key(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=ANY=[@ANYBLOB="020500000200000000000000000000006622e85f3d07e1fb8abc9e557817db65bc28dce194bb4cabd6f87a264c66c0c37e2b34fbb2401107900b4e1e0e2d275caa821047c7dd3da4cee9ca55679f8f4a81d48e234cd70533a73166f8b988897bde2f29bf00fcff0000000000"], 0x10}}, 0x0) r3 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x4000) poll(&(0x7f0000000040)=[{r3}], 0x1, 0x100) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) dup2(r0, r1) [ 603.719393][T14705] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 13:27:25 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xc00, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:27:25 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = syz_open_dev$tty1(0xc, 0x4, 0x2) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x1b, 0x28, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r2 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r2}], 0x1, 0x100) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup2(r0, r2) 13:27:25 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$VIDIOC_TRY_EXT_CTRLS(r4, 0xc0205649, &(0x7f0000000340)={0xfffffff, 0x7, 0x51b, 0xffffffffffffffff, 0x0, &(0x7f00000002c0)={0x990af5, 0xd19, [], @p_u32=&(0x7f0000000280)=0xd631}}) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r6, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)={0x28, r7, 0x535, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x14, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}]}]}, 0x28}}, 0x0) sendmsg$TIPC_NL_LINK_SET(r5, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000004c0)={&(0x7f00000003c0)={0x100, r7, 0x300, 0x70bd28, 0x25dfdbfd, {}, [@TIPC_NLA_NODE={0x20, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9f7}]}, @TIPC_NLA_BEARER={0xcc, 0x1, [@TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7d76}]}, @TIPC_NLA_BEARER_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x5cee}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @empty}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x3f, @empty, 0x9f4}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0xb6f, @local, 0x4}}, {0x14, 0x2, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x37}}}}}]}]}, 0x100}, 0x1, 0x0, 0x0, 0x4000}, 0x40000) r8 = socket$inet6(0xa, 0x1, 0x0) r9 = fcntl$dupfd(r1, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) r10 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r9, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40080080}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r10, 0x200, 0x70bd27, 0x25dfdbfb, {{}, {}, {0x8, 0x11, 0x6}}, ["", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x5}, 0x80) r11 = socket(0x10, 0x80002, 0x0) ioctl(r11, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r12 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RATTACH(r12, &(0x7f00000000c0)={0xffffff8b}, 0x14) ioctl$VIDIOC_S_FBUF(r12, 0x4030560b, &(0x7f0000000180)={0x16, 0x6, &(0x7f0000000200)="a4a1989551ae408b958fb28401fe38ade96341e0546a6004f2504f7f2f699eb4e9ec08ad2df3797276b41f381fe5ded70fb66dfae04552a292673b4e33f281161238be7c56b58d9b563fcadf7b135525bfd358626405f9baf7d728f477fd17bf2785ae54ca5536a1b2e2e063aebff8c9851abade0283ec7b9507638c", {0x5, 0x8, 0x3436324d, 0x9, 0x9, 0xffffffc0, 0xa, 0x8}}) 13:27:25 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500570023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:27:25 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) setsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000080)=0xb5b, 0x2) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RATTACH(r1, &(0x7f00000000c0)={0xffffff8b}, 0x14) ioctl$sock_rose_SIOCDELRT(r1, 0x890c, &(0x7f0000000000)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x44e8, @null, @netrom={'nr', 0x0}, 0x4, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @null, @default, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) r2 = socket(0x10, 0x80002, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) [ 604.318236][T14754] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 604.328049][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 604.328087][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 604.362730][T14754] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 604.383846][T14754] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 604.404853][T14754] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 13:27:25 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x1004, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 604.640741][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 604.646529][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 604.796366][T14775] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 604.861910][T14775] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 604.893053][T14775] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 604.924176][T14775] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 13:27:27 executing program 1: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x8ec0, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r4, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) 13:27:27 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500600023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:27:27 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 13:27:27 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001", 0x1d, 0x400}], 0x4801, 0x0) 13:27:27 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r1 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r1}], 0x1, 0x100) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$binfmt_elf64(r0, &(0x7f0000000400)={{0x7f, 0x45, 0x4c, 0x46, 0x20, 0x8, 0x0, 0x99, 0x2, 0x3, 0x3, 0x4, 0x9c, 0x40, 0x30b, 0x5, 0x0, 0x38, 0x1, 0x5, 0x0, 0x3}, [{0x70000000, 0xffffffff, 0xffff, 0x5, 0xffff, 0x4, 0x6, 0x31bc}], "34fdd4fcfe520c29c2a28b16324ae3bb7ea0087493853f3b7cd302ae3ff168326a71587ad44c226a5e848b669f1b45091197ae3f0d7c8d494081aeca3ce1054e681a26f57a60d4b020f755eba5b5d1ad48e335175cc2f2140981ea9468fe5ce1c3e6995c9c7881aee663cdd44efba0b5597fc600ec8949b8560dd779acc9aa45f42f4af49bae5cf0cc99f0c22343a2547c9f078d4cf1baeda5f4118ec53fae91e65a9c411916faec811bd2fdbcf3acfe7061d21afc8efd402f89cc1e2d338db009280f404cf9794aa8d4ea04c623648c8629b99f61345fd1ab4fd7c26d7c0f", [[], [], []]}, 0x457) dup2(r0, r1) 13:27:27 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x1020, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:27:27 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) r2 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RATTACH(r2, &(0x7f00000000c0)={0xffffff8b}, 0x14) ioctl$VIDIOC_DQBUF(r2, 0xc0585611, &(0x7f0000000000)={0x3, 0x6, 0x4, 0x100, 0x0, {0x0, 0x7530}, {0x4, 0x0, 0x1, 0x7, 0x1, 0xa8, "b2ea378c"}, 0xc90, 0x2, @userptr=0x3, 0x5}) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) [ 606.400772][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 606.406586][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 606.429003][T14810] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 13:27:27 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="05b07d0023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 606.548045][T14800] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 13:27:27 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) read$FUSE(r1, &(0x7f0000007380), 0x1000) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000100)={{0x0, 0x3, 0x1000, 0x1, 0x2}, 0xfff, 0x3}) r2 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r2}], 0x1, 0x100) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup2(r0, r2) [ 606.588302][T14800] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 13:27:27 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) socket(0x10, 0x80002, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RATTACH(r2, &(0x7f00000000c0)={0xffffff8b}, 0x14) ioctl$VIDIOC_STREAMOFF(r2, 0x40045613, &(0x7f0000000000)=0x4) r3 = socket$inet6(0xa, 0x1, 0x0) fcntl$dupfd(r1, 0x0, r3) ioctl(r1, 0x9, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x8, 0x0, 0x0) r4 = creat(&(0x7f0000000300)='./file0\x00', 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x81) write$P9_RATTACH(r4, &(0x7f00000000c0)={0xffffff8b}, 0x14) bind$tipc(r4, &(0x7f0000000040)=@name={0x1e, 0x2, 0x1, {{0x0, 0x1}}}, 0x10) [ 606.647874][T14800] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 606.741981][T14800] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 13:27:28 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:27:28 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x9, 0x8000, 0x6}, 0x1c) socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in=@empty, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@local}}, &(0x7f0000000280)=0xe8) syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000040)='./file0\x00', 0x1, 0x2, &(0x7f0000000140)=[{&(0x7f0000000080)="21b2de38c220", 0x6, 0x2}, {&(0x7f0000000100)="72842d31ddbc", 0x6, 0x100}], 0x800000, &(0x7f0000000340)=ANY=[@ANYBLOB="757365725f78617474722c6661756c745f696e6a656334696f6e3d3078303030303030303030303030303030332c6e6f757365725f78617474722c6e6f757365725f78617474722c666f776e65723d87f9", @ANYRESDEC=r2, @ANYBLOB=',\x00']) r3 = socket$inet6(0xa, 0x1, 0x0) fcntl$dupfd(r1, 0x0, r3) poll(&(0x7f0000000000), 0x0, 0x8900) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) [ 607.229317][T14844] erofs: (device loop0): erofs_read_superblock: cannot find valid erofs superblock [ 607.455157][T14852] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 607.487679][T14852] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 607.521225][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 607.527026][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 607.538159][T14852] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 607.590433][T14852] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 607.753819][ T26] kauditd_printk_skb: 28143 callbacks suppressed [ 607.753840][ T26] audit: type=1326 audit(1579440448.843:1455288): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14801 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45df9a code=0x50000 [ 607.782718][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 607.782743][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 607.798143][ T26] audit: type=1326 audit(1579440448.853:1455289): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14801 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=35 compat=0 ip=0x459621 code=0x50000 [ 607.820913][ T26] audit: type=1326 audit(1579440448.853:1455290): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14801 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45df9a code=0x50000 [ 607.844627][ T26] audit: type=1326 audit(1579440448.853:1455291): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14801 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=35 compat=0 ip=0x459621 code=0x50000 [ 607.867108][ T26] audit: type=1326 audit(1579440448.853:1455292): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14801 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45df9a code=0x50000 [ 607.889799][ T26] audit: type=1326 audit(1579440448.853:1455293): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14801 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=35 compat=0 ip=0x459621 code=0x50000 [ 607.912578][ T26] audit: type=1326 audit(1579440448.853:1455294): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14801 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45df9a code=0x50000 [ 607.935136][ T26] audit: type=1326 audit(1579440448.853:1455295): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14801 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=35 compat=0 ip=0x459621 code=0x50000 [ 607.958296][ T26] audit: type=1326 audit(1579440448.853:1455296): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14801 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45df9a code=0x50000 [ 607.980891][ T26] audit: type=1326 audit(1579440448.853:1455297): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14801 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=35 compat=0 ip=0x459621 code=0x50000 [ 608.111949][T14844] erofs: (device loop0): erofs_read_superblock: cannot find valid erofs superblock 13:27:30 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000080)={0x7ff, 0x7, 0x4, 0x4000, 0xf93, {r1, r2/1000+10000}, {0x5, 0x2, 0x8, 0x3f, 0xf7, 0x8, "d996e134"}, 0x83, 0x4, @offset, 0x4, 0x0, 0xffffffffffffffff}) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r4) ioctl$LOOP_CTL_ADD(r3, 0x4c80, r4) close(r0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket$inet6(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$DRM_IOCTL_AUTH_MAGIC(r7, 0x40046411, &(0x7f0000000000)=0x7) syz_open_dev$ttys(0xc, 0x2, 0x1) r8 = socket(0x10, 0x80002, 0x0) ioctl(r8, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") ioctl$sock_x25_SIOCADDRT(r8, 0x890b, &(0x7f0000000200)={@remote={[], 0x0}, 0xe, 'veth0\x00'}) syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 13:27:30 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0505ac0023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:27:30 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x7, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:27:30 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2010, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:27:30 executing program 1: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x8ec0, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r4, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) 13:27:30 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) signalfd(r0, &(0x7f0000000000)={[0x2]}, 0x8) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r1 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r1}], 0x1, 0x100) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup2(r0, r1) 13:27:30 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="057db00023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 609.579139][T14878] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 609.600823][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 609.606607][ C1] protocol 88fb is buggy, dev hsr_slave_1 13:27:30 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0xee00, r3, 0x0) getresuid(&(0x7f0000000140), &(0x7f0000000180)=0x0, &(0x7f0000000200)) r5 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x46800) write$cgroup_type(r5, &(0x7f0000000200)='threaded\x00', 0x175d900f) getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f0000000240)={{{@in6=@mcast2, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000340)=0xe8) newfstatat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x1000) r8 = getgid() r9 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r9, 0x4, 0x46800) write$cgroup_type(r9, &(0x7f0000000200)='threaded\x00', 0x175d900f) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r9, 0x40505412, &(0x7f0000000680)={0x1, 0x7fff, 0x1, 0x0, 0x12}) r10 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r11 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RATTACH(r11, &(0x7f00000000c0)={0xffffff8b}, 0x14) getpeername$tipc(r11, &(0x7f0000000600)=@id, &(0x7f0000000640)=0x10) fcntl$setstatus(r10, 0x4, 0x46800) write$cgroup_type(r10, &(0x7f0000000200)='threaded\x00', 0x175d900f) statx(r10, &(0x7f0000000440)='./file0\x00', 0x2000, 0x10, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000580)={{}, {0x1, 0x1}, [{0x2, 0x4, r2}, {0x2, 0x2, r3}, {0x2, 0x6, 0xffffffffffffffff}, {0x2, 0x0, r4}, {0x2, 0x4, r6}, {0x2, 0x3, r7}], {0x4, 0x5}, [{0x8, 0x4, r8}, {0x8, 0x3, r12}, {0x8, 0x2, 0xffffffffffffffff}], {0x10, 0x5}, {0x20, 0x1}}, 0x6c, 0x3) [ 609.665267][T14878] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 13:27:30 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0505c40023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 609.709192][T14878] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 609.728975][T14878] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 609.740518][T14890] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 609.819218][T14890] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 609.853207][T14890] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 609.874000][T14890] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 13:27:31 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500020023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:27:31 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2300, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:27:31 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500030023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:27:31 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x9, 0x8000, 0x6}, 0x1c) socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in=@empty, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@local}}, &(0x7f0000000280)=0xe8) syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000040)='./file0\x00', 0x1, 0x2, &(0x7f0000000140)=[{&(0x7f0000000080)="21b2de38c220", 0x6, 0x2}, {&(0x7f0000000100)="72842d31ddbc", 0x6, 0x100}], 0x800000, &(0x7f0000000340)=ANY=[@ANYBLOB="757365725f78617474722c6661756c745f696e6a656334696f6e3d3078303030303030303030303030303030332c6e6f757365725f78617474722c6e6f757365725f78617474722c666f776e65723d87f9", @ANYRESDEC=r2, @ANYBLOB=',\x00']) r3 = socket$inet6(0xa, 0x1, 0x0) fcntl$dupfd(r1, 0x0, r3) poll(&(0x7f0000000000), 0x0, 0x8900) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 13:27:31 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, &(0x7f0000000140)=0x7, 0x4) poll(&(0x7f0000000040)=[{r1}], 0x1, 0x100) r2 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) read$FUSE(r2, &(0x7f0000007380), 0x1000) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(r5, 0xc0305615, &(0x7f0000000080)={0x0, {0x2, 0x8}}) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r2, 0x800c6613, &(0x7f0000000000)=@v1={0x0, @aes128, 0x8, "60bbab7edc37a09b"}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = socket$inet6(0xa, 0x1, 0x0) r9 = fcntl$dupfd(r7, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$VT_RESIZE(r9, 0x5609, &(0x7f0000000100)={0x8, 0x0, 0x100}) r10 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$SG_SCSI_RESET(r10, 0x2284, 0x0) r11 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) read$FUSE(r11, &(0x7f0000007380), 0x1000) r12 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RATTACH(r12, &(0x7f00000000c0)={0xffffff8b}, 0x14) r13 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) read$FUSE(r13, &(0x7f0000007380), 0x1000) r14 = socket$caif_seqpacket(0x25, 0x5, 0x3) dup2(r12, r14) 13:27:31 executing program 1: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x8ec0, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r4, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) 13:27:31 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) gettid() r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r2, 0x4010ae68, &(0x7f00000000c0)={0x0, 0x10000}) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000008000)={0x2, {{0x2, 0x0, @multicast1}}}, 0x90) setsockopt$inet_MCAST_JOIN_GROUP(r3, 0x0, 0x2a, 0x0, 0x0) getsockopt$inet_buf(r3, 0x0, 0x0, &(0x7f0000008000)=""/144, &(0x7f0000012ffc)=0x90) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000000)='IPVS\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) fchdir(r4) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket$inet6(0xa, 0x1, 0x0) fcntl$dupfd(r5, 0x0, r6) close(r5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, 0x0) r7 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_INFO(r7, 0x81204101, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 13:27:31 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500040023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 610.447175][T14939] erofs: (device loop2): erofs_read_superblock: cannot find valid erofs superblock [ 610.560833][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 610.566667][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 610.631785][T14934] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 610.714395][T14934] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 610.804787][T14934] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock 13:27:31 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500070023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 610.869817][T14934] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 13:27:32 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r1 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r1}], 0x1, 0x100) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = dup(r5) write$vhci(r6, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0xf4) r7 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) dup2(r0, 0xffffffffffffffff) 13:27:32 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) r1 = syz_open_dev$ttys(0xc, 0x2, 0x1) fcntl$setstatus(r1, 0x4, 0x2000) r2 = socket(0x10, 0x80002, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RATTACH(r6, &(0x7f00000000c0)={0xffffff8b}, 0x14) r7 = socket$inet6(0xa, 0x1, 0x0) r8 = fcntl$dupfd(0xffffffffffffffff, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) r10 = socket$inet6(0xa, 0x1, 0x0) r11 = fcntl$dupfd(r9, 0x0, r10) r12 = socket$inet6_tcp(0xa, 0x1, 0x0) r13 = socket$inet6(0xa, 0x1, 0x0) r14 = fcntl$dupfd(r12, 0x0, r13) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) ioctl$KDDELIO(r14, 0x4b35, 0x8000) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) syz_kvm_setup_cpu$x86(r11, r8, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x8, 0x0, 0x0) 13:27:32 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500090023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:27:32 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2d00, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:27:32 executing program 1: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x8ec0, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r4, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) 13:27:32 executing program 2: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x8ec0, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r3, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) 13:27:32 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x200000, 0x0) delete_module(&(0x7f0000000040)='/dev/loop-control\x00', 0x0) close(r1) r2 = socket(0x10, 0x80002, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 13:27:32 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="05000a0023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:27:32 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r1 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r1}], 0x1, 0x100) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x2000, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r5, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8}]}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r5, 0x20, 0x70bd2b, 0x25dfdbfc, {}, [@NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x7}, @NL80211_ATTR_USER_REG_HINT_TYPE={0x8}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x1}]}, 0x30}}, 0x4000000) ioctl$SNDCTL_DSP_NONBLOCK(r3, 0x500e, 0x0) r6 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) dup2(r0, r1) 13:27:32 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x101002, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) [ 611.680742][ C1] net_ratelimit: 4 callbacks suppressed [ 611.680769][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 611.692186][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 611.697688][T14989] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 611.728423][T14989] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 611.771011][T14989] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock 13:27:32 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="05000e0023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 611.814708][T14989] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 13:27:33 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500110023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:27:33 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) socket(0x10, 0x80002, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f00000000c0)=0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000280)={{{@in=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000200)=0xe8) r6 = creat(0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f0000000740)={{{@in6=@loopback, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@local}}, 0x0) r8 = getgid() r9 = getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000b80)=ANY=[@ANYBLOB="02000000010001000000000002000400", @ANYRES32=r5, @ANYBLOB="02000400", @ANYRES32, @ANYBLOB="02005bbc", @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32, @ANYBLOB="02000000", @ANYRES32, @ANYBLOB="02000100", @ANYRES32, @ANYBLOB="02000700", @ANYRES32=r7, @ANYBLOB="040002000000000008000500", @ANYRES32, @ANYBLOB="08000200", @ANYRES32=r8, @ANYBLOB="08000500", @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="080003", @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r9, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r10, @ANYBLOB="10000100c6d5cc003cc7e4ab927b000000002000040000000000"], 0x20, 0x0) fchown(r3, r4, r9) ioctl(0xffffffffffffffff, 0x6, &(0x7f0000000000)="00421ee0818527") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r11 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) read$FUSE(r11, &(0x7f0000007380), 0x1000) shutdown(0xffffffffffffffff, 0x0) getsockopt$inet_tcp_int(r11, 0x6, 0x10, &(0x7f0000000040), &(0x7f0000000080)=0x4) 13:27:33 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x3704, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:27:33 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r1 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r1}], 0x1, 0x100) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup2(r0, r1) 13:27:33 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500210023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:27:33 executing program 1: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x8ec0, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r4, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3, 0x0) [ 612.535733][T15043] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 612.568364][T15043] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 612.609483][T15043] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 612.641231][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 612.647000][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 612.679494][T15043] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 612.764844][ T26] kauditd_printk_skb: 22656 callbacks suppressed [ 612.764875][ T26] audit: type=1326 audit(1579440453.853:1477942): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14993 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 612.804273][ T26] audit: type=1326 audit(1579440453.863:1477954): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14993 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 612.827483][ T26] audit: type=1326 audit(1579440453.863:1477955): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14993 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 612.850274][ T26] audit: type=1326 audit(1579440453.863:1477956): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14993 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 612.873060][ T26] audit: type=1326 audit(1579440453.863:1477957): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14993 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 612.896009][ T26] audit: type=1326 audit(1579440453.863:1477958): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14993 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 612.919299][ T26] audit: type=1326 audit(1579440453.863:1477959): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14993 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 612.950770][ T26] audit: type=1326 audit(1579440453.863:1477960): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14993 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 612.974363][ T26] audit: type=1326 audit(1579440453.863:1477961): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14993 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 612.996957][ T26] audit: type=1326 audit(1579440453.863:1477962): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14993 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 13:27:35 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500570023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:27:35 executing program 2 (fault-call:2 fault-nth:0): syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:27:35 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x3804, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:27:35 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r1 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r1}], 0x1, 0x100) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RATTACH(r4, &(0x7f00000000c0)={0xffffff8b}, 0x14) r5 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) read$FUSE(r5, &(0x7f0000007380), 0x1000) ioctl$VIDIOC_PREPARE_BUF(r4, 0xc058565d, &(0x7f0000000100)={0x2, 0x9, 0x4, 0x800, 0x5, {}, {0x1, 0x2, 0x1f, 0x5, 0x4, 0x5, "f8db7b31"}, 0x2, 0x3, @fd=r5, 0x401, 0x0, 0xffffffffffffffff}) ioctl$EVIOCGMTSLOTS(r6, 0x8040450a, &(0x7f0000000640)=""/280) dup2(r0, r1) ioctl$RTC_PLL_GET(r3, 0x80207011, &(0x7f0000000000)) 13:27:35 executing program 1: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x8ec0, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r4, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3, 0x0) 13:27:35 executing program 3: close(0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) syz_open_procfs(r0, &(0x7f0000000100)='net/rfcomm\x00') r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001300)='/proc/self/net/pfkey\x00', 0x181c80, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r1, 0x0, &(0x7f0000000140)=[{&(0x7f0000000200)=""/4096, 0x1000}, {&(0x7f0000001200)=""/220, 0xdc}], 0x2) syz_open_dev$ttys(0xc, 0x2, 0x1) r2 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) read$FUSE(r2, &(0x7f0000007380), 0x1000) ioctl$VHOST_SET_VRING_KICK(r2, 0x4008af20, &(0x7f0000000180)={0x2}) r3 = socket(0x10, 0x80002, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 13:27:35 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500600023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:27:35 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) ioctl$KVM_S390_UCAS_MAP(r1, 0x4018ae50, &(0x7f0000000040)={0x6dc, 0x9, 0x20}) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r2 = socket(0x10, 0x80002, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) [ 614.706306][T15085] FAULT_INJECTION: forcing a failure. [ 614.706306][T15085] name failslab, interval 1, probability 0, space 0, times 0 [ 614.720742][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 614.726495][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 614.792379][T15089] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 614.794008][T15085] CPU: 1 PID: 15085 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 614.803197][T15089] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 614.811800][T15085] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 614.811858][T15085] Call Trace: [ 614.811883][T15085] dump_stack+0x11d/0x181 [ 614.811906][T15085] should_fail.cold+0xa/0x1a [ 614.811934][T15085] __should_failslab+0xee/0x130 [ 614.832737][T15089] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 614.835015][T15085] should_failslab+0x9/0x14 [ 614.835035][T15085] __kmalloc+0x53/0x690 [ 614.835074][T15085] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 614.868659][T15089] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 614.873351][T15085] ? fput_many+0xec/0x130 [ 614.873375][T15085] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 614.873393][T15085] ? strnlen_user+0x1a8/0x220 [ 614.873419][T15085] ? __x64_sys_memfd_create+0xdb/0x370 [ 614.903049][T15085] __x64_sys_memfd_create+0xdb/0x370 [ 614.908357][T15085] do_syscall_64+0xcc/0x3a0 [ 614.913000][T15085] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 614.918985][T15085] RIP: 0033:0x45b159 [ 614.922891][T15085] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 13:27:36 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x3f00, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 614.942525][T15085] RSP: 002b:00007f95c11a7a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 614.950947][T15085] RAX: ffffffffffffffda RBX: 00007f95c11a86d4 RCX: 000000000045b159 [ 614.961965][T15085] RDX: 0000000020010288 RSI: 0000000000000000 RDI: 00000000004c01f8 [ 614.970011][T15085] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 0000000000000001 [ 614.977989][T15085] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 614.985952][T15085] R13: 0000000000000b72 R14: 00000000004cc2b6 R15: 0000000000000000 13:27:36 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x220800, 0x0) close(r0) r1 = syz_open_dev$ttys(0xc, 0x2, 0x1) fstat(r1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r2) socket(0x10, 0x80002, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f00000002c0)) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="080db10d5f953451e9d888") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$inet6(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$VIDIOC_ENUM_DV_TIMINGS(r6, 0xc0945662, &(0x7f0000000140)={0x80000000, 0x0, [], {0x0, @reserved}}) 13:27:36 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000323002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:27:36 executing program 2 (fault-call:2 fault-nth:1): syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:27:36 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r1 = creat(&(0x7f00000005c0)='./bus\x00', 0x1c) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000002800)=0x1, 0x4) r2 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r2}], 0x1, 0x1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) r5 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) read$FUSE(r5, &(0x7f0000007380), 0x1000) r6 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000080)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r5, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x820}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, r6, 0x400, 0x70bd25, 0x25dfdbfc, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x20040000}, 0x80) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup2(r0, r2) [ 615.204044][T15104] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 615.264193][T15104] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 615.283361][T15118] FAULT_INJECTION: forcing a failure. [ 615.283361][T15118] name failslab, interval 1, probability 0, space 0, times 0 [ 615.319788][T15118] CPU: 0 PID: 15118 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 615.328496][T15118] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 615.338582][T15118] Call Trace: [ 615.341888][T15118] dump_stack+0x11d/0x181 [ 615.342801][T15104] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 615.346368][T15118] should_fail.cold+0xa/0x1a [ 615.346396][T15118] __should_failslab+0xee/0x130 [ 615.365485][T15118] should_failslab+0x9/0x14 [ 615.370003][T15118] kmem_cache_alloc+0x29/0x5d0 [ 615.374879][T15118] ? _kstrtoull+0xfc/0x130 [ 615.379311][T15118] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 615.385035][T15118] ? shmem_destroy_inode+0x70/0x70 [ 615.390236][T15118] shmem_alloc_inode+0x31/0x60 [ 615.395014][T15118] alloc_inode+0x48/0x130 [ 615.399359][T15118] new_inode_pseudo+0x35/0xe0 [ 615.404057][T15118] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 615.410310][T15118] new_inode+0x28/0x50 [ 615.414386][T15118] shmem_get_inode+0x85/0x490 [ 615.419080][T15118] ? _raw_spin_unlock+0x4b/0x60 [ 615.424175][T15118] __shmem_file_setup.part.0+0x6f/0x1f0 [ 615.429919][T15118] shmem_file_setup+0x7b/0xa0 [ 615.434607][T15118] __x64_sys_memfd_create+0x20d/0x370 [ 615.439999][T15118] do_syscall_64+0xcc/0x3a0 [ 615.444530][T15118] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 615.450620][T15118] RIP: 0033:0x45b159 [ 615.454523][T15118] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 615.474184][T15118] RSP: 002b:00007f95c11a7a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 615.482690][T15118] RAX: ffffffffffffffda RBX: 00007f95c11a86d4 RCX: 000000000045b159 [ 615.490705][T15118] RDX: 0000000020010288 RSI: 0000000000000000 RDI: 00000000004c01f8 [ 615.498689][T15118] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 0000000000000001 [ 615.506661][T15118] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 13:27:36 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500ac0523002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:27:36 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x46800) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0x175d900f) flistxattr(r2, &(0x7f0000000000)=""/95, 0x5f) syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) [ 615.514654][T15118] R13: 0000000000000b72 R14: 00000000004cc2b6 R15: 0000000000000001 [ 615.559798][T15104] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 13:27:36 executing program 1: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x8ec0, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r4, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3, 0x0) 13:27:36 executing program 2 (fault-call:2 fault-nth:2): syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:27:36 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500c40523002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:27:36 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x4000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:27:36 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/bsg\x00', 0x88040, 0x0) ioctl$sock_bt_bnep_BNEPCONNDEL(r2, 0x400442c9, &(0x7f0000000140)={0x7d07ecef, @broadcast}) ioctl(r1, 0x2, &(0x7f0000000080)="15e2e43dcf32809f03397dad2c02c8a934691497bf") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000000), &(0x7f0000000040)=0x4) 13:27:37 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r1 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r1}], 0x1, 0x100) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) read$FUSE(r4, &(0x7f0000007380), 0x1000) preadv(r4, &(0x7f0000000300)=[{&(0x7f0000000100)=""/197, 0xc5}, {&(0x7f0000000200)=""/73, 0x49}, {&(0x7f0000000400)=""/4096, 0x1000}, {}, {&(0x7f0000001400)=""/4096, 0x1000}, {&(0x7f0000002400)=""/4096, 0x1000}, {&(0x7f0000000280)=""/90, 0x5a}, {&(0x7f0000003400)=""/4096, 0x1000}, {&(0x7f0000004400)=""/224, 0xe0}], 0x9, 0x4) dup2(r0, r1) [ 615.894374][T15148] FAULT_INJECTION: forcing a failure. [ 615.894374][T15148] name failslab, interval 1, probability 0, space 0, times 0 [ 615.914620][T15148] CPU: 1 PID: 15148 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 615.923348][T15148] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 615.933496][T15148] Call Trace: [ 615.936807][T15148] dump_stack+0x11d/0x181 [ 615.941170][T15148] should_fail.cold+0xa/0x1a [ 615.946298][T15148] __should_failslab+0xee/0x130 [ 615.951189][T15148] should_failslab+0x9/0x14 [ 615.955697][T15148] kmem_cache_alloc+0x29/0x5d0 [ 615.960450][T15148] ? __write_once_size+0x5a/0xe0 [ 615.965383][T15148] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 615.971635][T15148] ? debug_smp_processor_id+0x43/0x137 [ 615.977204][T15148] __d_alloc+0x52/0x4b0 [ 615.981443][T15148] ? __const_udelay+0x36/0x40 [ 615.986130][T15148] ? __udelay+0x10/0x20 [ 615.990270][T15148] d_alloc_pseudo+0x27/0x70 [ 615.994758][T15148] alloc_file_pseudo+0x96/0x1b0 [ 615.999674][T15148] __shmem_file_setup.part.0+0xd4/0x1f0 [ 616.005228][T15148] shmem_file_setup+0x7b/0xa0 [ 616.009960][T15148] __x64_sys_memfd_create+0x20d/0x370 [ 616.015373][T15148] do_syscall_64+0xcc/0x3a0 [ 616.019883][T15148] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 616.025878][T15148] RIP: 0033:0x45b159 [ 616.029798][T15148] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 616.049453][T15148] RSP: 002b:00007f95c11a7a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 616.058307][T15148] RAX: ffffffffffffffda RBX: 00007f95c11a86d4 RCX: 000000000045b159 [ 616.066609][T15148] RDX: 0000000020010288 RSI: 0000000000000000 RDI: 00000000004c01f8 [ 616.075665][T15148] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 0000000000000001 [ 616.084581][T15148] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 616.093006][T15148] R13: 0000000000000b72 R14: 00000000004cc2b6 R15: 0000000000000002 13:27:37 executing program 2 (fault-call:2 fault-nth:3): syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:27:37 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000723002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 616.364158][T15170] FAULT_INJECTION: forcing a failure. [ 616.364158][T15170] name failslab, interval 1, probability 0, space 0, times 0 [ 616.407980][T15163] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 616.418666][T15170] CPU: 0 PID: 15170 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 616.425993][T15163] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 616.427360][T15170] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 616.427366][T15170] Call Trace: [ 616.427489][T15170] dump_stack+0x11d/0x181 [ 616.427522][T15170] should_fail.cold+0xa/0x1a [ 616.459822][T15170] __should_failslab+0xee/0x130 [ 616.464821][T15170] should_failslab+0x9/0x14 [ 616.469371][T15170] kmem_cache_alloc+0x29/0x5d0 [ 616.472160][T15163] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 616.474237][T15170] ? memcg_kmem_put_cache+0x7c/0xc0 [ 616.474264][T15170] ? kmem_cache_alloc+0x1f3/0x5d0 [ 616.494184][T15170] __alloc_file+0x4d/0x210 [ 616.498616][T15170] alloc_empty_file+0x8f/0x180 [ 616.503379][T15170] alloc_file+0x4e/0x2b0 [ 616.507651][T15170] ? _raw_spin_unlock+0x4b/0x60 [ 616.512508][T15170] alloc_file_pseudo+0x11c/0x1b0 [ 616.517507][T15170] __shmem_file_setup.part.0+0xd4/0x1f0 [ 616.523061][T15170] shmem_file_setup+0x7b/0xa0 [ 616.528099][T15170] __x64_sys_memfd_create+0x20d/0x370 [ 616.533501][T15170] do_syscall_64+0xcc/0x3a0 [ 616.538061][T15170] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 616.543957][T15170] RIP: 0033:0x45b159 [ 616.547865][T15170] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 616.567498][T15170] RSP: 002b:00007f95c11a7a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 616.575917][T15170] RAX: ffffffffffffffda RBX: 00007f95c11a86d4 RCX: 000000000045b159 [ 616.583914][T15170] RDX: 0000000020010288 RSI: 0000000000000000 RDI: 00000000004c01f8 [ 616.591967][T15170] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 0000000000000001 [ 616.599949][T15170] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 13:27:37 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = syz_open_dev$vcsu(&(0x7f0000000040)='/dev/vcsu#\x00', 0x8, 0x311000) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r1, 0x40045542, &(0x7f0000000080)=0x6) r2 = socket(0x10, 0x80002, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RATTACH(r6, &(0x7f00000000c0)={0xffffff8b}, 0x14) ioctl$SCSI_IOCTL_DOORLOCK(r5, 0x5380) r7 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RATTACH(r7, &(0x7f00000000c0)={0xffffff8b}, 0x14) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r7, 0x40405514, &(0x7f0000000000)={0x5, 0x3, 0x1fe0000, 0x80000001, '\x00', 0x3f}) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 13:27:37 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) fcntl$dupfd(r1, 0x0, r2) close(r2) syz_open_dev$ttys(0xc, 0x2, 0x0) r3 = socket(0x3, 0x0, 0x6) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000000)) syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) [ 616.607944][T15163] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 616.616787][T15170] R13: 0000000000000b72 R14: 00000000004cc2b6 R15: 0000000000000003 13:27:37 executing program 1: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x8ec0, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r4, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3, &(0x7f0000000080)={0x0, 0x0}) 13:27:37 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000923002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:27:37 executing program 2 (fault-call:2 fault-nth:4): syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:27:37 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x4800, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:27:38 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0xa0b0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1000, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x10000, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) sendto$inet(r2, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x53) r3 = socket$packet(0x11, 0x3, 0x300) r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x860401, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000200)={0x0, 0xf9, "d2155193d7bb790d0504d9158be8dcfd5d6228f3b2e8f3a160b10871f2b8197accceb90f1c6903bf47a4a12c5299f0758197fc431aee34526db76c2f4bda33d3390c254f0703dcbc3665274c03e4511d1133806d259923046d114518141008ea488cfc43abd41cb0b685de8361311c24553e1c2f9161087184d37b91f5dc509325c44092401d7d54c305c6dc8dc0855598cd75aab9fd3d5085151fc9f42c525fbe4c07be20e0c4026c758c2247e012019f87ebb7b3725aaeee4a5c479110220448d189d7fce1ebd5c6df4f70349c65a9b949f92cf6143b9b9def5fe27b31ab1f0795263001f854b20a75805ba63ea57ebe5bc97fb700e96e47"}, &(0x7f0000000340)=0x101) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r5 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r5}], 0x1, 0x100) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) write$char_usb(r7, &(0x7f0000000140)="8b05e1936643da6a74169524883e4ce1aa7ebc41056c2e40271f0667f8abde0b4a062dd4fb983f3cf082274872b91b4e84ff99c20f53eba0ae9038e94ec7354f6d24ad05be81f22e", 0x48) dup2(r3, r5) 13:27:38 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$VIDIOC_G_PARM(r4, 0xc0cc5615, &(0x7f0000000200)={0xc, @output={0x1000, 0x0, {0x401, 0xfffffffd}, 0x7fffffff, 0x44}}) syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ftruncate(r0, 0x1) 13:27:38 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000a23002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:27:38 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r4, 0xc4c85513, &(0x7f0000000200)={{0x5, 0x2, 0x5, 0x6, 'syz0\x00', 0x1}, 0x0, [0x4, 0x100, 0x1, 0x7f, 0x8000, 0x80000001, 0xfffffffffffffff8, 0x9, 0x2, 0x8, 0x400, 0x0, 0xf2, 0x6, 0x9, 0x5, 0x7, 0x1f, 0x100000000, 0x0, 0x8, 0x80000001, 0x3, 0x5, 0x5, 0x4, 0x7fffffff, 0x1, 0x1, 0x2b2, 0x8000, 0x200, 0x19, 0xacd8, 0x81, 0x1, 0x101, 0x3, 0x3ff, 0x4, 0x0, 0x6, 0x200, 0xf2, 0x7515, 0x3, 0x1, 0x9, 0x0, 0x4, 0x4, 0x7, 0x5, 0xc5, 0x100000001, 0x2, 0x8, 0x80000001, 0xd8, 0x3, 0xc6e, 0x4, 0x9, 0x200, 0x0, 0x8, 0xa6b, 0x3, 0xff, 0x8001, 0x4, 0x7fffffff, 0xdc, 0x1, 0x5, 0x6, 0x100000001, 0x7, 0x4, 0x1, 0x6, 0x6, 0x6, 0x1, 0x6, 0x0, 0x6, 0x3, 0x5, 0x0, 0x8, 0x9, 0x2, 0x4, 0x4, 0x7ff, 0x2, 0xb0, 0xd82, 0x2ac8d043, 0xe000000000, 0x61a, 0x8ee2, 0x0, 0x80000001, 0x100000001, 0x1f, 0x2, 0x9a, 0x9, 0x5, 0x1de6, 0x97, 0x5605, 0x6, 0x3, 0xffffffff, 0x573, 0x8, 0x0, 0x1, 0x9, 0x8, 0x9, 0x7, 0x9, 0x7, 0xffffffffffffff01]}) syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) [ 617.143874][T15211] FAULT_INJECTION: forcing a failure. [ 617.143874][T15211] name failslab, interval 1, probability 0, space 0, times 0 [ 617.177452][T15211] CPU: 0 PID: 15211 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 617.186250][T15211] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 617.196439][T15211] Call Trace: [ 617.199743][T15211] dump_stack+0x11d/0x181 [ 617.205174][T15211] should_fail.cold+0xa/0x1a [ 617.209809][T15211] __should_failslab+0xee/0x130 [ 617.214687][T15211] should_failslab+0x9/0x14 [ 617.221547][T15211] kmem_cache_alloc+0x29/0x5d0 [ 617.226490][T15211] ? kmem_cache_alloc+0x1f3/0x5d0 [ 617.231524][T15211] ? memcg_kmem_put_cache+0x7c/0xc0 [ 617.236767][T15211] security_file_alloc+0x48/0x110 [ 617.241797][T15211] __alloc_file+0xa3/0x210 [ 617.246219][T15211] alloc_empty_file+0x8f/0x180 [ 617.250993][T15211] alloc_file+0x4e/0x2b0 [ 617.255250][T15211] ? _raw_spin_unlock+0x4b/0x60 [ 617.260111][T15211] alloc_file_pseudo+0x11c/0x1b0 [ 617.265049][T15211] __shmem_file_setup.part.0+0xd4/0x1f0 [ 617.270582][T15211] shmem_file_setup+0x7b/0xa0 [ 617.275332][T15211] __x64_sys_memfd_create+0x20d/0x370 [ 617.280794][T15211] do_syscall_64+0xcc/0x3a0 [ 617.285288][T15211] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 617.291180][T15211] RIP: 0033:0x45b159 [ 617.295061][T15211] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 617.314653][T15211] RSP: 002b:00007f95c11a7a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 617.323051][T15211] RAX: ffffffffffffffda RBX: 00007f95c11a86d4 RCX: 000000000045b159 [ 617.331025][T15211] RDX: 0000000020010288 RSI: 0000000000000000 RDI: 00000000004c01f8 [ 617.338988][T15211] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 0000000000000001 [ 617.347035][T15211] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 617.354989][T15211] R13: 0000000000000b72 R14: 00000000004cc2b6 R15: 0000000000000004 13:27:38 executing program 2 (fault-call:2 fault-nth:5): syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 617.456729][T15225] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 617.500872][T15225] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 617.524366][T15232] FAULT_INJECTION: forcing a failure. [ 617.524366][T15232] name failslab, interval 1, probability 0, space 0, times 0 [ 617.535188][T15225] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 617.537081][T15232] CPU: 0 PID: 15232 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 617.555332][T15232] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 617.565478][T15232] Call Trace: [ 617.568786][T15232] dump_stack+0x11d/0x181 [ 617.573141][T15232] should_fail.cold+0xa/0x1a [ 617.577746][T15232] __should_failslab+0xee/0x130 [ 617.582647][T15232] should_failslab+0x9/0x14 [ 617.587166][T15232] __kmalloc+0x53/0x690 [ 617.591343][T15232] ? tomoyo_realpath_from_path+0x83/0x4c0 13:27:38 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000e23002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 617.597086][T15232] tomoyo_realpath_from_path+0x83/0x4c0 [ 617.602826][T15232] ? tomoyo_get_mode.part.0+0x5c/0xb0 [ 617.604822][T15225] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 617.609168][T15232] tomoyo_path_perm+0x15d/0x390 [ 617.609204][T15232] tomoyo_path_truncate+0x26/0x40 [ 617.609286][T15232] security_path_truncate+0x9b/0xd0 [ 617.609303][T15232] do_sys_ftruncate+0x27d/0x340 [ 617.609320][T15232] __x64_sys_ftruncate+0x3f/0x50 [ 617.609339][T15232] do_syscall_64+0xcc/0x3a0 [ 617.609360][T15232] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 617.609371][T15232] RIP: 0033:0x45b127 [ 617.609429][T15232] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 617.609437][T15232] RSP: 002b:00007f95c11a7a68 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 617.609452][T15232] RAX: ffffffffffffffda RBX: 00007f95c11a86d4 RCX: 000000000045b127 13:27:38 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(0xffffffffffffffff, 0x4010aeab, &(0x7f0000000000)={0x800, 0x10000}) [ 617.609462][T15232] RDX: 0000000020010288 RSI: 0000000008100000 RDI: 0000000000000004 [ 617.609473][T15232] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 0000000000000001 [ 617.609484][T15232] R10: 0000000000000000 R11: 0000000000000217 R12: 0000000000000003 [ 617.609497][T15232] R13: 0000000000000b72 R14: 00000000004cc2b6 R15: 0000000000000005 [ 617.611009][T15232] ERROR: Out of memory at tomoyo_realpath_from_path. 13:27:38 executing program 1: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x8ec0, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r4, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3, &(0x7f0000000080)={0x0, 0x0}) 13:27:39 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500001123002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 617.920777][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 617.926553][ C1] protocol 88fb is buggy, dev hsr_slave_1 13:27:39 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x4801, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:27:39 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) [ 618.150645][T15232] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 13:27:39 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x940, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") pipe(&(0x7f0000000040)={0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, &(0x7f0000000080)=r5) syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) [ 618.330868][T15232] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 13:27:39 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0xfffffffe, 0x9}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r1}], 0x1, 0x100) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup2(r0, r1) 13:27:39 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500002123002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 618.444626][T15232] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 618.471569][T15232] EXT4-fs: failed to create workqueue 13:27:39 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r1 = shmat(0xffffffffffffffff, &(0x7f0000ff6000/0x1000)=nil, 0x3000) shmdt(r1) close(r0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) write$P9_RATTACH(r2, &(0x7f00000000c0)={0xffffff8b}, 0x14) r3 = eventfd(0xfffff801) r4 = dup(r0) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000080)={r3, 0x4, 0x5, r4}) r5 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_POLL(r5, &(0x7f0000000040)={0x18, 0x0, 0x6, {0xffff}}, 0x18) syz_open_dev$ttys(0xc, 0x2, 0x1) r6 = socket(0x10, 0x80002, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = socket$inet6(0xa, 0x1, 0x0) r10 = fcntl$dupfd(r8, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) fcntl$getownex(r10, 0x10, &(0x7f0000000240)={0x0, 0x0}) r12 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) read$FUSE(r12, &(0x7f0000007380), 0x1000) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) sendmsg$nl_netfilter(r7, &(0x7f00000007c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x180}, 0xc, &(0x7f0000000780)={&(0x7f0000000300)={0x468, 0x13, 0xa, 0x201, 0x70bd2d, 0x25dfdbff, {0x0, 0x0, 0x8}, [@typed={0x8, 0x54, 0x0, 0x0, @fd=r3}, @nested={0x236, 0x16, 0x0, 0x1, [@typed={0xc4, 0x9, 0x0, 0x0, @binary="e7a28f3661721ec070e0e2f206ea84c2e74b7761a24cdade1c7101e03cc6af90fa29ec2b5266348703b5388f3ee31a94cf5ec0f8b4055cb319820f1ad1914a6236075233e33c7aedbe26e3d26558c843870b939a789b08850092bd5b2b2ab74fbb732790ec7b1d84d69f7242fdb4ccbad65a089859b78d9c7d2ea43d65e6c533b02c84cb711a3666276083e8c6304438cb3f13e10d20e33575c5ffaad067374144b0a6a52554463370c1dbc2dacb5705ad080ae293f0b6a1dfbaa4419d44fa69"}, @generic="c2adbae76560a9bccf9aa1c38986a2699bb6ec19818c2c3f6d5fee6c1b6c1bb25b6ca9db2fca5134edd838b69cd21620a4a8df8b7abce408ebb4a1748dd641251039f10496165748eaf55811a032a9732fa1104d780635dcc9f977c3bd5f4215d8df33610c7901", @generic="d713a7ba7075953f6a96d44a3dde5201b671103166cd6c1f6cbb36ece2d24d74646d09008b9024802e75ba3f2970e2182b356ca69d2f529282dc0aaeb6aa7a7c5510fee62c7b266164d8cd0035", @generic="3be599e327d2209d09bea051f2a8bd6a4f43b76665cd0c1dfb8da5fea621fb6fbbc58ee4436db4f93bf9f819dce31643d1d73edfb938ee8d1098300cc152420c2b53bdcb3ae04b9a543205daf70e08af89f5ad5d1ccd60a74b20e1d44b70bd62401bcbf3933308bc28313904559f4436b8fa13c8c44d6084fc93d90daa0990bc1f40c013cdc6bf3a1262a20f9eb17aa8ab76a6eecdc0af24a3abd1dd6a6ef99a879790a9d2fdef74f0ca0baf51bf937b0a0225cbeac045b4cbfd"]}, @generic="b3f474a4e01def6f53f44cee331a82ac1b265cb7650bd36016eb58cb54ac933517f4a36b72a95095601167c129ad33c964a3970ff3780e6e0384bd4774663b75a6423c514d60022a179d680ce34fb27519fcdd4ee88485392018d971e33d0bf471a1779ba2dfbacb44df600a576f65837a4f5f07804cf3b58cf95523439332d1b6f9682a5ad7bdc52d82db2ec08e0c186733eb1683c77dc8c9f9706ac0bd42b9db0dc01e7753338707cf09", @typed={0x8, 0x52, 0x0, 0x0, @pid=r11}, @nested={0xdb, 0x6a, 0x0, 0x1, [@generic="08ad672d1b07f121947cd0bf67c6ba1742599702022f86b58242d0f00063e81cf620eae335186c72f8cfaf0700c2c98bad444e5c35ade5834a237df187d43a60f4c4500a634621325237992073dcdceea4eeffdb3bb25ef2ecdd631a91b0a82e0f3d2053cc4ec19d644ba2372a7893c731ee24daf9031db4e3f182bb2655a41798e631c15ff52dc23f4588b8649b45925f8ed5f4facab892d2ee25991c9f8b826795b813aa00ac4485d688c920bc46c06cc26e", @typed={0x14, 0x96, 0x0, 0x0, @ipv6=@remote}, @typed={0x8, 0x89, 0x0, 0x0, @uid=r13}, @typed={0x8, 0x95, 0x0, 0x0, @uid=0xffffffffffffffff}]}, @typed={0xc, 0x84, 0x0, 0x0, @u64=0x6}, @typed={0x78, 0x8d, 0x0, 0x0, @binary="a6bebf868cc62aa5d59eb729b74c6f258d1fa0144cac3c50fa9e953be660ed0f5e772a1877c7f6997f544f306701623f384d4f50c761bd852f16442af973063b3b9533e2342c803dce850922e37f6d1fe9320b17e36ed9be1fb7dc0c474c3f6de1982bfad1bd2a21b208ac649fa509bbe3a6a9ac"}, @generic]}, 0x468}, 0x1, 0x0, 0x0, 0x4000}, 0x30000080) ioctl(r6, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) [ 618.538162][T15271] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 618.570775][T15232] EXT4-fs (loop2): mount failed [ 618.590756][T15271] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 618.612769][T15271] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 618.634609][T15271] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 13:27:39 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x4c00, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:27:39 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:27:39 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500005723002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:27:39 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet6_tcp_int(r4, 0x6, 0x10, &(0x7f0000000000)=0x8, 0x4) 13:27:40 executing program 1: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x8ec0, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r4, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3, &(0x7f0000000080)={0x0, 0x0}) [ 618.880755][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 618.886572][ C0] protocol 88fb is buggy, dev hsr_slave_1 13:27:40 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500006023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:27:40 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") r2 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) read$FUSE(r2, &(0x7f0000007380), 0x1000) r3 = dup2(r0, r0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) [ 619.081976][T15299] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 13:27:40 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0xaba, 0x200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x10000) syz_kvm_setup_cpu$x86(r5, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, 0x0, 0xcd, 0x16, 0x0, 0xf) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x324080, 0x0) r7 = socket$inet6_sctp(0xa, 0x1, 0x84) r8 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r8, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r7, 0x84, 0x76, &(0x7f0000000240)={r9}, 0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r5, 0x84, 0x71, &(0x7f00000000c0)={r9, 0xfffffff7}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r6, 0x84, 0x22, &(0x7f0000000180)={0x7, 0x200, 0x3, 0x3, r10}, &(0x7f0000000200)=0x10) 13:27:40 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500b07d23002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 619.236427][T15299] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 13:27:40 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r1 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r1}], 0x1, 0x100) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockname$llc(r3, &(0x7f0000000000)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000080)=0x10) dup2(r0, r1) 13:27:40 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x200001, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") [ 619.369733][T15299] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock 13:27:40 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="050005ac23002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 619.449519][T15314] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 619.480765][T15314] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 619.503942][T15299] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 619.541688][T15314] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 619.574452][T15314] EXT4-fs (loop2): corrupt root inode, run e2fsck [ 619.595712][T15314] EXT4-fs (loop2): mount failed 13:27:40 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x6000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:27:40 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46800) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x581000, 0x0) read$char_usb(r2, &(0x7f00000002c0)=""/236, 0xec) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000140)=0x0) syz_open_procfs(r3, &(0x7f0000000180)='attr/exec\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000001600)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x1c, r5, 0x401}, 0x1c}}, 0x0) link(&(0x7f0000000240)='./bus\x00', 0x0) sendmsg$TIPC_CMD_SET_LINK_TOL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, r5, 0x200, 0x70bd26, 0x25dfdbfc, {{}, {}, {0x1c, 0x18, {0x80000000, @bearer=@l2={'eth', 0x3a, 'veth1_virt_wifi\x00'}}}}, ["", ""]}, 0x38}, 0x1, 0x0, 0x0, 0x20000000}, 0x200000d0) syz_open_dev$ttys(0xc, 0x2, 0x1) r6 = socket(0x10, 0x80002, 0x0) ioctl(r6, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 13:27:40 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="05007db023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:27:40 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:27:41 executing program 1: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x8ec0, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r4, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) 13:27:41 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="050005c423002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 619.973000][T15369] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 620.030832][T15369] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 13:27:41 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000223002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 620.086256][T15376] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 620.096778][T15376] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 620.107124][T15376] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 620.117370][T15369] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock 13:27:41 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r1 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r1}], 0x1, 0x100) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) r3 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RATTACH(r3, &(0x7f00000000c0)={0xffffff8b}, 0x14) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0xabb60000000000) dup2(r0, r1) [ 620.155297][T15376] EXT4-fs (loop2): corrupt root inode, run e2fsck [ 620.170693][T15376] EXT4-fs (loop2): mount failed 13:27:41 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) r1 = syz_open_dev$ttys(0xc, 0x2, 0x1) r2 = socket(0xf, 0x80002, 0x9) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0xe) [ 620.284173][T15369] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 620.349202][T15376] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 620.360444][T15376] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 13:27:41 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) r1 = syz_open_dev$ttys(0xc, 0x2, 0x1) r2 = socket(0x10, 0x80002, 0x0) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f0000000000)) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 13:27:41 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x6800, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 620.437548][T15376] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 620.466871][T15376] EXT4-fs: failed to create workqueue 13:27:41 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000323002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 620.486030][T15376] EXT4-fs (loop2): mount failed 13:27:41 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x3, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:27:41 executing program 3: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x202, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x2, 0x8) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6(0xa, 0x1, 0x0) fcntl$dupfd(r2, 0x0, r3) syncfs(r3) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8), &(0x7f000095dffc)=0x4) r4 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46800) write$cgroup_type(r4, &(0x7f0000000200)='threaded\x00', 0x175d900f) ioctl$VIDIOC_TRY_EXT_CTRLS(r4, 0xc0205649, &(0x7f0000000400)={0xfffffff, 0x2e7, 0x83a, 0xffffffffffffffff, 0x0, &(0x7f00000003c0)={0x9909e2, 0x8001, [], @p_u16=&(0x7f0000000380)=0x3}}) ioctl$KVM_SET_MSRS(r5, 0x4008ae89, &(0x7f0000000440)={0x1, 0x0, [{0x185}]}) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000340)={0x4132, 0x1, 0x1000, &(0x7f0000000640)="2e7c3666514238f4279cf1528e50668c52b0b12a475fada4a743d3740c7f921bdaa02d5fa76f501265c32ec1b739169845712fac03aabc002b3517c556a94cfaafa99d63ba3edede41bf4b21ba28bbd8c3a4c3a6471ff056cb386dcfa2655c60a9b37ac2ef007f56c6f588b29f565c35285a919d7c8ebb7a458f4b91f8d9d3fd1721687a71d1168036fed6ae4bbf2d496207f2e1c268309fa7a44fb2155d5072b6429646ca049103e70f59f6d1e47f4b8812040dc367620b5c6a1ef0aa7a15f65d78161e927e4ef8e6ba7656c6f778faeed88e4ae5ecf7841b1926a80de17e25fc9f28985a440120779dbf87b142a2e43676a8d403cf0af0908b48ade25faf17de78ae3bdc3b8d0e617f095d702e88d69f075d019f252d9c2225f648e552fc38f6177f32d00142329f248ce12748625cf8c1a7d159a5cb1449d4aac62e37abb3dac4e316eb1ad2bc515112ef6b24060d926babb15375e1a89d3eacf1148ff92d455b57f9361f5e5d7fc3bb7878429ef21cf1156e26eaa5b9a784fa85cba3396e455b83d922d74ed3ab2f9f19dbd53954352aa2eb78d9b95acf8fe3c6a80163d4eae34479e05f5852576f0a02828723e914d06da2718a4619640267a043fca995a63ab36dc586aa1ca136ae5bacfc92cd413e551e42bd6af5dbb66f35a5e9e74d9774792f2e2738a8cde4bd6d7825523b6e4cce5ea19f9c929dc491e720f30ffb4beb9eb4e5318960ea4ea207476f96ae33ff178b3681893af9be1ac6a9610f7383716c4ee4bc2951bb059d6d86dd7d89a0ba170b3583d4be1ad05c139dc45b0c2ba3841da7b6cb31ab5ff4426829042b0cbb3fb7a2add2f39874e9661b2968358ac9d2fdf48b6908458e903a427b1c4cddf7869e59e4c405a15338c7f80b5d78924a50bddd76fc0a7dd646b2bee23b7edf75078684dfd87908c3f5f6c228cfe8fdd38e5c2a57b7fa191bb09def63d92678ad8a8b99d0b5248ac43fac68dfe7cd9d8e925da2f0e10d0eedb506f6a031d1ef38d82ffb8000efacedc7a6347ffaa9efaab8c7ef583ea1f4b164baf5d23349558a553c975ec7df4d1d97d3cbc997087e0592996332a284a2f6ba62cba03f980e50f8621c473ce6ca083f4d815d66f4264a1ea909857a6ff56f15e0be225bfe4c11bb523adb41446ae1adaa4e04027929c953714f36a44b5cd9570d553fa99282d47788edb2a65bbdf30dd6a11841e2a3bbf71cf32fbc3372a1d25a95a400073ce8cb712221288c2d3bd6768d3eb313635c2956a09c16632a2d34600f5a67553a3a1ba962a98a46df279d75e96a951642c38bf3a1569b2acb1ab3601ac9366254a985e1d20bff5538c50cc52de8901f82d0a7c0abf72e35e7453db8ef07d204beb2fdb84747aa8992097381a92f0e772d7211fa074a53ac1f4c06a37b6ed42fd4929531a0a8b30d30d8780dbc59a71d2d9903369bf0b01e4e57201a5beeb2acd8eba70324aa4b07860996fe5e7536e5d3c1bebee8c664de1c7864eb49142aa7327c696166747b552664a5bbcaa570f372c641ea7a72840f29274f25cfa04071c6f827f411ebc9410fedc07800653af57d21885cb9771290aa60fb554638c775e2ba462d9d7c6ab5f28d687cbba4188479a936af2e4c73e491cba85d530ac854ce7a685eda745b31348640d1246b6792f8bf58c3602edb36a6d469069fed96a1d1827a2da0734a339eb481ce8a83fec02b27a6796d3c1445e3c9004e4049356d16086e00a46ffdcf881f0d36c34c80644f0f70da2f4452275fd9bb3163e5aeedec34f995d9dfc35c6f1442c8cc4b57d20262eebf8858a3cc28e1766870967f1fcbb7259d0751143be38e0489f942bc503b6b4949f406b85af53b0f8d9e9047261eabf1b93ee9b611cbe41f996b43be1a52eb4358baa51670078b1e9b8dfdefc57dc802d8484152d12dc1fb1aee67a9be7658928b27b46f6b37ca508c183ffe48457683a5a3f65edd99e9ad7db2ac2ceebf016350b217ec5f25086d279e17a3649635fc718b6f91ddc53e75f7625684f21d21ecb7947fc0b70a8c939610cdfee9667047467507899829b3ab0b1ee0d0395dc99e6e5d5ca6bdd5700f17728a8b3aa8f698c99b95c84280ba408d8df35c99ca3f5f0f9dbbd227fdbd7f1d902aa2bb9f6ab9d284ba8a324ffd4ea59cf8fbf1b077289aec74098f7723745d9102adac7b8744c1cb88addb9235a6a35101b501f07277d0943587fc812146f390cb477a03382390919e8f4a6368bcb8bcac0774992fa6f8049295d55dd1889b07407392ace71ce4016db246488098daf4341a1c5f81fe9ec9f960a0284ddc5609a11381aa1d5cb63572bbf674cec8af024f25d20903346c6c08d57b56fed5f791dd545f6a2862cac52d6d12c3cac337cd0e0a152ad71f76e40f7ebb0515644498a2c74aea4516fea35ec0d0a4cb0494fc4bc37b0befcc01bd889734f82408f143e655b3f4a3f63cebc712994a3eedcbbc8a0e04e4dfa5c6160e79590d2917939855472a14329e3984f8ec07ad3e8fa489f7bd9b7bf72e19005ff03106b803ed923299cd732ba5c90e36a8a843f9f2fee08fc3d8d32201b1fddfcd90a59284e6ec866fcb0a5f731c3f9105101b8f57093f1130968a731353d5e4c6ef241f9a1f9d6b9af4a993c580d8c8ee05e9a09a54e65f1276f59ba7a53ca43adb28bee809707454e5d3841e05f0dd34442f2cd7d599c5f14eecf36750bdedccb132835b663f4975437efbbd72552219a15f7597403b50f7a64bae811c6fdb9d749de2665034bcd488de2db068b836e0ac7d003052ab41603ea37dd03db212c9f89af5581dd4fb9408f18f9470f71c65311da6a2ba9e70d414b458f4a953d72637a1b7668be25fefa43ae0503036a7ec3f97822079ea1c48654c00ea33b944aff79341d4a07187e1230bc33da3208af81ae4b1c421cd636cf796129a0226b5f37e19531064896cca6bce6bec9d47c6214e4ae51f12da491f3a0b696e11d712b803cd9bace834e1cccf014346970d601615ec72c43618995c4b6bd12db2f5e25766285efe2b57930b8efd3a5c722de980cc11ce61390a267644584b55b23b77d9b665751f67a1e040f4861084f9ef4c383019ee3c181247be0e7324f4c205ebf87773e7109f80aee3a38e6893828a2222e6f436bc5a854fd9330adccb796119d708f959563af4bfc30b5cff3406b06e093dc663a45a6df9cd9e0c25fb0078cd97bb2ff29d3397f2d03f3d1622bad7c1e9e90264ef3399ed751a7c59573540b562f155fbc7b81bb26732aa62ff8d91791454c398d6d1eb3402ed13d8c4fb2cb8bff13feda307082316609a8d4e85c9384e3ebd061fccef9871ae4a743202acc11f2e786279b7682274336da9a3f209c41a66415c3f36e0f17c47c72f5c47f7fe911dceef605769b267cf77109a3ce89d8b9b5f1b5ddfbb1a6cdeb1ffeb5a52fb7a265e96b54ebf79f180a3cc6794444188f545bd7f5e78d277ca689a6459ddb53c5d4fb30ed983ad3b68a138a5cc8af3f1e2180d3cf7fe9324d83f360dcf27c4fe4aa4dc3f2dced935acb729e2bc57955d0634d02fef00e50daffec44ff1f47d1f3bc122c9e3a4e23d4b99ca985123926ef631c732d9838f991beebe339295743587cc68b524f06d7653472cc20f6b2061dff2854e73fa7cf00aaf7aa0b2a05b72af491bb6aacc803df47ca848bc1791eadc97e1a84178dc37cbb88f36a25cef6feff52392012bdf3dab8f9ba568aa9801b7b199db64d4b087c03457dd5c37b9bbada816fdb1bdc215880a05d37dd2ef1875cf92112ebad6a9fee21113c0f1dc1ca4ee707fe64b85863a4a9d9c33207449c40b7ea88f98deb4fcea12dd3fa7fc445591f1a6b44045a2780eae3171b9f4ca28cf14e92673dff8a73acfeb9aaee15a1a411638938a0a2122129ba93bb9a7900f1906154954451e8df80cdc1e34314cc37c5438d0d040da94c082bd3f3d2cad382afd3adc2a62f1b0708d8c9e3c1c09e1de4166b388663327838141beb5b85a2abd89c23a73c9a1803013a6232842295b3949c04232bd874d09e3815021a9983912ee7523a4991e4a1a77a8c189ae4d1ace35154034481b75e2db4a0d6346d97154e5572befa0f9b905e6d0e51d0d8a56b37852f7173be3312333e56ed64b0e7e467ee7e9e6c0af2860cf01ff3691e0586372991951d136448b3096dcf9401ad9ab0d3c6f7fbc34d1af7ca048f43fa3c126853611b10c1121a68d04e603c16386b2d02787a5bd8c6aa86af528704a119818306b53d8daaf6fb8d50bd4383a7db9359ef5f4aef6e8d322fef5fb3633cdefa6ce54d5c345c5c25a60a1205fbc269180fcb3b1a3480b422e25dc9bf47989fdec38d7bd8966cb92e9155a17912efe21ee1b386446ad3f725d91506882b303ff07fcb69113a97658a912cffdb985495e2b6839c028406d861159d575ce41e4595bdcd11a06e2e5b715b3c9cc53f7a57ee1010e98cfcd640933156ee08299cda5d90909479965f441e5c7f63c057eed7cdc01ec4c73074692acc4e586c948fb5899fc29b36924b42bd0a88c1891206d78390bb412f6899cefd3c2d3f3cc693010fd3d0f684fbc68c46c54e54ae1f5f6545a02ea0bc138cc457884ea3ba0be6f0b9caf82e54abb45976f7be8c71889c0e12a295e262981d89180cb96fdb154de6c2ab485417a34313371bf31156f80f8d96e4e5decb37742b0d4379f491da412b78227b0f3f645c019f16097958fbfa25912d55f4a9d820d0562d5b009f9ec48403727afc36e68cf520d06cc0a0f13c21c051d460bd632376e658530042e0549c6b26439090103d52e08cf9812a27c790e5795b9fc7cf7935645a15106e95cd884c047b596ff02f5e88a75d42398ddc48a2e9c437d103ae624548cea1f7f2ed926c59c441f09fb554f762e15062f62820e460f20ce4d876ecfa3796915c7df3a3cad4e4be85b11fe7ecb1dd03739a6db84f65469ff0948756dab3d3902586b4caacdacf90146a46af0795ef2c087ae3db58a839968a5fae4a567707b1e58f8e12353c443aff860c564c217a78f3dcb2e8a79662404feae05e0b01208265512421f5fa4600ff8c599e93dd91ea30a802ac488aaaf56b082b06984e68907e0a157ba897d2938254cf1c5da6da9e84376a67dde2d1b5db9573cf2510302023ddd0269ea59f20a509cf491cf07a590c05596c9c26515dc510c460453e56a8c8c2b7a66472e52436248897d6c9fb9e334e87ec7a0f9acfb443f745379dbdd56d69bdccb87e52e572686938f362489a4a5c88c058eff5c6d5f778166a84ba3e34714bcddeb182926b0333f83826c46bd0d6d5e1b3dbce71ab5bf1b329439fe52d1064cb58e009b0365fd8a5b35a1793f8145e828abb9f96c098c3717b45ee4bc098307d7b2b437028d5a26b54ef3890d3fc6701a2e08d7393894509926960a74f86ddc2cc889cf74c066737235955de91c4c679d2149af2148c50b116d2814be627a8cc6740b90f911f61a1fe46caea190a08282e4e8a452bafede7290706b5a3d22e2d032646e9591eb8badb18319728336b771b74846a682934cc8c86f50c334d20d19f173590c2212263764ea7af94c2f858c3ba779efc56f4dec521ca8b2cf7c28b5ee4fbc1a641392825946e5ed6a99b8e1e8cdf0048a5df5f9156728b8a9ee8f3f6ac8085e7035a58a35415e455fc1231473a415a61d43898525d4732f19e6f21e63f253e71daba7a6a7685c962f95917b51d17dab3e4b21dee720c1f86e5b6baec5f0d903685edcae45c965131f8c924de7d2828589fc2ac9"}) r6 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000180)='/dev/nullb0\x00', 0x20c401, 0x0) read$FUSE(r6, &(0x7f0000007380), 0x1000) r7 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RATTACH(r7, &(0x7f00000000c0)={0xffffff8b}, 0x14) signalfd(r7, &(0x7f0000000140), 0x8) ioctl$VT_OPENQRY(r6, 0x5600, &(0x7f0000000040)) close(r0) setsockopt$inet6_int(r7, 0x29, 0x38, &(0x7f00000001c0)=0x6, 0x4) r8 = syz_open_dev$ttys(0xc, 0x2, 0x1) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000080), 0x4) socket(0x10, 0x80002, 0x0) ioctl(r8, 0x6, &(0x7f0000000200)="00f01c0a8457eb00df44429c53a3516e631f79d9f72752cd6341e0437d573688bf4d7a1771173e74131b66c28ea60c2d3326b1b33f53697e4757fde6afd868d771bb4eaa3d5ad3ef47f1718a937428a78a8fd6f9a59df16378f14bdbd46882885778020012eab70059a19297e31e2fd442df473dbd955ab5db17c69d81153fffc9fe725131d0bbce05909e1e5aa630f0bbf1de3b4e61436c12b4561b34a0652a5a9ecbcaa8157e7310f36d0de5e20b00414deb6a25c54f4b06874f8749408458950a4a5f71") r9 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RATTACH(r9, &(0x7f00000000c0)={0xffffff8b}, 0x14) fcntl$setlease(r9, 0x400, 0x3) 13:27:41 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000423002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:27:41 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r1 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r1}], 0x1, 0x100) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup2(r0, r1) r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xaa00, 0x40) setsockopt$packet_buf(r4, 0x107, 0x16, &(0x7f0000000100)="939b5c7cc1776cadfd1a9cd0292c47c25b94e54780d9f1f3ee39a968540255b6837dd33b08834e5720f860336bbec0b5767b2a0ddbee02cdc03d5e8380356e4c1a11cc73bfa8dc11271918bedd0304fa1e54eda35c07574a2b2e2e378e73cf05c44aa66b3a859cf920f8d2ae1243ca195da38c9e1843796930982843e121c631877a2a5b18496947ca3077ad19183990459f5b95754ff6c87de06bb6660f0bd3a1b066dc2c3ee9ef79bcdc82fb3c652ca9c1f801084c753c59e522621784ea2c98d81fe811496a09361d541c240f1a20f6987df9a3", 0xd5) [ 620.998351][T15427] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 621.038607][T15437] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 621.063433][T15437] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 621.065445][T15427] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 13:27:42 executing program 1: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x8ec0, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r4, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) 13:27:42 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000723002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 621.091809][T15427] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 621.108967][T15437] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 621.120973][T15427] EXT4-fs (loop2): corrupt root inode, run e2fsck [ 621.163188][T15427] EXT4-fs (loop2): mount failed 13:27:42 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RATTACH(r4, &(0x7f00000000c0)={0xffffff8b}, 0x14) sendfile(r3, r4, &(0x7f0000000000)=0x1000, 0x40) r5 = socket(0x10, 0x80002, 0x0) ioctl(r5, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) [ 621.223890][T15437] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 621.280777][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 621.286824][ C1] protocol 88fb is buggy, dev hsr_slave_1 13:27:42 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000923002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:27:42 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x4, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:27:42 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x6c00, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:27:42 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x46800) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0x175d900f) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000000)=0x10, 0x4) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 13:27:42 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r1 = socket$packet(0x11, 0x3, 0x300) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x46800) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0x175d900f) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000300)={'veth1\x00', 0x0}) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r9}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000002700)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_MASTER={0x8, 0xa, r9}]}, 0x28}}, 0x0) sendmsg$NL80211_CMD_GET_STATION(r2, &(0x7f0000000340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000100)={0x1e0, r3, 0x10, 0x70bd26, 0x25dfdbff, {}, [@NL80211_ATTR_MESH_PEER_AID={0x6, 0xed, 0xf2}, @NL80211_ATTR_STA_LISTEN_INTERVAL={0x6, 0x12, 0x1ff}, @NL80211_ATTR_AIRTIME_WEIGHT={0x6, 0x112, 0xffff}, @NL80211_ATTR_STA_SUPPORTED_OPER_CLASSES={0x9f, 0xbe, "33ce74c0d5b09f563a339b65fe7fd4879aba726258c7f62f0a6c92a134ed29d7314cfdf6f58076082d66c5c96da8a3d1be9b6673afb2060ca6913d55607128826134fd4ae3423c3096607f1db2efb93e0c41dff419ae85c9ab16fdf8edbf823bfdd8604e049d1cbfdc5f59210a999c001b94704a79bc1387708c135b435e73cb3795ed0a61718d6bfc827788589ba58345fbc99467864e890184dd"}, @NL80211_ATTR_STA_SUPPORTED_OPER_CLASSES={0x7a, 0xbe, "893e5d26c86cc3ba464a91da5ef1b5ceb0269dbee16c17fe6469a6053ea1f54865e83835e15bc33534dbfca1c22fc9b056794c0c40c42ad475a13dca5458ee469158006cb391f697619628adda70d4f06a0a2d2c88bff9051e8b812e2eb9d12df235ae827932993ef5de1f9e920074c75973732bd2f7"}, @NL80211_ATTR_STA_FLAGS2={0xc, 0x43, {0x1, 0x1000}}, @NL80211_ATTR_STA_EXT_CAPABILITY={0x72, 0xac, "4806324c3ccb8aaa238c313490675b04cea1390fb4705726bd6381820362a43a505951479d1a8aef2b0b867bc9fe630f0c17f2a54969a42e967b604043bd00c1f3620136f63414993036026e54f34202d51921f555b16173b4764959165b00a0ac7df9ad53de2f36b8847839649d"}, @NL80211_ATTR_PEER_AID={0x6, 0xb5, 0x1e0}, @NL80211_ATTR_STA_VLAN={0x8, 0x14, r9}, @NL80211_ATTR_STA_SUPPORT_P2P_PS={0x5}]}, 0x1e0}, 0x1, 0x0, 0x0, 0x801c}, 0x4008051) poll(&(0x7f0000000040)=[{r1}], 0x1, 0x100) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = dup(r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) dup2(r0, r1) 13:27:42 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000a23002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 621.936014][T15486] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 621.969552][T15502] device veth1 left promiscuous mode 13:27:43 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000e23002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 621.984769][T15494] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 621.988525][T15502] bridge2: port 1(veth1) entered disabled state [ 621.995207][T15494] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 622.011431][T15494] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 622.020122][T15486] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 622.060125][T15486] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 622.070553][T15494] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 622.082897][T15502] bridge3: port 1(veth1) entered blocking state [ 622.090752][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 622.096546][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 622.103893][T15486] EXT4-fs (loop2): corrupt root inode, run e2fsck 13:27:43 executing program 1: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x8ec0, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r4, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) [ 622.106927][T15502] bridge3: port 1(veth1) entered disabled state [ 622.127665][T15486] EXT4-fs (loop2): mount failed [ 622.134134][T15502] device veth1 entered promiscuous mode 13:27:43 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x3, 0x0, 0x81) ioctl$MON_IOCQ_URB_LEN(r1, 0x9201) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 13:27:43 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500001123002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 622.320774][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 622.326648][ C0] protocol 88fb is buggy, dev hsr_slave_1 13:27:43 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x7001, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:27:43 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x5, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:27:43 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) read$FUSE(r1, &(0x7f0000007380), 0x1000) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r3 = socket(0x10, 0x80002, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 13:27:43 executing program 0: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x46800) write$cgroup_type(r0, &(0x7f0000000200)='threaded\x00', 0x175d900f) flistxattr(r0, &(0x7f0000000000)=""/19, 0x13) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r2 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r2}], 0x1, 0x100) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup2(r1, r2) 13:27:43 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500002123002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:27:43 executing program 3: close(0xffffffffffffffff) r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x400, 0x800) setsockopt$CAN_RAW_FD_FRAMES(r0, 0x65, 0x5, &(0x7f0000000040), 0x4) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) [ 622.873684][T15542] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 622.884408][T15542] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 622.894312][T15542] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 622.914625][T15542] EXT4-fs (loop2): corrupt root inode, run e2fsck [ 622.926778][T15542] EXT4-fs (loop2): mount failed [ 622.937004][T15535] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 13:27:44 executing program 1: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x8ec0, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r4, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50000}]}) [ 623.031782][T15535] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 623.056202][T15535] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 623.104893][T15535] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 13:27:44 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500005723002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:27:44 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000040)={0xff, 0x9, 0x9}) 13:27:44 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x6, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:27:44 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x7101, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 623.370768][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 623.376693][ C1] protocol 88fb is buggy, dev hsr_slave_1 13:27:44 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 13:27:44 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500006023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:27:44 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r1 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r1}], 0x1, 0x100) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) r3 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RATTACH(r3, &(0x7f00000000c0)={0xffffff8b}, 0x14) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x3da44926) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0xc203, 0x0) ioctl$DRM_IOCTL_ADD_MAP(r4, 0xc0286415, &(0x7f0000000080)={&(0x7f0000ffc000/0x4000)=nil, 0x2, 0x3, 0x87, &(0x7f0000ffd000/0x3000)=nil, 0x5}) dup2(r0, r1) r5 = creat(&(0x7f0000000700)='./bus\x00', 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) fcntl$setstatus(r5, 0x4, 0x46800) write$cgroup_type(r5, &(0x7f0000000200)='threaded\x00', 0x175d900f) connect$x25(r5, &(0x7f0000000100)={0x9, @null=' \x00'}, 0x12) 13:27:44 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, r1, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) [ 623.767446][T15595] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 13:27:44 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="050000002300060000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 623.856066][T15595] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 623.901852][T15595] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 624.001944][T15595] EXT4-fs (loop2): corrupt root inode, run e2fsck [ 624.008661][T15595] EXT4-fs (loop2): mount failed 13:27:45 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="050000002300110000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 624.045248][T15607] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 13:27:45 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x40, 0x0) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000280)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_GET(r1, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r2, 0x6, 0x70bd2b, 0x25dfdbfc, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_bridge\x00'}, @L2TP_ATTR_IP_DADDR={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x40050}, 0x48000) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000400)={0xa10000, 0x7, 0x200, 0xffffffffffffffff, 0x0, &(0x7f00000003c0)={0xa2092a, 0x7fff, [], @string=&(0x7f0000000380)=0xff}}) r4 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) read$FUSE(r4, &(0x7f0000007380), 0x1000) r5 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_ADD(r3, 0x4c80, r5) close(r0) r6 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000000)) r7 = socket(0x10, 0x80002, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f00000000c0)={0x9f0000, 0x3ff, 0x6, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x9909c8, 0x70000000, [], @p_u16=&(0x7f0000000040)=0xfffe}}) getsockopt$rose(r8, 0x104, 0x4, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$TIOCVHANGUP(r6, 0x5437, 0x0) syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 13:27:45 executing program 1: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x8ec0, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r4, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50000}]}) [ 624.160769][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 624.166832][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 624.170749][T15607] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 624.183838][T15628] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 624.200815][T15628] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 624.231760][T15628] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock 13:27:45 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="050000002300210000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 624.328307][T15607] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 624.364195][T15628] EXT4-fs: failed to create workqueue 13:27:45 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r2, 0x8, 0x70bd2c, 0x25dfdbfc, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0xc010) [ 624.400763][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 624.406628][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 624.439712][T15628] EXT4-fs (loop2): mount failed [ 624.472834][T15607] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 13:27:45 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x7, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:27:45 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="050000002300290000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:27:45 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x7400, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:27:45 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x80800, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x0, 0x800, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x4000, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r2, 0xc058534f, &(0x7f0000000040)={{0x2, 0x1}, 0x0, 0x8, 0x0, {0x1, 0x5}, 0x8}) 13:27:46 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r1 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r1}], 0x1, 0x100) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) r4 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RATTACH(r4, &(0x7f00000000c0)={0xffffff8b}, 0x14) setsockopt$IPT_SO_SET_ADD_COUNTERS(r4, 0x0, 0x41, &(0x7f0000000100)={'mangle\x00', 0x2, [{}, {}]}, 0x48) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup2(r0, r1) 13:27:46 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002b0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:27:46 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) [ 625.108966][T15669] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 625.120782][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 625.126560][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 625.143155][T15669] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 13:27:46 executing program 1: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x8ec0, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r4, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50000}]}) [ 625.159301][T15682] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 625.178446][T15682] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 625.189087][T15669] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 625.198499][T15682] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 625.224782][T15682] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 625.281826][T15669] EXT4-fs (loop2): corrupt root inode, run e2fsck [ 625.288661][T15669] EXT4-fs (loop2): mount failed 13:27:46 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002c0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:27:46 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r3) syz_open_dev$ttys(0xc, 0x2, 0x1) r4 = socket(0x10, 0x80002, 0x10) ioctl(r4, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RATTACH(r5, &(0x7f00000000c0)={0xffffff8b}, 0x14) r6 = socket$inet6_sctp(0xa, 0x1, 0x84) r7 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="01000000f96ca4fd251a2ae54f8319f42d9db70e7286a902ba8d58695526e5c89ce18a37bab1c87946f0bfda19efd9265a73d2e34f405cde42fcab93e97911cbfeab1365d78362b823a9a868455c6de1de3a9aa3", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r6, 0x84, 0x76, &(0x7f0000000240)={r8}, 0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r5, 0x84, 0xf, &(0x7f0000000000)={r8, @in={{0x2, 0x4e23, @local}}, 0x3, 0x100, 0x3, 0x8000, 0x100}, &(0x7f00000000c0)=0x98) 13:27:46 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x7a00, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 625.530175][T15708] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 625.546070][T15708] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 13:27:46 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) [ 625.583614][T15708] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 625.606968][T15708] EXT4-fs (loop2): corrupt root inode, run e2fsck [ 625.613628][T15708] EXT4-fs (loop2): mount failed 13:27:46 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x1f, 0x101000) ioctl$BLKSECDISCARD(r1, 0x127d, &(0x7f0000000080)=0x7f) r2 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r2}], 0x1, 0x100) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) prctl$PR_CAPBSET_DROP(0x18, 0x15) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket$inet6(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = socket$inet6_sctp(0xa, 0x1, 0x84) r9 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r8, 0x84, 0x76, &(0x7f0000000240)={r10}, 0x8) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000100)={r10, 0x9, 0x7, [0x5, 0x8, 0x800, 0x7fff, 0x8, 0x4, 0x4815]}, &(0x7f0000000140)=0x16) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000180)={r11, 0x2, 0x10}, &(0x7f00000001c0)=0xc) dup2(r0, r2) 13:27:46 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x8, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:27:46 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023022f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:27:47 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) r2 = getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000280)={{{@in=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000200)=0xe8) r4 = creat(0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000740)={{{@in6=@loopback, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@local}}, 0x0) r6 = getgid() r7 = getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000b80)=ANY=[@ANYBLOB="02000000010001000000000002000400", @ANYRES32=r3, @ANYBLOB="02000400", @ANYRES32, @ANYBLOB="02005bbc", @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32, @ANYBLOB="02000000", @ANYRES32, @ANYBLOB="02000100", @ANYRES32, @ANYBLOB="02000700", @ANYRES32=r5, @ANYBLOB="040002000000000008000500", @ANYRES32, @ANYBLOB="08000200", @ANYRES32=r6, @ANYBLOB="08000500", @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="080003", @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r7, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r8, @ANYBLOB="10000100c6d5cc003cc7e4ab927b000000002000040000000000"], 0x20, 0x0) setresgid(0xee01, r2, r7) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x54, 0x0, 0x200, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0xfffffffffffff2a0}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'bridge_slave_0\x00'}]}, 0x54}, 0x1, 0x0, 0x0, 0x20000000}, 0x20040000) r9 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r9, 0x4, 0x46800) write$cgroup_type(r9, &(0x7f0000000200)='threaded\x00', 0x175d900f) r10 = openat$cgroup_ro(r9, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r10, 0x7, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x21, 0x0, 0xfffffffffffffe92) 13:27:47 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023032f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 626.099779][T15728] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 626.171555][T15728] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 626.209674][T15728] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 626.235698][T15728] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 626.250798][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 626.257367][ C1] protocol 88fb is buggy, dev hsr_slave_1 13:27:47 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023042f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:27:47 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x8f02, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:27:47 executing program 1: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x8ec0, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r4, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}) [ 626.432249][T15745] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 626.485020][T15745] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 13:27:47 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) read$FUSE(r1, &(0x7f0000007380), 0x1000) mmap$snddsp_control(&(0x7f0000ff2000/0x4000)=nil, 0x1000, 0x9, 0x1010, r1, 0x83000000) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r2 = socket(0x10, 0x80002, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") r3 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RATTACH(r3, &(0x7f00000000c0)={0xffffff8b}, 0x14) ioctl$KVM_GET_MSRS(r3, 0xc008ae88, &(0x7f0000000200)={0x4, 0x0, [{}, {}, {}, {}]}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$IPSET_CMD_FLUSH(r4, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x50, 0x4, 0x6, 0x5, 0x0, 0x0, {0x2, 0x0, 0x7}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x8101) syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 13:27:47 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023072f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 626.579162][T15745] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 626.655946][T15745] EXT4-fs (loop2): corrupt root inode, run e2fsck [ 626.664795][T15745] EXT4-fs (loop2): mount failed [ 626.702369][ T26] kauditd_printk_skb: 20871 callbacks suppressed [ 626.702387][ T26] audit: type=1326 audit(1579440467.803:1498834): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=15770 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45df9a code=0x0 13:27:47 executing program 0: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x309042, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0xa, 0x0, 0x0, 0xffffffff}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r1, 0x10c6}], 0x1, 0x100) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$RTC_EPOCH_SET(r2, 0x4008700e, 0x0) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000000)) dup(r2) dup2(0xffffffffffffffff, r1) [ 626.741450][ T26] audit: type=1326 audit(1579440467.833:1498835): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=15770 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=219 compat=0 ip=0x45b159 code=0x0 13:27:47 executing program 1: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x8ec0, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r4, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}) [ 626.894169][ T26] audit: type=1326 audit(1579440467.833:1498836): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=15770 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=275 compat=0 ip=0x45b159 code=0x0 [ 626.938608][T15783] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 626.948732][T15783] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 626.958992][T15783] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 626.992016][T15783] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 13:27:48 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x2400, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6(0xa, 0x1, 0x0) fcntl$dupfd(r3, 0x0, r4) fcntl$setlease(r4, 0x400, 0x0) fcntl$setstatus(r2, 0x4, 0x46800) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)=0x8, 0x12) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0x175d900f) ioctl$SNDRV_PCM_IOCTL_REWIND(r2, 0x40084146, &(0x7f0000000000)=0x2) 13:27:48 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x9, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:27:48 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) setxattr$security_ima(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@ng={0x4, 0x7, "2cf37fee71d8ca58c1c987fb"}, 0xe, 0x1) poll(&(0x7f0000000040), 0x0, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup2(r0, 0xffffffffffffffff) 13:27:48 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023092f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:27:48 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xedc0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 627.178764][ T26] audit: type=1326 audit(1579440468.273:1498837): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=15799 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45df9a code=0x0 13:27:48 executing program 1: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x8ec0, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r4, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}) [ 627.325066][ T26] audit: type=1326 audit(1579440468.313:1498838): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=15799 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=219 compat=0 ip=0x45b159 code=0x0 [ 627.448932][ T26] audit: type=1326 audit(1579440468.313:1498839): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=15799 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=275 compat=0 ip=0x45b159 code=0x0 13:27:48 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="05000000230a2f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 627.597875][ T26] audit: type=1326 audit(1579440468.693:1498840): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=15823 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45df9a code=0x0 13:27:48 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x6, 0x8) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x46800) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0x175d900f) ioctl(r2, 0x1, &(0x7f00000001c0)="080dba073f0ee2285db6f2") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000007380), 0x1000) write$P9_RATTACH(0xffffffffffffffff, &(0x7f00000000c0)={0x14}, 0x14) read$char_usb(r3, &(0x7f0000000040)=""/1, 0x1) setsockopt$inet_udp_int(r1, 0x11, 0x65, &(0x7f0000000000)=0x37da, 0x4) ioctl$VIDIOC_SUBDEV_G_FMT(r2, 0xc0585604, &(0x7f0000000140)={0x1, 0x0, {0x0, 0x80000001, 0x1009, 0xf, 0x6, 0x0, 0x2, 0x3}}) [ 627.646898][ T26] audit: type=1326 audit(1579440468.733:1498841): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=15823 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=219 compat=0 ip=0x45b159 code=0x0 [ 627.680961][T15822] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 627.750756][T15822] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 627.760624][T15822] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock 13:27:48 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r3) syz_open_dev$ttys(0xc, 0x2, 0x1) r4 = socket(0x10, 0x80002, 0x10) ioctl(r4, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RATTACH(r5, &(0x7f00000000c0)={0xffffff8b}, 0x14) r6 = socket$inet6_sctp(0xa, 0x1, 0x84) r7 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="01000000f96ca4fd251a2ae54f8319f42d9db70e7286a902ba8d58695526e5c89ce18a37bab1c87946f0bfda19efd9265a73d2e34f405cde42fcab93e97911cbfeab1365d78362b823a9a868455c6de1de3a9aa3", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r6, 0x84, 0x76, &(0x7f0000000240)={r8}, 0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r5, 0x84, 0xf, &(0x7f0000000000)={r8, @in={{0x2, 0x4e23, @local}}, 0x3, 0x100, 0x3, 0x8000, 0x100}, &(0x7f00000000c0)=0x98) 13:27:49 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r1 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r1}], 0x1, 0x100) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 13:27:49 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="05000000230e2f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 627.881154][ T26] audit: type=1326 audit(1579440468.743:1498842): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=15823 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=275 compat=0 ip=0x45b159 code=0x0 [ 627.901735][T15825] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 627.971015][T15825] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 627.985773][T15822] EXT4-fs (loop2): corrupt root inode, run e2fsck [ 628.005488][T15825] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock 13:27:49 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/loop-control\x00', 0x4061c0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f00000000c0)={0xfffffff, 0x8, 0x3837, r0, 0x0, &(0x7f0000000000)={0x9909da, 0x6, [], @ptr=0x5}}) ioctl$RTC_PLL_SET(r1, 0x40207012, &(0x7f0000000080)={0x0, 0x5, 0x3, 0x5, 0x3, 0x6, 0x8}) r2 = socket(0x10, 0x80002, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x8919, &(0x7f0000000040)={'ip6_vti0\x00', {0x2, 0x4e21, @remote}}) syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) [ 628.082519][T15822] EXT4-fs (loop2): mount failed [ 628.101797][T15825] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 13:27:49 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023112f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:27:49 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xa, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:27:49 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xff00, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:27:49 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0x400000, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x180, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x68, 0x0, 0x0) 13:27:49 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023212f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:27:49 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x6c00, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:27:49 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r1 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000080), 0x0, 0x100) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup2(r0, r1) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x20000, 0x0) ioctl$LOOP_GET_STATUS64(r4, 0x4c05, &(0x7f0000000100)) 13:27:49 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) socket(0x10, 0x80002, 0x0) ioctl(0xffffffffffffffff, 0xa29, &(0x7f0000001200)="083347cdd591423c8d46170ce7715a26bd42cfe886fab8ded798ebd122d38a0d62c4d08fe72782a1368008a78b2305510688c0cd9aee03d899c6d81054301618012a2d439634695cbf85b62b1d3cf1aaaeac808ada5d0894617aefa6adb9e6fdd3a87be392fda0b3a9f18c63c60aad3c93f1d2b27c9ab25e6b258046b18554906ca935c3a7e62dcf180e1e0e6cff133864498f719702d4ea9ac12d34f7f278ef843dc70117c89a0401") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46800) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) getsockopt$IP_VS_SO_GET_DESTS(r1, 0x0, 0x484, &(0x7f0000000200)=""/4096, &(0x7f0000000000)=0x1000) 13:27:50 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023572f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 628.989734][T15888] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 629.044201][T15888] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 629.061960][T15888] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 629.099515][T15888] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 13:27:50 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000000)="080db505d35ee2cfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$inet6(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r7, 0x4, 0x46800) write$cgroup_type(r7, &(0x7f0000000200)='threaded\x00', 0x175d900f) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x1, 0x101100) r8 = syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x2) ioctl$BLKSECTGET(r8, 0x1267, &(0x7f0000000140)) [ 629.197447][T15914] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 629.230694][T15917] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 629.253092][T15914] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 629.263176][T15917] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 629.282111][T15914] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 629.298296][T15917] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock 13:27:50 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023602f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 629.345493][T15914] EXT4-fs (loop2): corrupt root inode, run e2fsck [ 629.346494][T15917] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 629.360944][T15914] EXT4-fs (loop2): mount failed 13:27:50 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xff0f, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:27:50 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req={0x80000001, 0x0, 0x3, 0x900}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r1}], 0x1, 0x100) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = dup2(r0, r1) r5 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x46800) write$cgroup_type(r5, &(0x7f0000000200)='threaded\x00', 0x175d900f) r6 = socket(0x9, 0x1, 0x8) mmap(&(0x7f0000003000/0xffc000)=nil, 0xffc000, 0x0, 0x32, 0xffffffffffffffff, 0x0) getsockopt(r6, 0x0, 0x40, &(0x7f0000b3ffac)=""/84, &(0x7f0000001ffc)=0x54) ioctl$SNDRV_PCM_IOCTL_USER_PVERSION(r5, 0x40044104, &(0x7f0000000000)=0x1) syz_open_dev$tty20(0xc, 0x4, 0x1) r7 = creat(&(0x7f0000000300)='./file0\x00', 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = socket$inet6(0xa, 0x1, 0x0) r10 = fcntl$dupfd(r8, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) write$P9_RATTACH(r4, &(0x7f0000000100)={0x4d, 0x69, 0x8, {0x0, 0x0, 0x5}}, 0x14) ioctl$sock_inet_SIOCSIFDSTADDR(r7, 0x8918, &(0x7f0000000080)={'netdevsim0\x00', {0x2, 0x4e20, @multicast2}}) [ 629.600753][ C1] net_ratelimit: 4 callbacks suppressed [ 629.600762][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 629.612146][ C1] protocol 88fb is buggy, dev hsr_slave_1 13:27:50 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xc, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:27:50 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0xbaab9270ed8f5b0a, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 13:27:50 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="050000002300320000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:27:50 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x6000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:27:50 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) llistxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000200)=""/246, 0xf6) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 13:27:51 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="050000002300330000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:27:51 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req={0x658d, 0x10000, 0x440, 0x7}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r1}], 0x1, 0x100) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup2(r0, r1) 13:27:51 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46800) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) sendmsg$nl_route(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=@getrule={0x14, 0x22, 0x100, 0x70bd26, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4040}, 0x2000c090) syz_open_dev$ttys(0xc, 0x2, 0x1) r2 = socket(0x10, 0x80002, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) shmget(0x0, 0x4000, 0x10, &(0x7f0000ff2000/0x4000)=nil) [ 630.140995][T15965] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 630.300501][T15980] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 630.344470][T15965] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 630.354587][T15980] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 630.365338][T15965] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 630.386708][T15980] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 630.398217][T15965] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 630.409133][T15980] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 630.410750][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 630.424139][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 630.424528][T15978] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 13:27:51 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023003a0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:27:51 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x4c00, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 630.440633][T15978] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 630.451708][T15978] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 630.473737][T15978] EXT4-fs (loop2): corrupt root inode, run e2fsck [ 630.487102][T15978] EXT4-fs (loop2): mount failed 13:27:51 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x10200, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:27:51 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023003c0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 630.640883][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 630.646996][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 630.815324][T16013] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 13:27:52 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x23, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:27:52 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/dev_mcast\x00') ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x3, 0x65c080) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x6, 0x0, 0x0) 13:27:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r1) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000100)={0x1b, 0x6, 0x4, 0x10, 0x8, {0x0, 0x7530}, {0x2, 0x2, 0x9, 0x4, 0x7, 0xe6, "6c5474dd"}, 0xfff, 0x3, @offset=0x1ff, 0xfffffffe, 0x0, r1}) ioctl$IMDELTIMER(r2, 0x80044941, &(0x7f0000000000)=0x1) r3 = socket$packet(0x11, 0x3, 0x300) r4 = getpid() ptrace$getsig(0x4202, r4, 0x400, &(0x7f0000000180)) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000080)=@req3={0x3, 0x6, 0x8000, 0x6}, 0x1c) r5 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r5}], 0x1, 0x100) symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) keyctl$session_to_parent(0x12) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) dup2(r3, r5) [ 630.893474][T16013] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 630.904021][T16013] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 630.946272][T16013] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 13:27:52 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="050000002300040000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:27:52 executing program 3: setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'trusted.', '\x00'}, &(0x7f0000000080)='posix_acl_access\x00', 0x11, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x1a, 0x5, 0x1) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = dup(r0) ioctl$TUNSETGROUP(r2, 0x400454ce, 0xee00) r3 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RATTACH(r3, &(0x7f00000000c0)={0xffffff8b}, 0x14) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(r3, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1010048}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x24, r4, 0x400, 0x70bd2b, 0x25dfdbfb, {{}, {}, {0x8, 0x2, 0x2}}, ["", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0xc4}, 0xc080) ioctl$KVM_GET_NR_MMU_PAGES(r3, 0xae45, 0x5) [ 631.225182][T16029] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 13:27:52 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x4801, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 631.269844][T16029] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 631.284946][T16029] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 631.311981][T16039] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 631.360787][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 631.366595][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 631.388949][T16029] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 13:27:52 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) r2 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) read$FUSE(r2, &(0x7f0000007380), 0x1000) ioctl$VIDIOC_SUBDEV_G_CROP(r2, 0xc038563b, &(0x7f0000000000)={0x0, 0x0, {0x0, 0x9a1, 0x6}}) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) [ 631.429396][T16039] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 631.439812][T16039] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 631.463521][T16039] EXT4-fs (loop2): corrupt root inode, run e2fsck [ 631.475422][T16039] EXT4-fs (loop2): mount failed 13:27:52 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="050000002300060000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:27:52 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000240)=@req3={0x0, 0x9, 0x3, 0x703f, 0x2000008}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r1}], 0x1, 0x100) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f0000000200)) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r4, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)={0x28, r5, 0x535, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x14, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}]}]}, 0x28}}, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r3, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYRES16, @ANYRES16=r5, @ANYBLOB="200025bd7000ffdbdf25100000003400090008000100060000000800020000000000080001000600000008000200030000000800020006000000080001001c000000100002000400040008000100090000001c00010008000300010000000d0001007564703a73797a30000000001c000200080002000200000008000200f3390000080001000800000018000200080001001f000000040004000800020069000000"], 0x3}, 0x1, 0x0, 0x0, 0x40000}, 0x0) dup2(r0, r1) r6 = creat(&(0x7f0000000700)='./bus\x00', 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) pipe2$9p(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) epoll_ctl$EPOLL_CTL_DEL(r7, 0x2, r8) fcntl$setstatus(r6, 0x4, 0x46800) write$cgroup_type(r6, &(0x7f0000000200)='threaded\x00', 0x175d900f) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f0000000280)={'netpci0\x00', 0xffffffff}) 13:27:52 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f00000002c0)) ptrace$peekuser(0x3, r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$inet_tcp_TCP_MD5SIG(r5, 0x6, 0xe, &(0x7f0000000000)={@in={{0x2, 0x4e22, @loopback}}, 0x0, 0x0, 0x28, 0x0, "8350b17a0e805a5a2432ef58a0274fcddd19ef0818d6caf2673dfb3e89dccb34bc68c6e7b5d3f0162c55e5faaa16e8a5e157cff728c658d1bd8f08673779207289c2da4a1fa571e197c2b9ecd8432942"}, 0xd8) syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 13:27:52 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x20000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 631.886092][T16071] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 631.920761][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 631.926678][ C1] protocol 88fb is buggy, dev hsr_slave_1 13:27:53 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2d, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:27:53 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="050000002300110000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 631.991083][T16071] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 632.021998][T16071] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 632.045038][T16071] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 13:27:53 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x2, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") r2 = accept4$rose(r1, &(0x7f0000000000)=@full={0xb, @remote, @netrom, 0x0, [@bcast, @default, @default, @bcast, @netrom, @default]}, &(0x7f0000000040)=0x40, 0x100000) ioctl$sock_ifreq(r2, 0x8916, &(0x7f0000000080)={'macsec0\x00', @ifru_hwaddr=@remote}) r3 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xe4900, 0x115) ioctl$SNDCTL_DSP_GETISPACE(r3, 0x8010500d, &(0x7f0000000140)) r4 = syz_init_net_socket$x25(0x9, 0x5, 0x0) shutdown(r4, 0x0) syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) [ 632.279541][T16093] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 632.293022][T16093] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 13:27:53 executing program 1 (fault-call:2 fault-nth:0): socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x8ec0, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r4, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) [ 632.362314][T16093] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 632.402565][T16093] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 632.411883][T16101] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 13:27:53 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="050000002300210000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 632.476090][T16101] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 13:27:53 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8004, 0x800006, 0x8800, 0x6, 0x4, 0x0, 0xfffffffe}, 0xc) r1 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r1}], 0x1, 0x100) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) r3 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) read$FUSE(r3, &(0x7f0000007380), 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) dup2(r0, r1) dup(r2) [ 632.533793][T16101] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 632.595560][ T26] audit: type=1326 audit(1579440473.693:1498843): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16120 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45df9a code=0x50000 [ 632.654426][T16101] EXT4-fs (loop2): corrupt root inode, run e2fsck [ 632.672964][T16101] EXT4-fs (loop2): mount failed [ 632.710090][ T26] audit: type=1326 audit(1579440473.693:1498844): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16120 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 13:27:53 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x20100, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:27:53 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="050000002300290000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 632.843926][ T26] audit: type=1326 audit(1579440473.693:1498845): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16120 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 13:27:54 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x48, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 632.937196][ T26] audit: type=1326 audit(1579440473.693:1498846): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16120 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 13:27:54 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46800) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r3 = socket(0x1d, 0x80002, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$inet6(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$EXT4_IOC_SWAP_BOOT(r6, 0x6611) r7 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RATTACH(r7, &(0x7f00000000c0)={0xffffff8b}, 0x14) ioctl$void(r7, 0xc0045878) syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) [ 633.020790][ T26] audit: type=1326 audit(1579440473.693:1498847): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16120 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 633.085605][ T26] audit: type=1326 audit(1579440473.693:1498848): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16120 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 633.118504][ T26] audit: type=1326 audit(1579440473.693:1498849): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16120 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 633.150984][T16153] can: request_module (can-proto-0) failed. 13:27:54 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002b0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 633.185470][ T26] audit: type=1326 audit(1579440473.693:1498850): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16120 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 633.280101][T16149] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 633.290824][T16149] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 633.300662][T16159] can: request_module (can-proto-0) failed. [ 633.311256][T16158] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 633.331165][T16149] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 633.348189][T16158] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 633.364833][T16158] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 633.376520][T16149] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 633.381804][ T26] audit: type=1326 audit(1579440473.693:1498851): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16120 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 633.425080][T16158] EXT4-fs (loop2): corrupt root inode, run e2fsck [ 633.443516][T16158] EXT4-fs (loop2): mount failed 13:27:54 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002c0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:27:54 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req={0x7, 0x3, 0xbb1e}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r1}], 0x1, 0x100) getsockopt$bt_sco_SCO_CONNINFO(0xffffffffffffffff, 0x11, 0x2, &(0x7f0000000400)=""/4096, &(0x7f0000000080)=0x1000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TIOCGWINSZ(r3, 0x5413, &(0x7f0000000000)) dup2(r0, r1) 13:27:54 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x20400, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 633.509915][ T26] audit: type=1326 audit(1579440473.693:1498852): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16120 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 13:27:54 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) fcntl$dupfd(r1, 0x0, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6(0xa, 0x1, 0x0) r5 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0/file0\x00', 0x100, 0xc) accept4$llc(r5, &(0x7f0000000140)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000180)=0x10, 0x800) fcntl$dupfd(r3, 0x0, r4) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RATTACH(r6, &(0x7f00000000c0)={0xffffff8b}, 0x14) r7 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r7, 0x4, 0x46800) write$cgroup_type(r7, &(0x7f0000000200)='threaded\x00', 0x175d900f) close(r7) r8 = syz_open_dev$ttys(0xc, 0x2, 0x1) r9 = socket(0x10, 0x80002, 0x0) ioctl(r9, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") ioctl$VT_GETMODE(r8, 0x5601, &(0x7f0000000000)) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvram\x00', 0x420202, 0x0) r10 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RATTACH(r10, &(0x7f00000000c0)={0xffffff8b}, 0x14) syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe4000/0x18000)=nil, 0x0, 0x0, 0x70, 0x0, 0x0) [ 633.765306][T16158] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 633.816772][T16158] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 633.836106][T16158] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 633.875930][T16158] EXT4-fs: failed to create workqueue [ 633.882235][T16158] EXT4-fs (loop2): mount failed [ 634.022108][T16194] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 634.056818][T16194] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 634.110742][T16194] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 634.197579][T16194] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 635.515257][T16121] FAULT_INJECTION: forcing a failure. [ 635.515257][T16121] name fail_futex, interval 1, probability 0, space 0, times 1 [ 635.528973][T16121] CPU: 1 PID: 16121 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 635.537856][T16121] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 635.547899][T16121] Call Trace: [ 635.551237][T16121] dump_stack+0x11d/0x181 [ 635.555594][T16121] should_fail.cold+0xa/0x1a [ 635.560276][T16121] get_futex_key+0x7bd/0xa10 [ 635.564864][T16121] ? set_next_entity+0x9a/0x1a0 [ 635.569721][T16121] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 635.576009][T16121] futex_wake+0xaf/0x350 [ 635.580262][T16121] do_futex+0x2be/0x18d0 [ 635.584544][T16121] ? schedule_timeout+0x2fe/0x6e0 [ 635.589759][T16121] ? _raw_spin_unlock_irqrestore+0x70/0x80 [ 635.595573][T16121] ? _raw_spin_unlock_irqrestore+0x70/0x80 [ 635.601380][T16121] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 635.607281][T16121] ? futex_cleanup+0xae/0x950 [ 635.611961][T16121] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 635.617870][T16121] mm_release+0x1ef/0x210 [ 635.622193][T16121] exit_mm_release+0x2f/0x40 [ 635.626778][T16121] do_exit+0x2a8/0x18c0 [ 635.630945][T16121] do_group_exit+0xb4/0x1c0 [ 635.635461][T16121] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 635.641713][T16121] get_signal+0x2a2/0x1320 [ 635.646210][T16121] ? sock_splice_read+0x9d/0xd0 [ 635.651139][T16121] ? unix_stream_read_generic+0xfc0/0xfc0 [ 635.656907][T16121] ? do_splice_to+0xff/0x130 [ 635.661497][T16121] do_signal+0x2f/0x6c0 [ 635.665783][T16121] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 635.672174][T16121] ? fput_many+0xec/0x130 [ 635.676510][T16121] exit_to_usermode_loop+0x250/0x2c0 [ 635.681788][T16121] do_syscall_64+0x384/0x3a0 [ 635.686396][T16121] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 635.692282][T16121] RIP: 0033:0x45b159 [ 635.696177][T16121] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 635.715824][T16121] RSP: 002b:00007fc19b219c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 635.724340][T16121] RAX: fffffffffffffe00 RBX: 00007fc19b21a6d4 RCX: 000000000045b159 [ 635.732359][T16121] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000003 [ 635.740339][T16121] RBP: 000000000075bf20 R08: 0000000000008ec0 R09: 0000000000000000 [ 635.748550][T16121] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 [ 635.756518][T16121] R13: 0000000000000b3c R14: 00000000004cc9ff R15: 0000000000000000 13:27:56 executing program 1: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x8ec0, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r4, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) 13:27:56 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="050000002300320000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:27:56 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x4c, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:27:56 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r1 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r1}], 0x1, 0x100) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) connect$pppoe(r3, &(0x7f0000000080)={0x18, 0x0, {0x4, @local, 'batadv_slave_0\x00'}}, 0x1e) r4 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup2(r0, r1) 13:27:56 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") semctl$GETZCNT(0x0, 0x1, 0xf, &(0x7f0000000000)=""/52) syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 13:27:56 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x40000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 635.767297][ T0] NOHZ: local_softirq_pending 08 13:27:57 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKPG(r2, 0x1269, &(0x7f0000000140)={0xef5d, 0x1, 0xea, &(0x7f0000000000)="fa5eba6862f2d94d63428cfe992540fe5d3bd3130bccbe884d41404e141595b6165e37875e3e3e98bc5d1799b9ae092f2db957179604a5656bad7569f9059a65c9bcfb6844b6f462d8c9afb394180646e383f586595d7b1bc6d90a56106290ef2c39d9fd4408791f47398303ba0ae1d34030fefaabb64cf1386f24f53fd57db4ab4c33b636d6153cbd3a7077165bfe3f4b729b7458a1a89cb3e0428c76c1a7ce0328e87511b7d4c1140b0c5fbe751d620edd086a0dd820469c7e4f24fef5afaf742aaccf5a0ba3847fd5f5945caccc8c76f2dbce6a5eed3104ab098ab77804d41fcda02eb338beb85196"}) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x1, 0x0) fsmount(r2, 0x0, 0x80) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_CREATE(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, r6, 0x1, 0x0, 0x0, {0x3}, [@L2TP_ATTR_CONN_ID={0x8}]}, 0x1c}}, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r6, 0x10, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x4}]}, 0x1c}}, 0xc090) r7 = accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000200), 0x800) close(r7) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r8, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r8, &(0x7f0000000240)={0x7, 0x8, 0xfa00, {r9}}, 0x10) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0x0, @ipv4={[], [], @rand_addr=0x7fff}, 0x200}, r9}}, 0x30) syz_open_dev$ttys(0xc, 0x2, 0x1) r10 = socket(0x10, 0x80002, 0x0) ioctl(r10, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 13:27:57 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="050000002300330000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 636.034072][T16251] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 636.064233][T16251] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 636.080779][ C1] net_ratelimit: 4 callbacks suppressed [ 636.080789][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 636.086412][T16251] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 636.092216][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 636.116429][T16251] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 636.169624][T16253] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 636.329468][T16253] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 13:27:57 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023003a0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 636.381104][T16253] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 636.429693][T16253] EXT4-fs (loop2): corrupt root inode, run e2fsck [ 636.449385][T16253] EXT4-fs (loop2): mount failed 13:27:57 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RATTACH(r1, &(0x7f00000000c0)={0xffffff8b}, 0x14) read$midi(r1, &(0x7f0000000000)=""/2, 0x2) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r2 = socket(0x10, 0x80002, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 13:27:57 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x40200, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:27:57 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r1 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r1}], 0x1, 0x100) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) r4 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46800) r5 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x260, 0x0) ioctl$SNDCTL_DSP_GETOSPACE(r5, 0x8010500c, &(0x7f00000001c0)) write$cgroup_type(r4, &(0x7f0000000200)='threaded\x00', 0x175d900f) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = socket$inet6(0xa, 0x1, 0x0) fcntl$dupfd(r6, 0x0, r7) fcntl$setpipe(r6, 0x407, 0x8) r8 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r8, 0x4, 0x46800) write$cgroup_type(r8, &(0x7f0000000200)='threaded\x00', 0x175d900f) getsockname$ax25(r8, &(0x7f0000000300)={{0x3, @rose}, [@remote, @null, @bcast, @rose, @remote, @default, @bcast, @rose]}, &(0x7f00000002c0)=0x48) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r4, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x14, 0x7, 0x1, 0x101, 0x0, 0x0, {0xc, 0x0, 0x2}, ["", "", "", "", ""]}, 0x14}}, 0x4010) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup2(r0, r1) [ 636.880752][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 636.886643][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 636.966488][T16297] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 637.000442][T16297] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 637.024118][T16297] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 637.047304][T16297] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 637.600876][ T26] kauditd_printk_skb: 20590 callbacks suppressed [ 637.600963][ T26] audit: type=1326 audit(1579440478.693:1519442): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16245 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 637.644538][ T26] audit: type=1326 audit(1579440478.693:1519444): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16245 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 637.670599][ T26] audit: type=1326 audit(1579440478.703:1519445): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16245 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 637.696916][ T26] audit: type=1326 audit(1579440478.703:1519446): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16245 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 637.723231][ T26] audit: type=1326 audit(1579440478.703:1519447): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16245 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 637.749391][ T26] audit: type=1326 audit(1579440478.703:1519448): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16245 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 637.776427][ T26] audit: type=1326 audit(1579440478.703:1519449): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16245 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 637.802907][ T26] audit: type=1326 audit(1579440478.703:1519450): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16245 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 637.831957][ T26] audit: type=1326 audit(1579440478.703:1519451): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16245 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 637.857615][ T26] audit: type=1326 audit(1579440478.703:1519452): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16245 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 13:27:59 executing program 1: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x8ec0, 0x2) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r4, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) 13:27:59 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023003c0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:27:59 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x46800) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0x175d900f) recvmmsg(r2, &(0x7f0000001c80)=[{{&(0x7f0000000140)=@caif=@dbg, 0x80, &(0x7f0000000300)=[{&(0x7f0000000200)=""/134, 0x86}, {&(0x7f00000002c0)=""/26, 0x1a}], 0x2, &(0x7f0000000340)=""/198, 0xc6}, 0x20}, {{&(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000001ac0)=[{&(0x7f00000004c0)=""/251, 0xfb}, {&(0x7f00000005c0)=""/183, 0xb7}, {&(0x7f0000000680)=""/4096, 0x1000}, {&(0x7f0000001680)=""/141, 0x8d}, {&(0x7f0000001740)=""/189, 0xbd}, {&(0x7f0000001800)=""/210, 0xd2}, {&(0x7f0000001900)=""/194, 0xc2}, {&(0x7f0000001a00)=""/111, 0x6f}, {&(0x7f0000001a80)}], 0x9, &(0x7f0000001b80)=""/199, 0xc7}, 0xa9}], 0x2, 0x2042, &(0x7f0000001d00)={0x77359400}) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r1, &(0x7f0000001dc0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000001d80)={&(0x7f0000001d40)=ANY=[@ANYBLOB="30d9f500", @ANYRES16=0x0, @ANYBLOB="00012bbd7000fbdbdf251d000000080001000200000008000300", @ANYRES32=r3, @ANYBLOB="0c00230008000b00c6a90000"], 0x30}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 13:27:59 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x60, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:27:59 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x407fc, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:27:59 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x20, 0x1, 0x8000, 0x6}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r1}], 0x1, 0x100) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) bind$packet(r1, &(0x7f0000000000)={0x11, 0xe3, 0x0, 0x1, 0x80}, 0x14) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = dup2(r0, r1) write$P9_RLCREATE(r4, &(0x7f0000000080)={0x18, 0xf, 0x2, {{0xc0, 0x1, 0x5}, 0x3}}, 0x18) [ 638.960778][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 638.966593][ C0] protocol 88fb is buggy, dev hsr_slave_1 13:28:00 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0200068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 639.171629][T16325] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 639.188217][T16325] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 639.198846][T16325] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 639.214955][T16327] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 639.225378][T16325] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 639.234836][T16327] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 639.248115][T16327] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 639.269655][T16327] EXT4-fs (loop2): corrupt root inode, run e2fsck [ 639.280312][T16327] EXT4-fs (loop2): mount failed 13:28:00 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000000)={0x0, @in6={{0xa, 0x4e23, 0x10001, @rand_addr="e777469cc676f879d8db12e70246dbf0", 0xff1}}, 0x6, 0x4, 0x800, 0x64, 0x4, 0xe1d1, 0x40}, &(0x7f00000000c0)=0x9c) setsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000140)={r2, 0x7, 0x40, 0xa1f3, 0x1, 0xff}, 0x14) 13:28:00 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x40800, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:28:00 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0300068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:28:00 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000000)={{{@in=@dev, @in6=@ipv4}}, {{@in=@dev}, 0x0, @in=@remote}}, &(0x7f0000000140)=0xe8) 13:28:00 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x68, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 639.850483][T16360] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 639.900822][T16360] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 639.943621][T16360] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 639.985750][T16377] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 640.020181][T16360] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 640.035986][T16377] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 640.065168][T16377] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 640.096999][T16377] EXT4-fs (loop2): corrupt root inode, run e2fsck [ 640.112227][T16377] EXT4-fs (loop2): mount failed 13:28:03 executing program 1: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x8ec0, 0x3) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r4, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) 13:28:03 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0400068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:28:03 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6(0xa, 0x1, 0x0) fcntl$dupfd(r2, 0x0, r3) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000000)={0x6, 0x7, 0x4, 0x20000, 0x7, {0x0, 0x7530}, {0x7, 0x0, 0x1, 0x81, 0x1, 0x7, "f180b16f"}, 0x4, 0x1, @fd, 0x7fff, 0x0, r3}) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0xa00, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket$inet6(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) syz_kvm_setup_cpu$x86(r4, r7, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 13:28:03 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x80000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:28:03 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x6c, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:28:03 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r1 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r1}], 0x1, 0x100) r2 = creat(&(0x7f0000000300)='./file0\x00', 0x0) pipe2(&(0x7f0000000200)={0xffffffffffffffff}, 0x84000) getsockopt$sock_int(r3, 0x1, 0x26, &(0x7f0000000240), &(0x7f0000000280)=0x4) write$P9_RATTACH(r2, &(0x7f00000000c0)={0xffffff8b}, 0x14) r4 = accept$unix(r2, &(0x7f0000002480), &(0x7f0000002500)=0x6e) accept(r4, &(0x7f0000002540)=@pppol2tp, &(0x7f00000025c0)=0x80) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) dup2(r0, r1) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r7, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r8, @ANYBLOB="01002cbd700000050000000000000000120002000008"], 0x1c}, 0x1, 0x0, 0x0, 0x20000011}, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0xa8, r8, 0x4, 0x70bd28, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x60}, @IPVS_DEST_ATTR_FWD_METHOD={0x6, 0x3, 0x2}, @IPVS_DEST_ATTR_TUN_TYPE={0x5}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x3ff}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}, @IPVS_CMD_ATTR_DAEMON={0x50, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x1}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0_to_team\x00'}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x1}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x7}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x5f}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfff}]}, 0xa8}, 0x1, 0x0, 0x0, 0x800}, 0x76ef011b33d1329b) [ 642.080776][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 642.086558][ C1] protocol 88fb is buggy, dev hsr_slave_1 13:28:03 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0700068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:28:03 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x40200, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 642.210848][T16421] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 642.227839][T16421] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 642.289101][T16419] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 642.320810][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 642.341612][T16421] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 642.394136][T16419] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 642.432780][T16427] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 13:28:03 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0900068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 642.458155][T16419] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 642.474012][T16421] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 642.523355][T16427] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 642.565027][T16427] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 642.574969][T16419] EXT4-fs (loop2): corrupt root inode, run e2fsck [ 642.594138][T16419] EXT4-fs (loop2): mount failed [ 642.617535][ T26] kauditd_printk_skb: 30304 callbacks suppressed [ 642.617593][ T26] audit: type=1326 audit(1579440483.663:1549714): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16414 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=1 compat=0 ip=0x414c31 code=0x50000 13:28:03 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_ROPEN(r2, &(0x7f0000000140)={0x18, 0x71, 0x2, {{0x88, 0x4, 0x2}, 0xfc}}, 0x18) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket$inet6(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = openat$cgroup_ro(r7, &(0x7f0000000080)='cpuset.memory_pressure\x00', 0x0, 0x0) connect$bt_rfcomm(r8, &(0x7f0000000100)={0x1f, {0x1f, 0x0, 0x4, 0x40, 0x9, 0xc}, 0x6}, 0xa) poll(&(0x7f0000000040)=[{r3}], 0x1, 0x100) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) dup2(r3, r4) [ 642.646684][ T26] audit: type=1326 audit(1579440483.713:1549759): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16414 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=1 compat=0 ip=0x414c31 code=0x50000 [ 642.674971][ T26] audit: type=1326 audit(1579440483.713:1549760): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16414 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=1 compat=0 ip=0x414c31 code=0x50000 [ 642.698444][ T26] audit: type=1326 audit(1579440483.713:1549761): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16414 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=1 compat=0 ip=0x414c31 code=0x50000 [ 642.699038][T16427] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 642.721277][ T26] audit: type=1326 audit(1579440483.713:1549762): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16414 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=1 compat=0 ip=0x414c31 code=0x50000 [ 642.772719][ T26] audit: type=1326 audit(1579440483.713:1549763): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16414 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=1 compat=0 ip=0x414c31 code=0x50000 13:28:03 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0a00068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:28:03 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x80400, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 642.801129][ T26] audit: type=1326 audit(1579440483.713:1549764): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16414 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=1 compat=0 ip=0x414c31 code=0x50000 [ 642.823680][ T26] audit: type=1326 audit(1579440483.713:1549765): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16414 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=1 compat=0 ip=0x414c31 code=0x50000 [ 642.846918][ T26] audit: type=1326 audit(1579440483.713:1549766): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16414 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=1 compat=0 ip=0x414c31 code=0x50000 [ 642.869892][ T26] audit: type=1326 audit(1579440483.713:1549767): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16414 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=1 compat=0 ip=0x414c31 code=0x50000 [ 643.319488][T16464] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 643.338195][T16464] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 643.364634][T16464] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 643.386217][T16464] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 13:28:06 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x80000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:28:06 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000000)=@req={0x7, 0xfc, 0x3cd, 0xe5}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000080)='veth0_to_batadv\x00') r1 = socket(0x2, 0x5, 0x0) listen(r1, 0x5) r2 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) r3 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RATTACH(r3, &(0x7f00000000c0)={0xffffff8b}, 0x14) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r3) ioctl$NBD_SET_SOCK(r2, 0xab00, r1) close(r2) r4 = signalfd(r2, &(0x7f0000000100)={[0x7]}, 0x8) splice(r1, &(0x7f00000000c0)=0x9, r4, &(0x7f0000000140)=0xffffffffffff8001, 0x8, 0x2) dup(r2) r5 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self\x00', 0x103002, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r5, 0xc0406619, &(0x7f00000001c0)={{0x6, 0x0, @reserved="cd8af9d257e59928b67e6cb4977797e4176cc20e9c5a07fbcc891abd069d44f6"}}) r6 = socket$packet(0x11, 0x2, 0x300) poll(&(0x7f0000000040)=[{r6, 0x4200}], 0x1, 0x100) r7 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RATTACH(r7, &(0x7f00000000c0)={0xffffff8b}, 0x14) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000200), 0x111, 0x3}}, 0x20) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) dup2(r0, r6) 13:28:06 executing program 1: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x8ec0, 0x4) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r4, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) 13:28:06 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x74, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:28:06 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0e00068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:28:06 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xc0000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 645.128668][T16486] block nbd0: shutting down sockets [ 645.200750][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 645.206640][ C0] protocol 88fb is buggy, dev hsr_slave_1 13:28:06 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f1100068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 645.337818][T16500] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 645.350520][T16483] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 645.360783][T16496] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 645.388627][T16500] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 645.399107][T16500] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 645.409605][T16483] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 645.421360][T16500] EXT4-fs (loop2): corrupt root inode, run e2fsck [ 645.428159][T16500] EXT4-fs (loop2): mount failed 13:28:06 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f2100068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 645.434216][T16483] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 645.446935][T16483] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 645.513125][T16496] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 645.560771][T16496] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 645.639106][T16496] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 13:28:06 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x1000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:28:06 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x6c, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:28:07 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f5700068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:28:07 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x7a, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 646.267287][T16543] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 646.288135][T16543] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 13:28:07 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f6000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 646.309689][T16543] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 646.337613][T16548] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 646.362971][T16543] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 646.400811][T16548] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 646.410578][T16548] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 646.438650][T16549] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 646.461140][T16543] EXT4-fs (loop3): mount failed [ 646.498359][T16549] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 646.534448][T16549] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 646.545999][T16548] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 646.591096][T16549] EXT4-fs (loop2): corrupt root inode, run e2fsck 13:28:07 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x20400, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 646.664303][T16549] EXT4-fs (loop2): mount failed [ 647.021506][T16570] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 647.054843][T16570] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 647.164211][T16570] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 647.242312][T16570] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 647.620724][ T26] kauditd_printk_skb: 31431 callbacks suppressed [ 647.620793][ T26] audit: type=1326 audit(1579440488.713:1581198): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16492 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 647.700512][ T26] audit: type=1326 audit(1579440488.753:1581199): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16492 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 647.756390][ T26] audit: type=1326 audit(1579440488.753:1581200): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16492 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 647.819488][ T26] audit: type=1326 audit(1579440488.753:1581201): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16492 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 647.870756][ T26] audit: type=1326 audit(1579440488.753:1581202): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16492 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 647.913836][ T26] audit: type=1326 audit(1579440488.753:1581203): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16492 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 647.966905][ T26] audit: type=1326 audit(1579440488.753:1581204): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16492 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 648.009779][ T26] audit: type=1326 audit(1579440488.753:1581205): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16492 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 648.050802][ T26] audit: type=1326 audit(1579440488.763:1581206): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16492 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 648.074349][ T26] audit: type=1326 audit(1579440488.763:1581207): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16492 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 13:28:09 executing program 1: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x8ec0, 0x5) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r4, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) 13:28:09 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0003068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:28:09 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x1480000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:28:09 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x148, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:28:09 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46800) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) r3 = socket(0x1d, 0x80002, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$inet6(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$EXT4_IOC_SWAP_BOOT(r6, 0x6611) r7 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RATTACH(r7, &(0x7f00000000c0)={0xffffff8b}, 0x14) ioctl$void(r7, 0xc0045878) syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 13:28:09 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002fac05068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 648.410327][T16609] can: request_module (can-proto-0) failed. [ 648.460487][T16608] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 648.525144][T16610] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 648.530863][T16608] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 648.535134][T16610] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 648.583562][T16608] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 648.594125][T16610] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock 13:28:09 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSIGACCEPT(r0, 0x4b4e, 0x13) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) r1 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, 0x0, &(0x7f00000001c0)) bind$tipc(0xffffffffffffffff, 0x0, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x4044150, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_int(r1, 0x6, 0x19, &(0x7f0000000100)=0x6, 0x4) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) getpid() sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) [ 648.628232][T16608] EXT4-fs (loop2): corrupt root inode, run e2fsck [ 648.635261][T16610] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 648.666252][T16608] EXT4-fs (loop2): mount failed 13:28:09 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002fc405068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 648.875438][T16608] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 648.917681][T16608] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 648.940818][T16608] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock 13:28:10 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 649.041048][T16608] EXT4-fs: failed to create workqueue [ 649.046480][T16608] EXT4-fs (loop2): mount failed 13:28:10 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0007068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:28:10 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x300, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:28:10 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0009068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 649.562610][T16644] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 649.587657][T16644] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 649.597617][T16644] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 649.659013][T16644] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 649.747672][T16653] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 649.758982][T16653] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 649.773032][T16653] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 649.794782][T16653] EXT4-fs (loop2): corrupt root inode, run e2fsck [ 649.805981][T16653] EXT4-fs (loop2): mount failed 13:28:12 executing program 1: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x8ec0, 0x6) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r4, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) 13:28:12 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x1480000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:28:12 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f000a068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:28:12 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x410, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:28:12 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x3000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:28:12 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r1 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r1}], 0x1, 0x100) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f00000002c0)) r5 = syz_open_procfs(r4, &(0x7f0000000000)='net/vlan/config\x00') r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$batadv(&(0x7f0000000200)='batadv\x00') sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r6, &(0x7f0000000400)={&(0x7f0000000180), 0xc, &(0x7f00000003c0)={&(0x7f00000009c0)=ANY=[@ANYBLOB='`\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="ff0f26bd7000fcdadf250b00000008000300", @ANYRES32, @ANYBLOB="2b003900090000000a000900ffffffffffff0000050033000200000008000300", @ANYRES32, @ANYBLOB="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"], 0x60}, 0x1, 0x0, 0x0, 0x24000001}, 0x4048000) sendmsg$BATADV_CMD_GET_HARDIF(r5, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r7, 0x800, 0x70bd2a, 0x25dfdbfc, {}, [@BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x400c015}, 0x40844) dup2(r0, r1) 13:28:12 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f000e068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 651.736268][T16696] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 651.796961][T16698] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 651.801415][T16696] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 651.806870][T16698] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 651.826698][T16698] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 651.847325][T16698] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 651.863563][T16699] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 651.925554][T16696] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 651.977924][T16699] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 13:28:13 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0011068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:28:13 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 652.072112][T16699] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 652.082020][T16696] EXT4-fs (loop2): corrupt root inode, run e2fsck [ 652.088516][T16696] EXT4-fs (loop2): mount failed [ 652.177008][T16699] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 13:28:13 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RATTACH(r1, &(0x7f00000000c0)={0xffffff8b}, 0x14) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x7ffc, 0x200, 0x7, 0xbe46, 0x401, 0x400}, 0x1c) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6(0xa, 0x1, 0x0) fcntl$dupfd(r3, 0x0, r4) r5 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x46800) write$cgroup_type(r5, &(0x7f0000000200)='threaded\x00', 0x175d900f) poll(&(0x7f0000000000)=[{r5, 0x40}], 0x1, 0x100) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) newfstatat(0xffffffffffffff9c, &(0x7f0000000040)='./bus/file0\x00', &(0x7f0000000100), 0x800) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) dup2(r0, r2) 13:28:13 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0021068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:28:13 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x1480000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 652.480768][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 652.486599][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 652.533898][T16733] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 652.567441][T16733] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 652.590770][T16733] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 652.633566][ T26] kauditd_printk_skb: 15669 callbacks suppressed [ 652.633609][ T26] audit: type=1326 audit(1579440493.723:1596840): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16693 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=1 compat=0 ip=0x414c31 code=0x50000 [ 652.651211][T16733] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 652.674200][ T26] audit: type=1326 audit(1579440493.733:1596879): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16693 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=1 compat=0 ip=0x414c31 code=0x50000 [ 652.817352][ T26] audit: type=1326 audit(1579440493.733:1596880): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16693 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=1 compat=0 ip=0x414c31 code=0x50000 [ 652.895064][T16748] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 652.913687][T16748] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 652.920933][ T26] audit: type=1326 audit(1579440493.733:1596881): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16693 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=1 compat=0 ip=0x414c31 code=0x50000 [ 652.923863][T16748] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 652.946827][ T26] audit: type=1326 audit(1579440493.733:1596882): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16693 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=1 compat=0 ip=0x414c31 code=0x50000 [ 652.978996][ T26] audit: type=1326 audit(1579440493.733:1596883): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16693 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=1 compat=0 ip=0x414c31 code=0x50000 [ 652.982584][T16748] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 653.025138][ T26] audit: type=1326 audit(1579440493.733:1596884): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16693 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=1 compat=0 ip=0x414c31 code=0x50000 [ 653.059054][ T26] audit: type=1326 audit(1579440493.733:1596885): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16693 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=1 compat=0 ip=0x414c31 code=0x50000 [ 653.087929][ T26] audit: type=1326 audit(1579440493.733:1596886): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16693 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=1 compat=0 ip=0x414c31 code=0x50000 [ 653.122443][ T26] audit: type=1326 audit(1579440493.733:1596887): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16693 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=1 compat=0 ip=0x414c31 code=0x50000 13:28:15 executing program 1: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x8ec0, 0x7) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r4, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) 13:28:15 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x438, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:28:15 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0057068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:28:15 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x5000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:28:15 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r1 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r1}], 0x1, 0x100) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) dup2(r0, r1) 13:28:15 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b70200000b000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000030000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VIDIOC_DV_TIMINGS_CAP(r3, 0xc0905664, &(0x7f0000000280)={0x0, 0x0, [], @bt={0x800, 0x800, 0xc1, 0x3, 0x3, 0x10001, 0x0, 0x1}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe, 0xe000000, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x296, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x28) 13:28:15 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='bdev\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f00000002c0), 0x12) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x34d) ioctl$VIDIOC_G_TUNER(r5, 0xc054561d, &(0x7f00000000c0)={0x57, "c0f4c774e9576a3287c9d121a497a9a2b6b43a24aafcafc590deb28a36b3216a", 0x4, 0x80, 0xffffffc0, 0x9, 0x10, 0x4, 0x80000000, 0x4}) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r2, &(0x7f0000000240)={0x0, 0x4, &(0x7f0000002540)=[{0x0}, {0x0}, {&(0x7f0000003800)=""/4100, 0xffffff5f}], 0x3, 0x0, 0x17b, 0x3e8}, 0x180) socket$bt_hidp(0x1f, 0x3, 0x6) write$binfmt_elf64(r2, &(0x7f0000000bc0)=ANY=[@ANYRESHEX, @ANYRES32, @ANYPTR64=&(0x7f0000000ac0)=ANY=[@ANYBLOB="dc9d3f74a43a0d71057c1b77e359e891ebc9be6d698388e17f3056e89224707a", @ANYBLOB="bfc98e8192cb0a9e79f202467c4be532cb8509741d6b35b9407b516de574e75eb6e7707a648644a4648487a557ec9d89ce3c0304e0d899911dc395259c95cc049b413fcc8bb534aee4d921485ca5cf773b0cab00346675446489d0", @ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRES64, @ANYRES64, @ANYRESHEX=0x0, @ANYPTR], @ANYPTR64=&(0x7f0000000440)=ANY=[], @ANYRESHEX=0x0, @ANYRESOCT, @ANYRES64, @ANYRESHEX], @ANYPTR64=&(0x7f0000000700)=ANY=[@ANYRES32, @ANYRES32], @ANYRES64, @ANYRES32, @ANYBLOB="da9191a0e7d50931ff67a36a2b0a4538d83761b40fa899b14158a6e13223b4368cbf26872f561879e9a9990061ff3b43bb44e96ad25eff117365ee216f5ee11947b1081d9570cb7a99c8c0280b81a5b3c9d726cf933d9365fae704b66d82fd415d51e52ceb15eeb7ba2a15e37d0b1a7c5b2178ae665a548750f99fbc27893a21fd3a2ca9062b9b1ed13f6da70fc2e08601ee35a7fde01f98bf78bccba4cc86834bc510de0c8189a068046b73f847db8f7da84bc4dae1e2be3647310e0f1a8d", @ANYBLOB="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"], 0x100000475) [ 654.800852][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 654.806649][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 654.827070][T16776] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 654.842950][T16785] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 13:28:16 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0060068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 654.900085][T16776] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 654.924809][T16785] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 654.990499][T16776] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 655.037545][T16785] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 655.093078][T16776] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 655.119206][T16785] EXT4-fs (loop2): corrupt root inode, run e2fsck [ 655.169286][T16785] EXT4-fs (loop2): mount failed 13:28:16 executing program 0: accept4$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0xffffffffffffffee, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000180)=0xb) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f0000000240)={r5}, 0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000)={r5, 0x8cd}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000100)={r6, @in={{0x2, 0x4e21, @loopback}}}, 0x84) poll(&(0x7f0000000040)=[{r2}], 0x1, 0x100) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) dup2(r1, r2) 13:28:16 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002fb07d068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:28:16 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x6000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:28:16 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x500, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 655.600764][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 655.606553][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 655.834783][T16821] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 655.858236][T16825] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 655.868222][T16825] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 655.889067][T16825] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 655.911411][T16821] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 655.928318][T16825] EXT4-fs (loop2): corrupt root inode, run e2fsck [ 655.935852][T16825] EXT4-fs (loop2): mount failed [ 655.951610][T16821] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 655.962174][T16821] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 656.096886][T16840] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 656.106753][T16840] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 656.116669][T16840] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 656.136948][T16840] EXT4-fs (loop2): corrupt root inode, run e2fsck [ 656.147158][T16840] EXT4-fs (loop2): mount failed [ 657.640796][ T26] kauditd_printk_skb: 46262 callbacks suppressed [ 657.640819][ T26] audit: type=1326 audit(1579440498.733:1643149): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16780 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=1 compat=0 ip=0x414c31 code=0x50000 [ 657.670052][ T26] audit: type=1326 audit(1579440498.733:1643150): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16780 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 657.692742][ T26] audit: type=1326 audit(1579440498.743:1643151): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16780 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 657.715675][ T26] audit: type=1326 audit(1579440498.743:1643152): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16780 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 657.738312][ T26] audit: type=1326 audit(1579440498.743:1643153): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16780 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 657.760835][ T26] audit: type=1326 audit(1579440498.743:1643154): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16780 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 657.783388][ T26] audit: type=1326 audit(1579440498.743:1643155): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16780 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 657.806101][ T26] audit: type=1326 audit(1579440498.743:1643156): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16780 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 13:28:19 executing program 1: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x8ec0, 0xa) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r4, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) 13:28:19 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f05ac068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:28:19 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x438, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:28:19 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x7000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:28:19 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r1 = socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind(r2, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r3, {0x2, 0x4e20, @empty}, 0x0, 0x4, 0x1}}, 0x80) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') unshare(0x40000000) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x0) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, 0x0, 0x40000) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(r4, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x210000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x10, 0x70bd2c, 0x25dfdbff, {0x1}, [@CTA_MARK_MASK={0x8, 0x15, 0x2}, @CTA_MARK={0x8, 0x8, 0xfffeffff}]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x40804) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000100)) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r5, 0x29, 0x40, &(0x7f0000000180)={'filter\x00', 0x0, [0x0, 0x0, 0x0, 0x0, 0x1000000]}, &(0x7f0000000100)=0x54) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000200)) getsockopt$ARPT_SO_GET_INFO(r5, 0x0, 0x60, &(0x7f0000000400)={'filter\x00'}, &(0x7f0000000480)=0x44) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) modify_ldt$write(0x1, 0x0, 0x0) poll(&(0x7f0000000040)=[{r1}], 0x1, 0x100) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) dup2(r0, r1) 13:28:19 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x600, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 657.829236][ T26] audit: type=1326 audit(1579440498.743:1643157): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16780 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 657.851952][ T26] audit: type=1326 audit(1579440498.743:1643158): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16780 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 13:28:19 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f7db0068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 658.219374][T16871] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 658.230750][T16871] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 658.239285][T16872] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 658.271937][T16871] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 658.290985][T16872] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 658.318799][T16871] EXT4-fs (loop2): corrupt root inode, run e2fsck [ 658.330190][T16871] EXT4-fs (loop2): mount failed [ 658.344301][T16874] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 658.357314][T16859] IPVS: ftp: loaded support on port[0] = 21 [ 658.360771][T16872] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 658.374540][T16872] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 658.400783][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 658.406572][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 658.443078][T16874] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 658.481292][T16874] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock 13:28:19 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x8000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:28:19 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f05c4068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 658.506834][T16874] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 658.535024][T16874] EXT4-fs (loop3): mount failed [ 658.730774][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 658.736574][ C1] protocol 88fb is buggy, dev hsr_slave_1 13:28:19 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x700, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:28:20 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0002068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:28:20 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x600, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 658.970760][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 658.976546][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 659.140180][T16902] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 659.217636][T16902] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 659.242163][T16902] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 659.270225][T16902] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 659.349849][T16915] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 659.369327][T16917] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 659.390028][T16917] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 659.428372][T16915] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 659.452464][T16917] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 659.463805][T16915] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 659.509560][T16917] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 659.516485][T16915] EXT4-fs (loop2): corrupt root inode, run e2fsck [ 659.522953][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 659.522984][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 659.528536][T16873] IPVS: ftp: loaded support on port[0] = 21 [ 659.560519][T16917] EXT4-fs (loop3): mount failed [ 659.566124][T16915] EXT4-fs (loop2): mount failed [ 659.760755][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 659.766556][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 660.301965][ T8002] tipc: TX() has been purged, node left! 13:28:22 executing program 1: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x8ec0, 0xe) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r4, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) 13:28:22 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0003068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:28:22 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x9000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:28:22 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x8000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:28:22 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x900, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:28:22 executing program 0: openat$nvram(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nvram\x00', 0x10000, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r1 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RATTACH(r1, &(0x7f00000000c0)={0xffffff8b}, 0x14) ioctl$SNDCTL_DSP_GETTRIGGER(r1, 0x80045010, &(0x7f0000000000)) r2 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r2}], 0x1, 0x100) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup2(r0, r2) 13:28:22 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0004068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 661.300207][T16967] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 661.345399][T16966] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 661.381237][T16970] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 661.387377][T16967] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 661.427264][T16966] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 661.433713][T16970] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 661.458022][T16970] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock 13:28:22 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0007068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 661.473901][T16967] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 661.480296][T16970] EXT4-fs (loop2): corrupt root inode, run e2fsck [ 661.490513][T16970] EXT4-fs (loop2): mount failed [ 661.550423][T16967] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 661.579270][T16966] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 661.774262][T16966] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 13:28:23 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r1 = socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind(r2, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r3, {0x2, 0x4e20, @empty}, 0x0, 0x4, 0x1}}, 0x80) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') unshare(0x40000000) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x0) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, 0x0, 0x40000) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(r4, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x210000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x10, 0x70bd2c, 0x25dfdbff, {0x1}, [@CTA_MARK_MASK={0x8, 0x15, 0x2}, @CTA_MARK={0x8, 0x8, 0xfffeffff}]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x40804) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000100)) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r5, 0x29, 0x40, &(0x7f0000000180)={'filter\x00', 0x0, [0x0, 0x0, 0x0, 0x0, 0x1000000]}, &(0x7f0000000100)=0x54) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000200)) getsockopt$ARPT_SO_GET_INFO(r5, 0x0, 0x60, &(0x7f0000000400)={'filter\x00'}, &(0x7f0000000480)=0x44) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) modify_ldt$write(0x1, 0x0, 0x0) poll(&(0x7f0000000040)=[{r1}], 0x1, 0x100) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) dup2(r0, r1) 13:28:23 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xa00, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:28:23 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0009068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 662.203609][T17001] IPVS: ftp: loaded support on port[0] = 21 [ 662.221909][T16997] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 662.231890][T16997] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 662.262205][T16997] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 662.302727][T16997] EXT4-fs (loop2): corrupt root inode, run e2fsck [ 662.333235][T16997] EXT4-fs (loop2): mount failed 13:28:23 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xa000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 662.651353][ T26] kauditd_printk_skb: 19125 callbacks suppressed [ 662.651375][ T26] audit: type=1326 audit(1579440503.753:1662284): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16962 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=1 compat=0 ip=0x414c31 code=0x50000 [ 662.799491][ T26] audit: type=1326 audit(1579440503.753:1662285): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16962 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 662.886280][T17015] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 662.900394][ T26] audit: type=1326 audit(1579440503.793:1662286): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16962 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 662.974467][T17015] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 662.999635][ T26] audit: type=1326 audit(1579440503.793:1662287): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16962 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 663.070826][T17015] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 663.111239][T17015] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 663.206491][ T26] audit: type=1326 audit(1579440503.793:1662288): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16962 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 663.430812][ T26] audit: type=1326 audit(1579440503.793:1662289): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16962 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 663.505342][ T26] audit: type=1326 audit(1579440503.793:1662290): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16962 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 663.566804][ T26] audit: type=1326 audit(1579440503.793:1662291): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16962 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 663.627641][ T26] audit: type=1326 audit(1579440503.793:1662292): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16962 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 663.681047][ C1] net_ratelimit: 6 callbacks suppressed [ 663.681069][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 663.692786][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 663.719760][ T26] audit: type=1326 audit(1579440503.793:1662293): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16962 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 663.820810][ T8002] tipc: TX() has been purged, node left! [ 663.920989][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 663.927117][ C0] protocol 88fb is buggy, dev hsr_slave_1 13:28:25 executing program 1: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x8ec0, 0x10) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r4, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) 13:28:25 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f000a068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:28:25 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xc00, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:28:25 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xc000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:28:25 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f000e068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 664.548150][T17043] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 664.609160][T17045] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 664.610823][T17043] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 664.640749][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 664.646542][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 664.655060][T17043] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 664.666545][T17043] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 664.707051][T17045] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 664.780819][T17045] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 664.826160][T17045] EXT4-fs (loop2): corrupt root inode, run e2fsck [ 664.835090][T17045] EXT4-fs (loop2): mount failed [ 665.059292][T17045] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 665.108628][T17045] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 665.166977][T17045] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 665.223795][T17045] EXT4-fs: failed to create workqueue [ 665.243495][T17045] EXT4-fs (loop2): mount failed [ 666.271600][T17072] IPVS: ftp: loaded support on port[0] = 21 [ 666.484099][T17072] chnl_net:caif_netlink_parms(): no params data found [ 666.519761][T17072] bridge0: port 1(bridge_slave_0) entered blocking state [ 666.527436][T17072] bridge0: port 1(bridge_slave_0) entered disabled state [ 666.535718][T17072] device bridge_slave_0 entered promiscuous mode [ 666.544481][T17072] bridge0: port 2(bridge_slave_1) entered blocking state [ 666.551982][T17072] bridge0: port 2(bridge_slave_1) entered disabled state [ 666.559821][T17072] device bridge_slave_1 entered promiscuous mode [ 666.580211][T17072] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 666.591383][T17072] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 666.722014][T17072] team0: Port device team_slave_0 added [ 666.732020][ T8002] tipc: TX() has been purged, node left! [ 666.740301][ T8002] tipc: TX() has been purged, node left! [ 666.773007][T17072] team0: Port device team_slave_1 added [ 666.825358][T17072] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 666.860827][T17072] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 666.975975][T17072] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 667.209687][T17072] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 667.221252][T17072] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 667.307511][T17072] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 667.503257][T17072] device hsr_slave_0 entered promiscuous mode [ 667.543967][T17072] device hsr_slave_1 entered promiscuous mode [ 667.590778][T17072] debugfs: Directory 'hsr0' with parent '/' already present! [ 668.136867][T17072] 8021q: adding VLAN 0 to HW filter on device bond0 [ 668.267039][T17072] 8021q: adding VLAN 0 to HW filter on device team0 [ 668.301357][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 668.309444][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 668.435197][T17070] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 668.447497][T17070] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 668.456657][T17070] bridge0: port 1(bridge_slave_0) entered blocking state [ 668.463727][T17070] bridge0: port 1(bridge_slave_0) entered forwarding state [ 668.476643][T17070] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 668.485401][T17070] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 668.493943][T17070] bridge0: port 2(bridge_slave_1) entered blocking state [ 668.500986][T17070] bridge0: port 2(bridge_slave_1) entered forwarding state [ 668.508850][T17070] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 668.518111][T17070] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 668.527115][T17070] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 668.535692][T17070] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 668.576784][T17070] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 668.584758][T17070] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 668.592992][T17070] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 668.601515][T17070] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 668.615685][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 668.624046][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 668.633385][ T8002] device veth1 left promiscuous mode [ 668.638850][ T8002] bridge3: port 1(veth1) entered disabled state [ 668.684666][ T8002] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 668.692135][ T8002] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 668.699848][ T8002] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 668.707540][ T8002] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 668.715371][ T8002] device bridge_slave_1 left promiscuous mode [ 668.721702][ T8002] bridge0: port 2(bridge_slave_1) entered disabled state [ 668.771995][ T8002] device bridge_slave_0 left promiscuous mode [ 668.778175][ T8002] bridge0: port 1(bridge_slave_0) entered disabled state [ 668.823095][ T8002] device veth1_macvtap left promiscuous mode [ 668.829551][ T8002] device veth0_macvtap left promiscuous mode [ 668.835709][ T8002] device veth1_vlan left promiscuous mode [ 668.841475][ T8002] device veth0_vlan left promiscuous mode [ 670.161205][ T8002] device hsr_slave_0 left promiscuous mode [ 670.220852][ T8002] device hsr_slave_1 left promiscuous mode [ 670.274486][ T8002] team0 (unregistering): Port device team_slave_1 removed [ 670.285351][ T8002] team0 (unregistering): Port device team_slave_0 removed [ 670.295379][ T8002] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 670.334732][ T8002] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 670.415078][ T8002] bond0 (unregistering): Released all slaves [ 670.517129][T17072] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 670.527993][T17072] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 670.539067][T16949] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 670.547879][T16949] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 670.566907][T16949] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 670.574827][T16949] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 670.594710][T17072] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 670.727368][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 670.736841][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 670.753886][T17072] device veth0_vlan entered promiscuous mode [ 670.765455][T16949] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 670.774317][T16949] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 670.790178][T17072] device veth1_vlan entered promiscuous mode [ 670.798689][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 670.811700][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 670.819500][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 670.840451][T17072] device veth0_macvtap entered promiscuous mode [ 670.852891][T16949] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 670.865128][T16949] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 670.875061][T16949] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 670.889374][T17072] device veth1_macvtap entered promiscuous mode [ 670.897790][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 670.906526][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 670.920216][T17072] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 670.932356][T17072] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 670.942650][T17072] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 670.953819][T17072] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 670.964182][T17072] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 670.975013][T17072] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 670.985166][T17072] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 670.996123][T17072] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 671.006466][T17072] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 671.017351][T17072] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 671.029058][T17072] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 671.038179][T16949] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 671.047647][T16949] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 671.057997][T17072] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 671.070486][T17072] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 671.081081][T17072] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 671.092100][T17072] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 671.103000][T17072] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 671.113949][T17072] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 671.124068][T17072] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 671.134762][T17072] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 671.144996][T17072] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 671.155854][T17072] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 671.166739][T17072] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 671.177174][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 671.187240][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 671.450764][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 671.456553][ C1] protocol 88fb is buggy, dev hsr_slave_1 13:28:32 executing program 0: r0 = socket(0x29, 0x6, 0xff) ioctl$SIOCX25SCUDMATCHLEN(r0, 0x89e7, &(0x7f0000000000)={0x76}) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r2 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r2}], 0x1, 0x100) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x9450c0, 0x0) ioctl$KVM_GET_REGS(r4, 0x8090ae81, &(0x7f0000000100)) r5 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) dup2(r1, r2) 13:28:32 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x10040000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:28:32 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0011068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:28:32 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xa000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:28:32 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x1004, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:28:32 executing program 1: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x8ec0, 0x48) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r4, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) [ 672.000759][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 672.006649][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 672.037326][ T26] kauditd_printk_skb: 16800 callbacks suppressed [ 672.037349][ T26] audit: type=1326 audit(1579440513.133:1679094): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17118 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45df9a code=0x50000 13:28:33 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0021068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 672.136239][ T26] audit: type=1326 audit(1579440513.133:1679095): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17118 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 672.172319][T17123] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 672.207595][T17123] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 672.224192][T17123] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 672.240764][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 672.246670][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 672.270841][T17128] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 672.344238][T17123] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 672.374071][T17128] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 672.409534][T17128] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock 13:28:33 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0057068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 672.436972][ T26] audit: type=1326 audit(1579440513.133:1679096): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17118 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 672.520753][ T8002] tipc: TX() has been purged, node left! 13:28:33 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r1 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r1}], 0x1, 0x100) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f00000002c0)) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f00000002c0)) r6 = getpid() sched_setscheduler(r6, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000300)={0x2d96fae7d93ca78c, &(0x7f0000000000)=0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100), {0x2b}, &(0x7f0000000140)=""/154, 0x9a, &(0x7f0000000200)=""/141, &(0x7f00000002c0)=[r4, 0x0, r5, 0x0, 0xffffffffffffffff, r6], 0x6}, 0x50) flock(r7, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup2(r0, r1) [ 672.574617][T17128] EXT4-fs (loop2): corrupt root inode, run e2fsck [ 672.645173][T17128] EXT4-fs (loop2): mount failed [ 672.704252][ T26] audit: type=1326 audit(1579440513.133:1679097): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17118 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 13:28:33 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x20000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 672.839507][ T26] audit: type=1326 audit(1579440513.133:1679098): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17118 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 672.960763][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 672.966810][ C0] protocol 88fb is buggy, dev hsr_slave_1 13:28:34 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x1020, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 673.040896][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 673.046703][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 673.184156][ T26] audit: type=1326 audit(1579440513.133:1679099): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17118 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 13:28:34 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0060068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 673.384368][T17186] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 673.405946][ T26] audit: type=1326 audit(1579440513.133:1679100): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17118 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 673.538713][T17186] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 673.580795][T17186] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 673.670161][ T26] audit: type=1326 audit(1579440513.133:1679101): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17118 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 673.698471][T17186] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 673.708553][T17195] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 673.775679][T17195] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 673.790784][T17195] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 673.856721][T17195] EXT4-fs (loop2): corrupt root inode, run e2fsck [ 673.870391][ T26] audit: type=1326 audit(1579440513.133:1679102): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17118 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 673.900886][T17195] EXT4-fs (loop2): mount failed 13:28:35 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r1 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r1}], 0x1, 0x100) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) read$FUSE(r4, &(0x7f0000007380), 0x1000) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket$inet6(0xa, 0x1, 0x0) fcntl$dupfd(r5, 0x0, r6) r7 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RATTACH(r7, &(0x7f00000000c0)={0xffffff8b}, 0x14) r8 = accept$inet6(r3, 0x0, &(0x7f0000000000)) dup2(r5, r8) 13:28:35 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x20100000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:28:35 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068902ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 674.178947][ T26] audit: type=1326 audit(1579440513.133:1679103): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17118 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 674.421412][T17217] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 674.504197][T17217] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 674.606081][T17217] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 674.731232][T17217] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 675.391219][ T8002] device veth1 left promiscuous mode [ 675.396771][ T8002] bridge1: port 1(veth1) entered disabled state [ 675.453508][ T8002] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 675.481154][ T8002] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 675.512439][ T8002] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 675.541138][ T8002] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 675.563788][ T8002] device bridge_slave_1 left promiscuous mode [ 675.570344][ T8002] bridge0: port 2(bridge_slave_1) entered disabled state [ 675.691391][ T8002] device bridge_slave_0 left promiscuous mode [ 675.697816][ T8002] bridge0: port 1(bridge_slave_0) entered disabled state [ 675.794337][ T8002] device veth1_macvtap left promiscuous mode [ 675.800997][ T8002] device veth0_macvtap left promiscuous mode [ 675.807051][ T8002] device veth1_vlan left promiscuous mode [ 675.840672][ T8002] device veth0_vlan left promiscuous mode [ 676.641072][ T0] NOHZ: local_softirq_pending 08 [ 677.131340][ T8002] device hsr_slave_0 left promiscuous mode [ 677.170887][ T8002] device hsr_slave_1 left promiscuous mode [ 677.222534][ T8002] team0 (unregistering): Port device team_slave_1 removed [ 677.233347][ T8002] team0 (unregistering): Port device team_slave_0 removed [ 677.243175][ T8002] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 677.281284][ T0] NOHZ: local_softirq_pending 08 [ 677.303521][ T8002] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 677.362344][ T8002] bond0 (unregistering): Released all slaves [ 677.457468][T17250] IPVS: ftp: loaded support on port[0] = 21 [ 677.517599][T17250] chnl_net:caif_netlink_parms(): no params data found [ 677.546239][T17250] bridge0: port 1(bridge_slave_0) entered blocking state [ 677.553918][T17250] bridge0: port 1(bridge_slave_0) entered disabled state [ 677.562280][T17250] device bridge_slave_0 entered promiscuous mode [ 677.569667][T17250] bridge0: port 2(bridge_slave_1) entered blocking state [ 677.576775][T17250] bridge0: port 2(bridge_slave_1) entered disabled state [ 677.584509][T17250] device bridge_slave_1 entered promiscuous mode [ 677.602751][T17250] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 677.672288][T17250] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 677.691628][T17250] team0: Port device team_slave_0 added [ 677.698533][T17250] team0: Port device team_slave_1 added [ 677.714824][T17250] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 677.722559][T17250] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 677.748881][T17250] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 677.765230][T17250] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 677.772757][T17250] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 677.802340][T17250] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 677.873398][T17250] device hsr_slave_0 entered promiscuous mode [ 677.911693][T17250] device hsr_slave_1 entered promiscuous mode [ 678.007864][T17250] bridge0: port 2(bridge_slave_1) entered blocking state [ 678.015048][T17250] bridge0: port 2(bridge_slave_1) entered forwarding state [ 678.022358][T17250] bridge0: port 1(bridge_slave_0) entered blocking state [ 678.029383][T17250] bridge0: port 1(bridge_slave_0) entered forwarding state [ 678.074668][T17250] 8021q: adding VLAN 0 to HW filter on device bond0 [ 678.087996][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 678.098701][ T2411] bridge0: port 1(bridge_slave_0) entered disabled state [ 678.117832][ T2411] bridge0: port 2(bridge_slave_1) entered disabled state [ 678.132060][T17250] 8021q: adding VLAN 0 to HW filter on device team0 [ 678.153051][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 678.161835][ T7993] bridge0: port 1(bridge_slave_0) entered blocking state [ 678.169305][ T7993] bridge0: port 1(bridge_slave_0) entered forwarding state [ 678.193942][ T7981] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 678.202650][ T7981] bridge0: port 2(bridge_slave_1) entered blocking state [ 678.209865][ T7981] bridge0: port 2(bridge_slave_1) entered forwarding state [ 678.219042][ T7981] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 678.228481][ T7981] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 678.237782][ T7981] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 678.246949][ T7981] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 678.258784][T17250] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 678.270217][T17250] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 678.278375][T17070] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 678.293928][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 678.301975][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 678.312944][T17250] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 678.373476][ T7981] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 678.387834][T17250] device veth0_vlan entered promiscuous mode [ 678.395217][ T7981] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 678.404801][ T7981] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 678.412838][ T7981] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 678.426123][T17250] device veth1_vlan entered promiscuous mode [ 678.441666][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 678.449829][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 678.458691][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 678.469541][T17250] device veth0_macvtap entered promiscuous mode [ 678.480662][T17250] device veth1_macvtap entered promiscuous mode [ 678.493987][T17250] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 678.504792][T17250] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 678.515246][T17250] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 678.525908][T17250] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 678.535969][T17250] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 678.547625][T17250] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 678.557595][T17250] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 678.569436][T17250] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 678.579890][T17250] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 678.590431][T17250] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 678.601702][T17250] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 678.611551][T17070] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 678.620382][T17070] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 678.629840][T17250] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 678.642097][T17250] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 678.653447][T17250] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 678.665094][T17250] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 678.677687][T17250] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 678.689217][T17250] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 678.699121][T17250] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 678.710073][T17250] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 678.720503][T17250] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 678.731508][T17250] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 678.742665][T17250] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 678.750429][T16052] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 678.759957][T16052] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 678.908096][T17261] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 678.918485][T17261] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 678.928861][T17261] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 678.950490][T17261] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 13:28:40 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x20100000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:28:40 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:28:40 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r1 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r1}], 0x1, 0x100) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) r4 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46800) write$cgroup_type(r4, &(0x7f0000000200)='threaded\x00', 0x175d900f) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r4, 0x8982, &(0x7f0000000000)={0x0, 'caif0\x00', {0x1}, 0x4a3}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup2(r0, r1) 13:28:40 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068904ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:28:40 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x23000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:28:40 executing program 1: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x8ec0, 0x4c) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r4, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) [ 679.075538][ T26] kauditd_printk_skb: 1973 callbacks suppressed [ 679.075560][ T26] audit: type=1326 audit(1579440520.173:1681077): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17273 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45df9a code=0x50000 [ 679.106756][ T26] audit: type=1326 audit(1579440520.173:1681078): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17273 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 679.132592][ T26] audit: type=1326 audit(1579440520.173:1681079): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17273 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 679.193458][ T26] audit: type=1326 audit(1579440520.173:1681080): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17273 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 679.216162][ C0] net_ratelimit: 6 callbacks suppressed [ 679.216172][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 679.216193][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 679.239983][ T26] audit: type=1326 audit(1579440520.173:1681081): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17273 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 679.280769][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 679.286565][ C0] protocol 88fb is buggy, dev hsr_slave_1 13:28:40 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14142be00000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 679.295985][ T26] audit: type=1326 audit(1579440520.173:1681082): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17273 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 679.319559][ T26] audit: type=1326 audit(1579440520.173:1681083): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17273 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 679.346941][ T26] audit: type=1326 audit(1579440520.173:1681084): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17273 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 679.370164][ T26] audit: type=1326 audit(1579440520.173:1681085): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17273 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 679.394419][ T26] audit: type=1326 audit(1579440520.173:1681086): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17273 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 679.453677][T17283] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 679.473951][T17282] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 679.494503][T17283] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 679.497805][T17282] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 679.519373][T17282] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 679.529207][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 679.529232][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 679.545721][T17283] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 679.564022][T17282] EXT4-fs (loop2): corrupt root inode, run e2fsck [ 679.579105][T17282] EXT4-fs (loop2): mount failed [ 679.648763][T17283] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 679.773817][T17293] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 13:28:41 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de00000013c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 679.968814][T17293] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 13:28:41 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2d000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:28:41 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2010, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 680.033079][T17293] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock 13:28:41 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r1 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r1}], 0x1, 0x100) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$inet6(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r8, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8}]}, 0x1c}}, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) r10 = socket$inet6(0xa, 0x1, 0x0) fcntl$dupfd(r9, 0x0, r10) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r10, 0x8933, &(0x7f0000000080)={'batadv_slave_0\x00', 0x0}) r12 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r12, 0x4, 0x46800) write$cgroup_type(r12, &(0x7f0000000200)='threaded\x00', 0x175d900f) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r12, 0x8933, &(0x7f0000002c00)={'batadv0\x00', 0x0}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r15 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r14, 0x8933, &(0x7f0000000300)={'veth1\x00', 0x0}) r17 = socket$nl_route(0x10, 0x3, 0x0) r18 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r18, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r18, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r17, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r19}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route(r15, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000002700)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r16}, [@IFLA_MASTER={0x8, 0xa, r19}]}, 0x28}}, 0x0) sendmsg$NL80211_CMD_GET_MESH_CONFIG(r6, &(0x7f0000002d00)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000002cc0)={&(0x7f0000002c40)={0x68, r8, 0x200, 0x70bd2d, 0x25dfdbff, {}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x81, 0x2}}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x4}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r11}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r13}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x7, 0x2}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x1}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x40, 0x1}}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r19}]}, 0x68}, 0x1, 0x0, 0x0, 0xaa9ff4e89c1d560c}, 0x4004) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup2(r0, r1) [ 680.111386][T17293] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 13:28:41 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x20100000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:28:41 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140d070000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 680.320913][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 680.326815][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 680.414141][T17334] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 680.435112][T17334] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 680.452185][T17334] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 680.467405][T17330] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 680.478259][T17330] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 680.489143][T17334] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 680.500148][T17330] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock 13:28:41 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de00200093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 680.523190][T17330] EXT4-fs (loop2): corrupt root inode, run e2fsck [ 680.530015][T17330] EXT4-fs (loop2): mount failed [ 680.560813][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 680.566683][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 680.741097][T17354] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 680.779984][T17336] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 13:28:41 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r1 = socket$packet(0x11, 0x3, 0x300) socket(0x21, 0x5, 0x2) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6(0xa, 0x1, 0x0) fcntl$dupfd(r2, 0x0, r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$inet6(0xa, 0x1, 0x0) fcntl$dupfd(r4, 0x0, r5) poll(&(0x7f0000000000)=[{r1}, {r5, 0x229}, {r2, 0xc0}], 0x3, 0x100) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) dup2(r0, r1) r7 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) read$FUSE(r7, &(0x7f0000007380), 0x1000) ioctl$RTC_WIE_ON(r7, 0x700f) [ 680.799536][T17336] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 680.810903][T17336] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 680.818806][T17354] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 680.830784][T17354] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock 13:28:42 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x37040000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 680.853226][T17354] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 680.904346][T17336] EXT4-fs: failed to create workqueue [ 680.957602][T17336] EXT4-fs (loop2): mount failed 13:28:42 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2d000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 681.231668][T17369] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 681.259306][T17369] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 681.284206][T17369] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 681.317908][T17369] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 681.527021][T17387] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 681.546982][T17387] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 681.564506][T17387] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 681.624771][T17387] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 13:28:43 executing program 1: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x8ec0, 0x68) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r4, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) 13:28:43 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de00300093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:28:43 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2300, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:28:43 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r1 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r1}], 0x1, 0x100) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) read$snddsp(r3, &(0x7f0000000100)=""/127, 0x7f) dup2(r0, r1) r4 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) read$FUSE(r4, &(0x7f0000007380), 0x1000) setsockopt$inet6_IPV6_ADDRFORM(r4, 0x29, 0x1, &(0x7f0000000000), 0x4) 13:28:43 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x38040000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:28:43 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x37040000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:28:43 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de00400093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 682.402296][T17430] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 682.412915][T17426] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 13:28:43 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de00700093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 682.450655][T17433] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 682.510360][T17430] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 682.525900][T17426] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 682.549149][T17433] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 682.577199][T17430] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 682.598925][T17426] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock 13:28:43 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de00900093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 682.628707][T17426] EXT4-fs (loop2): corrupt root inode, run e2fsck [ 682.638742][T17426] EXT4-fs (loop2): mount failed [ 682.690786][T17433] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 682.706890][T17430] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 682.731412][T17433] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 13:28:44 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de00a00093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:28:44 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r1 = socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind(r2, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r3, {0x2, 0x4e20, @empty}, 0x0, 0x4, 0x1}}, 0x80) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') unshare(0x40000000) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x0) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, 0x0, 0x40000) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(r4, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x210000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x10, 0x70bd2c, 0x25dfdbff, {0x1}, [@CTA_MARK_MASK={0x8, 0x15, 0x2}, @CTA_MARK={0x8, 0x8, 0xfffeffff}]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x40804) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000100)) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r5, 0x29, 0x40, &(0x7f0000000180)={'filter\x00', 0x0, [0x0, 0x0, 0x0, 0x0, 0x1000000]}, &(0x7f0000000100)=0x54) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000200)) getsockopt$ARPT_SO_GET_INFO(r5, 0x0, 0x60, &(0x7f0000000400)={'filter\x00'}, &(0x7f0000000480)=0x44) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) modify_ldt$write(0x1, 0x0, 0x0) poll(&(0x7f0000000040)=[{r1}], 0x1, 0x100) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) dup2(r0, r1) 13:28:44 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2d00, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 683.343798][T17475] IPVS: ftp: loaded support on port[0] = 21 [ 683.434801][T17479] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 683.465184][T17479] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 683.507695][T17479] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 683.543218][T17479] EXT4-fs (loop2): corrupt root inode, run e2fsck [ 683.570042][T17479] EXT4-fs (loop2): mount failed [ 683.694481][T17488] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 683.739234][T17488] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 683.790094][T17488] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 683.839192][T17488] EXT4-fs: failed to create workqueue [ 683.878578][T17488] EXT4-fs (loop2): mount failed [ 684.080964][ T26] kauditd_printk_skb: 15007 callbacks suppressed [ 684.081004][ T26] audit: type=1326 audit(1579440525.173:1696095): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17427 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 684.111545][ T26] audit: type=1326 audit(1579440525.173:1696058): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17427 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=1 compat=0 ip=0x414c31 code=0x50000 [ 684.134357][ T26] audit: type=1326 audit(1579440525.183:1696096): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17427 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=1 compat=0 ip=0x414c31 code=0x50000 [ 684.157590][ T26] audit: type=1326 audit(1579440525.183:1696097): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17427 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=1 compat=0 ip=0x414c31 code=0x50000 [ 684.180261][ T26] audit: type=1326 audit(1579440525.183:1696098): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17427 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=1 compat=0 ip=0x414c31 code=0x50000 [ 684.203107][ T26] audit: type=1326 audit(1579440525.183:1696099): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17427 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=1 compat=0 ip=0x414c31 code=0x50000 [ 684.225515][ T26] audit: type=1326 audit(1579440525.183:1696100): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17427 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=1 compat=0 ip=0x414c31 code=0x50000 [ 684.248856][ T26] audit: type=1326 audit(1579440525.183:1696101): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17427 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=1 compat=0 ip=0x414c31 code=0x50000 [ 684.271665][ T26] audit: type=1326 audit(1579440525.183:1696102): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17427 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=1 compat=0 ip=0x414c31 code=0x50000 [ 684.295286][ T26] audit: type=1326 audit(1579440525.183:1696103): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17427 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=1 compat=0 ip=0x414c31 code=0x50000 [ 684.430847][ T8002] tipc: TX() has been purged, node left! 13:28:46 executing program 1: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x8ec0, 0x6c) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r4, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) 13:28:46 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x3f000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:28:46 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de00e00093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:28:46 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req={0xc0000000, 0xffffffff, 0x80, 0x5}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x46800) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0x175d900f) connect$vsock_stream(r2, &(0x7f0000000400)={0x28, 0x0, 0x2711}, 0x10) poll(&(0x7f0000000040)=[{r1}], 0x1, 0x100) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000440)='/dev/bsg\x00', 0x80, 0x0) getsockopt$inet_sctp_SCTP_NODELAY(r3, 0x84, 0x3, &(0x7f0000000480), &(0x7f00000004c0)=0x4) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000180)={0x9c0000, 0x2, 0x2, 0xffffffffffffffff, 0x0, &(0x7f0000000140)={0x990a65, 0x10001, [], @value64=0x4}}) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r5, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="010000000000000000000900000030000300060007004e240000080001000000000014000200697036ff0700000000000000000000000800038100000000"], 0x44}}, 0x0) sendmsg$IPVS_CMD_SET_INFO(r4, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, r6, 0x10, 0x70bd27, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x2}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'netdevsim0\x00'}]}, @IPVS_CMD_ATTR_DAEMON={0x4}]}, 0x48}}, 0x440d1) r7 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0x9c34f80f147afde2, 0x0) getsockopt$XDP_STATISTICS(r7, 0x11b, 0x7, &(0x7f0000000080), &(0x7f0000000100)=0x18) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) dup2(r0, r1) 13:28:46 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x3804, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:28:46 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r1 = socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind(r2, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r3, {0x2, 0x4e20, @empty}, 0x0, 0x4, 0x1}}, 0x80) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') unshare(0x40000000) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x0) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, 0x0, 0x40000) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(r4, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x210000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x1, 0x10, 0x70bd2c, 0x25dfdbff, {0x1}, [@CTA_MARK_MASK={0x8, 0x15, 0x2}, @CTA_MARK={0x8, 0x8, 0xfffeffff}]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x40804) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000100)) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r5, 0x29, 0x40, &(0x7f0000000180)={'filter\x00', 0x0, [0x0, 0x0, 0x0, 0x0, 0x1000000]}, &(0x7f0000000100)=0x54) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000200)) getsockopt$ARPT_SO_GET_INFO(r5, 0x0, 0x60, &(0x7f0000000400)={'filter\x00'}, &(0x7f0000000480)=0x44) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) modify_ldt$write(0x1, 0x0, 0x0) poll(&(0x7f0000000040)=[{r1}], 0x1, 0x100) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) dup2(r0, r1) [ 685.440756][ C0] net_ratelimit: 12 callbacks suppressed [ 685.440766][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 685.452555][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 685.511621][T17503] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 685.520754][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 685.527269][ C0] protocol 88fb is buggy, dev hsr_slave_1 13:28:46 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de01100093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 685.605358][T17503] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 685.625101][T17513] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 685.634251][T17503] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 685.638216][T17513] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 685.685280][T17503] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 685.692596][T17513] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 685.760755][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 685.766590][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 685.795403][T17513] EXT4-fs (loop2): corrupt root inode, run e2fsck [ 685.831833][T17513] EXT4-fs (loop2): mount failed 13:28:47 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x40000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:28:47 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer\x00', 0x80, 0x0) connect$rose(r0, &(0x7f0000000240)=@full={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, 0x4, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x40) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r2 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r2}], 0x1, 0x100) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket$inet6(0xa, 0x1, 0x0) fcntl$dupfd(r5, 0x0, r6) ioctl$sock_SIOCADDRT(r6, 0x890b, &(0x7f0000000140)={0x0, @llc={0x1a, 0x0, 0x20, 0x6, 0x83, 0x0, @local}, @rc={0x1f, {0x3, 0x7, 0x0, 0x1, 0x45, 0x3}, 0x57}, @phonet={0x23, 0x39, 0x7, 0x2}, 0x8, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000100)='vlan0\x00', 0x100, 0x6}) r7 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) read$FUSE(r7, &(0x7f0000007380), 0x1000) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r7, 0x84, 0x76, &(0x7f0000000000)={0x0, 0x1f}, &(0x7f0000000080)=0x8) dup2(r1, r2) syz_open_dev$amidi(&(0x7f00000001c0)='/dev/amidi#\x00', 0x6, 0x1) 13:28:47 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de02100093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:28:47 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x3f00, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:28:47 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de05700093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 686.503133][T17540] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 686.620783][T17540] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 686.641526][T17546] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 686.715463][T17540] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 686.726061][T17546] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 686.830863][T17546] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 686.841509][T17540] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 686.895512][ T8002] tipc: TX() has been purged, node left! [ 686.948739][T17546] EXT4-fs (loop2): corrupt root inode, run e2fsck [ 686.969525][T17546] EXT4-fs (loop2): mount failed [ 688.043866][ T8002] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 688.063733][ T8002] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 688.085820][ T8002] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 688.100294][ T8002] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 688.115046][ T8002] device bridge_slave_1 left promiscuous mode [ 688.121441][ T8002] bridge0: port 2(bridge_slave_1) entered disabled state [ 688.181896][ T8002] device bridge_slave_0 left promiscuous mode [ 688.188178][ T8002] bridge0: port 1(bridge_slave_0) entered disabled state [ 688.275119][ T8002] device veth1_macvtap left promiscuous mode [ 688.281849][ T8002] device veth0_macvtap left promiscuous mode [ 688.287867][ T8002] device veth1_vlan left promiscuous mode [ 688.305283][ T8002] device veth0_vlan left promiscuous mode 13:28:49 executing program 1: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x8ec0, 0x74) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r4, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) 13:28:49 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de06000093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:28:49 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r1 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r1}], 0x1, 0x100) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000100)={0x9b0004, 0x8, 0xffff, r1, 0x0, &(0x7f0000000080)={0x990a2d, 0x36d, [], @p_u8=&(0x7f0000000000)=0x40}}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0xee00, r3, 0x0) r4 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46800) write$cgroup_type(r4, &(0x7f0000000200)='threaded\x00', 0x175d900f) sendmsg$netlink(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)={0x24, 0x10, 0x4, 0x70bd2a, 0x25dfdbfb, "", [@typed={0x8, 0x5d, 0x0, 0x0, @uid=r3}, @typed={0x4, 0x4}, @typed={0x8, 0x8c, 0x0, 0x0, @pid}]}, 0x24}, {&(0x7f0000000180)={0xd4, 0x3e, 0x1, 0x70bd26, 0x25dfdbfc, "", [@typed={0x14, 0x5, 0x0, 0x0, @ipv6=@loopback}, @generic="1aa385fda15613c9c15db9c684f59cce6c442b3e3f4f4055fc543ee297fb081abc8edfaf380f79ae0c21baaf2294a2e89db9923407ae765ff7dd7d35e7ecaac6bf1777aa3eac19d1b3aa7a9814f49e497122903fd782e8ff71e62272db233f2ac2a6be17d00da8565c4ff4c98683bb537a596284cd99a9f240c5212f5498892c0013ed2c72775c134c39225efc3a2505d8af80947472711d9db1e36c1ba8190381c55d01f902c500b32b60e7ae5c9349"]}, 0xd4}], 0x2, &(0x7f00000002c0)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r4, r1]}}], 0x20}, 0x80000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x280000, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(r7, 0x54a1) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) dup2(r0, r1) 13:28:49 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x48000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:28:49 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x4000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 688.640742][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 688.646557][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 688.660206][T17590] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 688.681901][T17590] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 688.710935][T17590] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 688.733333][T17589] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 688.745014][T17590] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 688.792838][T17589] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 688.845292][T17589] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 688.880753][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 688.886610][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 688.907886][T17589] EXT4-fs (loop2): corrupt root inode, run e2fsck [ 688.917830][T17589] EXT4-fs (loop2): mount failed [ 689.090885][ T26] kauditd_printk_skb: 25344 callbacks suppressed [ 689.090917][ T26] audit: type=1326 audit(1579440530.193:1721449): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17584 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 689.150752][T17589] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 689.173916][T17589] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 689.196831][ T26] audit: type=1326 audit(1579440530.183:1721448): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17584 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45df9a code=0x50000 [ 689.207227][T17589] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 689.275604][ T26] audit: type=1326 audit(1579440530.233:1721450): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17584 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=35 compat=0 ip=0x459621 code=0x50000 [ 689.309408][T17589] EXT4-fs: failed to create workqueue [ 689.339946][T17589] EXT4-fs (loop2): mount failed [ 689.385939][ T26] audit: type=1326 audit(1579440530.233:1721451): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17584 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45df9a code=0x50000 [ 689.411907][ T26] audit: type=1326 audit(1579440530.233:1721452): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17584 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=35 compat=0 ip=0x459621 code=0x50000 [ 689.437572][ T26] audit: type=1326 audit(1579440530.233:1721453): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17584 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45df9a code=0x50000 [ 689.500062][ T26] audit: type=1326 audit(1579440530.233:1721454): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17584 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=35 compat=0 ip=0x459621 code=0x50000 [ 689.554457][ T26] audit: type=1326 audit(1579440530.233:1721455): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17584 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45df9a code=0x50000 [ 689.600943][ T26] audit: type=1326 audit(1579440530.233:1721456): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17584 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=35 compat=0 ip=0x459621 code=0x50000 [ 689.639641][ T26] audit: type=1326 audit(1579440530.233:1721457): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17584 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45df9a code=0x50000 [ 690.634214][ T8002] device hsr_slave_0 left promiscuous mode [ 690.674156][ T8002] device hsr_slave_1 left promiscuous mode [ 690.735142][ T8002] team0 (unregistering): Port device team_slave_1 removed [ 690.755773][ T8002] team0 (unregistering): Port device team_slave_0 removed [ 690.776172][ T8002] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 690.835175][ T8002] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 690.940380][ T8002] bond0 (unregistering): Released all slaves [ 691.056078][T17616] IPVS: ftp: loaded support on port[0] = 21 [ 691.235809][T17616] chnl_net:caif_netlink_parms(): no params data found [ 691.287996][T17616] bridge0: port 1(bridge_slave_0) entered blocking state [ 691.295394][T17616] bridge0: port 1(bridge_slave_0) entered disabled state [ 691.303997][T17616] device bridge_slave_0 entered promiscuous mode [ 691.312168][T17616] bridge0: port 2(bridge_slave_1) entered blocking state [ 691.319460][T17616] bridge0: port 2(bridge_slave_1) entered disabled state [ 691.330565][T17616] device bridge_slave_1 entered promiscuous mode [ 691.354090][T17616] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 691.369245][T17616] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 691.392765][T17616] team0: Port device team_slave_0 added [ 691.400099][T17616] team0: Port device team_slave_1 added [ 691.420258][T17616] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 691.430329][T17616] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 691.460652][T17616] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 691.476154][T17616] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 691.484040][T17616] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 691.514495][T17616] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 691.587609][T17616] device hsr_slave_0 entered promiscuous mode [ 691.641223][T17616] device hsr_slave_1 entered promiscuous mode [ 691.800758][T17616] bridge0: port 2(bridge_slave_1) entered blocking state [ 691.807959][T17616] bridge0: port 2(bridge_slave_1) entered forwarding state [ 691.815504][T17616] bridge0: port 1(bridge_slave_0) entered blocking state [ 691.822655][T17616] bridge0: port 1(bridge_slave_0) entered forwarding state [ 691.886363][T17616] 8021q: adding VLAN 0 to HW filter on device bond0 [ 691.907168][ T7981] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 691.917512][ T7981] bridge0: port 1(bridge_slave_0) entered disabled state [ 691.929436][ T7981] bridge0: port 2(bridge_slave_1) entered disabled state [ 691.955624][T17616] 8021q: adding VLAN 0 to HW filter on device team0 [ 691.976368][ T7981] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 691.988906][ T7981] bridge0: port 1(bridge_slave_0) entered blocking state [ 691.996048][ T7981] bridge0: port 1(bridge_slave_0) entered forwarding state [ 692.015080][T17070] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 692.024129][T17070] bridge0: port 2(bridge_slave_1) entered blocking state [ 692.031219][T17070] bridge0: port 2(bridge_slave_1) entered forwarding state [ 692.054424][T17070] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 692.063841][T17070] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 692.079057][T17616] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 692.090596][T17616] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 692.103556][ T7981] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 692.112677][ T7981] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 692.122681][ T7981] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 692.132645][ T7981] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 692.151665][ T7981] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 692.175247][T17616] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 692.183875][T17070] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 692.192440][T17070] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 692.199954][T17070] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 692.249572][T17616] device veth0_vlan entered promiscuous mode [ 692.257129][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 692.268138][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 692.277855][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 692.286563][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 692.296725][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 692.304961][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 692.316851][T17616] device veth1_vlan entered promiscuous mode [ 692.337134][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 692.347476][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 692.355723][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 692.364347][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 692.374820][T17616] device veth0_macvtap entered promiscuous mode [ 692.384503][T17616] device veth1_macvtap entered promiscuous mode [ 692.396641][T17616] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 692.408649][T17616] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 692.418706][T17616] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 692.429562][T17616] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 692.439424][T17616] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 692.449959][T17616] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 692.459858][T17616] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 692.470331][T17616] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 692.480290][T17616] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 692.491129][T17616] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 692.502126][T17616] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 692.509689][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 692.518108][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 692.526339][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 692.534917][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 692.545361][T17616] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 692.556248][T17616] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 692.566528][T17616] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 692.577185][T17616] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 692.587805][T17616] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 692.598413][T17616] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 692.608771][T17616] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 692.619281][T17616] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 692.629453][T17616] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 692.640202][T17616] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 692.652002][T17616] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 692.660097][T17070] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 692.670158][T17070] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 692.800780][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 692.806573][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 692.819460][T17631] IPVS: ftp: loaded support on port[0] = 21 [ 693.040886][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 693.046696][ C0] protocol 88fb is buggy, dev hsr_slave_1 13:28:54 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x6000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:28:54 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x4c000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:28:54 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de00003093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:28:54 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x4800, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:28:54 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) getresuid(&(0x7f0000000140)=0x0, &(0x7f0000000180), &(0x7f00000001c0)) mount$9p_virtio(&(0x7f0000000000)='syz\x00', &(0x7f0000000080)='./bus\x00', &(0x7f0000000100)='9p\x00', 0x20, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x100000000}}, {@version_u='version=9p2000.u'}, {@nodevmap='nodevmap'}], [{@dont_appraise='dont_appraise'}, {@euid_lt={'euid<', r1}}]}}) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r2 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r2}], 0x1, 0x100) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup2(r0, r2) r5 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) read$FUSE(r5, &(0x7f0000007380), 0x1000) ioctl$MON_IOCQ_URB_LEN(r5, 0x9201) 13:28:54 executing program 1: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x8ec0, 0x7a) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r4, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) [ 693.670879][ T7985] tipc: TX() has been purged, node left! [ 693.740061][T17636] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 693.760771][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 693.767556][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 693.775718][T17642] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 693.790994][T17642] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 693.800870][T17636] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 693.825058][T17642] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 693.838355][T17636] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 693.840750][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 693.854054][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 693.880606][T17642] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 13:28:55 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x60000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 693.914575][T17636] EXT4-fs (loop2): corrupt root inode, run e2fsck [ 693.946588][T17636] EXT4-fs (loop2): mount failed 13:28:55 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x6000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:28:55 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de0ac05093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 694.090857][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 694.096653][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 694.102478][ T26] kauditd_printk_skb: 18692 callbacks suppressed [ 694.102518][ T26] audit: type=1326 audit(1579440535.183:1740150): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17635 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=1 compat=0 ip=0x414c31 code=0x50000 [ 694.178442][ T26] audit: type=1326 audit(1579440535.193:1740151): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17635 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=1 compat=0 ip=0x414c31 code=0x50000 [ 694.222719][ T26] audit: type=1326 audit(1579440535.193:1740152): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17635 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=1 compat=0 ip=0x414c31 code=0x50000 13:28:55 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r1 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r1}], 0x1, 0x100) set_tid_address(&(0x7f0000000180)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) read$FUSE(r4, &(0x7f0000007380), 0x1000) sendmsg$key(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x2, 0x10, 0xf2, 0x8, 0xe, 0x0, 0x70bd28, 0x25dfdbfe, [@sadb_sa={0x2, 0x1, 0x4d4, 0x6, 0x1, 0x64, 0x4, 0xa0000001}, @sadb_x_nat_t_type={0x1}, @sadb_x_policy={0x8, 0x12, 0x4, 0x1, 0x0, 0x6e6bb4, 0x6, {0x6, 0x2b, 0x8, 0x3, 0x0, 0xef, 0x0, @in6=@ipv4={[], [], @rand_addr=0x3}, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_x_nat_t_type={0x1, 0x14, 0xaa}]}, 0x70}}, 0x30000800) dup2(r0, r1) 13:28:55 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x6000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 694.328250][ T26] audit: type=1326 audit(1579440535.193:1740153): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17635 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=1 compat=0 ip=0x414c31 code=0x50000 [ 694.359809][ T26] audit: type=1326 audit(1579440535.193:1740154): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17635 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=1 compat=0 ip=0x414c31 code=0x50000 13:28:55 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x4801, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 694.400056][T17671] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 694.468109][T17671] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 13:28:55 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de0c405093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 694.538649][T17671] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 694.558609][ T26] audit: type=1326 audit(1579440535.193:1740155): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17635 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=1 compat=0 ip=0x414c31 code=0x50000 [ 694.598790][T17671] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 694.618953][ T26] audit: type=1326 audit(1579440535.193:1740156): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17635 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=1 compat=0 ip=0x414c31 code=0x50000 [ 694.770952][ T26] audit: type=1326 audit(1579440535.193:1740157): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17635 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=1 compat=0 ip=0x414c31 code=0x50000 [ 694.806215][T17687] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 13:28:55 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de00007093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 694.890839][ T26] audit: type=1326 audit(1579440535.193:1740158): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17635 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=1 compat=0 ip=0x414c31 code=0x50000 [ 694.923785][T17687] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 13:28:56 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x68000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 695.033722][T17687] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 695.079291][ T26] audit: type=1326 audit(1579440535.193:1740159): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17635 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=1 compat=0 ip=0x414c31 code=0x50000 [ 695.102026][T17687] EXT4-fs (loop2): corrupt root inode, run e2fsck [ 695.108766][T17687] EXT4-fs (loop2): mount failed 13:28:56 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de00009093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:28:56 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x4c00, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 695.485286][T17712] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 695.514183][T17712] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 695.609082][T17712] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 695.743244][T17712] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 695.794499][T17720] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 695.835504][T17720] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 695.864700][T17720] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 695.933300][T17720] EXT4-fs (loop2): corrupt root inode, run e2fsck [ 695.998171][T17720] EXT4-fs (loop2): mount failed [ 696.227971][T17733] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 696.250754][T17733] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 696.292907][T17733] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 696.325972][T17733] EXT4-fs: failed to create workqueue [ 696.332109][T17733] EXT4-fs (loop2): mount failed 13:28:57 executing program 1: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x8ec0, 0x300) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r4, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) 13:28:57 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de0000a093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:28:57 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46800) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r3, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8}]}, 0x1c}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000300)={'veth1\x00', 0x0}) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r9}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000002700)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_MASTER={0x8, 0xa, r9}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000300)={'veth1\x00', 0x0}) r13 = socket$nl_route(0x10, 0x3, 0x0) r14 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r14, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r14, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r13, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r15}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route(r11, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000002700)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r12}, [@IFLA_MASTER={0x8, 0xa, r15}]}, 0x28}}, 0x0) r16 = socket$inet6_tcp(0xa, 0x1, 0x0) r17 = socket$inet6(0xa, 0x1, 0x0) r18 = fcntl$dupfd(r16, 0x0, r17) ioctl$PERF_EVENT_IOC_ENABLE(r18, 0x8912, 0x400200) getsockopt$inet_mreqn(r18, 0x0, 0x20, &(0x7f0000000080)={@local, @initdev, 0x0}, &(0x7f0000000100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@broadcast, @in6=@ipv4={[], [], @local}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@initdev}}, &(0x7f0000000700)=0xe8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r22 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r21, 0x8933, &(0x7f0000000300)={'veth1\x00', 0x0}) r24 = socket$nl_route(0x10, 0x3, 0x0) r25 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r25, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r25, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r24, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r26}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route(r22, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000002700)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r23}, [@IFLA_MASTER={0x8, 0xa, r26}]}, 0x28}}, 0x0) sendmsg$NL80211_CMD_GET_WIPHY(r1, &(0x7f0000000800)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000740)={0x50, r3, 0x0, 0x70bd29, 0x25dfdbfd, {}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r9}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x2}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r15}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r19}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r20}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x81}}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r26}]}, 0x50}, 0x1, 0x0, 0x0, 0x4}, 0x8800) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r27 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r27}], 0x1, 0x100) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r29 = dup(r28) ioctl$PERF_EVENT_IOC_ENABLE(r29, 0x8912, 0x400200) dup2(r0, r27) 13:28:57 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x6c000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:28:57 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x6000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 696.860995][ T7985] tipc: TX() has been purged, node left! [ 697.001855][T17751] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 697.075703][T17759] bridge1: port 1(veth1) entered blocking state [ 697.080986][T17751] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 697.092613][T17751] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 697.103488][T17759] bridge1: port 1(veth1) entered disabled state [ 697.122635][T17751] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 697.126936][T17759] device veth1 entered promiscuous mode [ 697.137364][T17760] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 697.177550][T17765] device veth1 left promiscuous mode [ 697.186081][T17760] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 697.239601][T17765] bridge1: port 1(veth1) entered disabled state [ 697.251054][T17760] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 697.276715][T17760] EXT4-fs (loop2): corrupt root inode, run e2fsck [ 697.284529][T17760] EXT4-fs (loop2): mount failed [ 697.312607][T17765] bridge2: port 1(veth1) entered blocking state [ 697.318892][T17765] bridge2: port 1(veth1) entered disabled state [ 697.354371][T17765] device veth1 entered promiscuous mode [ 697.495398][T17746] device veth1 left promiscuous mode [ 697.512352][T17746] bridge2: port 1(veth1) entered disabled state [ 697.524436][T17760] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 697.555873][T17760] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 697.575119][T17760] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 697.586324][T17746] bridge3: port 1(veth1) entered blocking state [ 697.592945][T17760] EXT4-fs: failed to create workqueue [ 697.598416][T17760] EXT4-fs (loop2): mount failed [ 697.603888][T17746] bridge3: port 1(veth1) entered disabled state [ 697.612778][T17746] device veth1 entered promiscuous mode [ 697.680408][T17759] device veth1 left promiscuous mode [ 697.689488][T17759] bridge3: port 1(veth1) entered disabled state [ 697.758856][T17785] bridge4: port 1(veth1) entered blocking state [ 697.770474][T17785] bridge4: port 1(veth1) entered disabled state [ 697.784334][T17785] device veth1 entered promiscuous mode [ 698.122434][T17791] IPVS: ftp: loaded support on port[0] = 21 [ 698.375933][T17791] chnl_net:caif_netlink_parms(): no params data found [ 698.491894][T17791] bridge0: port 1(bridge_slave_0) entered blocking state [ 698.499055][T17791] bridge0: port 1(bridge_slave_0) entered disabled state [ 698.521532][T17791] device bridge_slave_0 entered promiscuous mode [ 698.529153][T17791] bridge0: port 2(bridge_slave_1) entered blocking state [ 698.536797][T17791] bridge0: port 2(bridge_slave_1) entered disabled state [ 698.544867][T17791] device bridge_slave_1 entered promiscuous mode [ 698.573749][T17791] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 698.593137][T17791] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 698.623376][ T7985] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 698.640525][ T7985] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 698.658893][ T7985] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 698.675598][ T7985] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 698.690012][ T7985] device bridge_slave_1 left promiscuous mode [ 698.704316][ T7985] bridge0: port 2(bridge_slave_1) entered disabled state [ 698.751308][ T7985] device bridge_slave_0 left promiscuous mode [ 698.757619][ T7985] bridge0: port 1(bridge_slave_0) entered disabled state [ 698.815113][ T7985] device veth1_macvtap left promiscuous mode [ 698.824519][ T7985] device veth0_macvtap left promiscuous mode [ 698.835469][ T7985] device veth1_vlan left promiscuous mode [ 698.845318][ T7985] device veth0_vlan left promiscuous mode [ 699.113597][ T26] kauditd_printk_skb: 18461 callbacks suppressed [ 699.113648][ T26] audit: type=1326 audit(1579440540.213:1758622): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17753 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b159 code=0x50000 [ 699.152759][ T26] audit: type=1326 audit(1579440540.203:1758621): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17753 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=1 compat=0 ip=0x414c31 code=0x50000 [ 699.178908][ T26] audit: type=1326 audit(1579440540.243:1758623): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17753 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=1 compat=0 ip=0x414c31 code=0x50000 [ 699.205132][ T26] audit: type=1326 audit(1579440540.243:1758624): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17753 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=1 compat=0 ip=0x414c31 code=0x50000 [ 699.231342][ T26] audit: type=1326 audit(1579440540.243:1758625): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17753 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=1 compat=0 ip=0x414c31 code=0x50000 [ 699.258192][ T26] audit: type=1326 audit(1579440540.243:1758626): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17753 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=1 compat=0 ip=0x414c31 code=0x50000 [ 699.284470][ T26] audit: type=1326 audit(1579440540.243:1758627): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17753 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=1 compat=0 ip=0x414c31 code=0x50000 [ 699.313062][ T26] audit: type=1326 audit(1579440540.243:1758628): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17753 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=1 compat=0 ip=0x414c31 code=0x50000 [ 699.339049][ T26] audit: type=1326 audit(1579440540.243:1758629): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17753 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=1 compat=0 ip=0x414c31 code=0x50000 [ 699.365956][ T26] audit: type=1326 audit(1579440540.243:1758630): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17753 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=1 compat=0 ip=0x414c31 code=0x50000 [ 700.301107][ T7985] device hsr_slave_0 left promiscuous mode [ 700.350878][ T7985] device hsr_slave_1 left promiscuous mode [ 700.433099][ T7985] team0 (unregistering): Port device team_slave_1 removed [ 700.444308][ T7985] team0 (unregistering): Port device team_slave_0 removed [ 700.454629][ T7985] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 700.484894][ T7985] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 700.563024][ T7985] bond0 (unregistering): Released all slaves [ 700.657979][T17791] team0: Port device team_slave_0 added [ 700.664647][T17791] team0: Port device team_slave_1 added [ 700.677922][T17791] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 700.684971][T17791] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 700.711112][T17791] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 700.722938][T17791] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 700.729917][T17791] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 700.755994][T17791] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 700.824723][T17791] device hsr_slave_0 entered promiscuous mode [ 700.891104][T17791] device hsr_slave_1 entered promiscuous mode [ 701.063553][T17791] 8021q: adding VLAN 0 to HW filter on device bond0 [ 701.079015][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 701.087437][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 701.100163][T17791] 8021q: adding VLAN 0 to HW filter on device team0 [ 701.110379][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 701.122795][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 701.134005][ T7993] bridge0: port 1(bridge_slave_0) entered blocking state [ 701.141079][ T7993] bridge0: port 1(bridge_slave_0) entered forwarding state [ 701.163615][ T7981] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 701.172610][ T7981] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 701.183693][ T7981] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 701.194167][ T7981] bridge0: port 2(bridge_slave_1) entered blocking state [ 701.201272][ T7981] bridge0: port 2(bridge_slave_1) entered forwarding state [ 701.213491][ T7981] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 701.223830][ T7981] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 701.235428][ T7981] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 701.245702][ T7981] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 701.257085][ T7981] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 701.268199][ T7981] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 701.280224][T17070] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 701.301733][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 701.312941][T17791] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 701.334870][T17791] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 701.343341][ T2411] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 701.358848][ T7981] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 701.367078][ T7981] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 701.378046][T17791] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 701.442459][T17070] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 701.464991][T17070] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 701.473855][T17070] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 701.482315][T17070] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 701.491580][T17791] device veth0_vlan entered promiscuous mode [ 701.501561][T17791] device veth1_vlan entered promiscuous mode [ 701.517403][T17070] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 701.526024][T17070] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 701.534661][T17070] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 701.545056][T17791] device veth0_macvtap entered promiscuous mode [ 701.554686][T17791] device veth1_macvtap entered promiscuous mode [ 701.572880][T17791] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 701.584263][T17791] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 701.594384][T17791] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 701.605865][T17791] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 701.615901][T17791] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 701.626570][T17791] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 701.636495][T17791] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 701.646933][T17791] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 701.656983][T17791] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 701.667446][T17791] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 701.678976][T17791] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 701.688568][T17791] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 701.699433][T17791] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 701.709672][T17791] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 701.720615][T17791] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 701.730598][T17791] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 701.741279][T17791] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 701.751228][T17791] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 701.762018][T17791] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 701.772617][T17791] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 701.783090][T17791] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 701.794748][T17791] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 701.802386][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 701.811953][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 701.821908][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 701.935857][T17805] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 701.945825][T17805] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 701.956005][T17805] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 701.982102][T17805] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 13:29:03 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x4800, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:29:03 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de0000e093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:29:03 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x6800, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:29:03 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r1 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r1}], 0x1, 0x100) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x80201, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f00000001c0)={r4, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}, 0x10) r5 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) dup2(r0, r1) 13:29:03 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x70010000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:29:03 executing program 1: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x8ec0, 0x500) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r4, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) [ 702.080770][ C0] net_ratelimit: 6 callbacks suppressed [ 702.080780][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 702.160837][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 702.166662][ C0] protocol 88fb is buggy, dev hsr_slave_1 13:29:03 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de00011093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 702.341684][T17827] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 702.357702][T17827] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 702.374351][T17831] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 702.374769][T17830] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 702.400851][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 702.406659][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 702.420815][T17827] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 702.434350][T17830] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 702.436895][T17827] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 702.446392][T17831] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 702.540127][T17830] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 702.555010][T17831] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 702.584981][T17831] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 702.591723][T17830] EXT4-fs (loop2): corrupt root inode, run e2fsck [ 702.598536][T17830] EXT4-fs (loop2): mount failed [ 702.678436][T17831] EXT4-fs (loop3): mount failed 13:29:03 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de00021093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:29:03 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x71010000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:29:03 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0xe8000000, 0x8000, 0x6, 0x9, 0x0, 0x1}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r1}], 0x1, 0x100) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup2(r0, r1) 13:29:04 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x6c00, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 13:29:04 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de00057093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) 13:29:04 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000080)={0x84, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xe, 0x3, 'bitmap:ip\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_DATA={0x3c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @dev={0xfe, 0x80, [], 0xd}}}, @IPSET_ATTR_IP_TO={0x18, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @local}}, @IPSET_ATTR_NETMASK={0x5, 0x14, 0x60}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x84}}, 0x0) [ 703.196770][T17860] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 703.206592][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 703.206618][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 703.236360][T17860] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 703.262711][T17860] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 703.296923][T17860] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 703.410928][T17871] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 703.450833][T17871] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 13:29:04 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500000023002f0000068908ac14140de00060093c31b47d0510c147885b6e765e30637ec921f605aba9880b", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 703.473775][T17871] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 703.496061][T17871] EXT4-fs (loop2): corrupt root inode, run e2fsck [ 703.502616][T17871] EXT4-fs (loop2): mount failed 13:29:04 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000003c0)='fou\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$FOU_CMD_ADD(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={0x18, r1, 0x209, 0x0, 0x0, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}]}, 0x18}}, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000200)='/dev/cachefiles\x00', 0x208000, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r3, 0x4, 0x46800) write$cgroup_type(r3, &(0x7f0000000200)='threaded\x00', 0x175d900f) r4 = syz_genetlink_get_family_id$devlink(&(0x7f00000000c0)='devlink\x00') r5 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x46800) write$cgroup_type(r5, &(0x7f0000000200)='threaded\x00', 0x175d900f) r6 = socket$inet6_sctp(0xa, 0x1, 0x84) r7 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f00000004c0)=ANY=[@ANYBLOB="01d6b800fe7803632607000af819fa55b41d34", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r6, 0x84, 0x76, &(0x7f0000000240)={r8}, 0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000400)={r8, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x30}}}, 0x6, 0x81, 0x400, 0xe28, 0x7, 0x2, 0x1}, &(0x7f0000000240)=0x9c) sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000002c0)=ANY=[@ANYBLOB="25e5ff00", @ANYRES16=r4, @ANYBLOB="000826bd7000fedbdf25050000000e0001006e657464657673696d0000000f0002006e657464657673696d3000000800030002000000080001007063690011000200303030303a30303a31302e30000000000800030002000000080001007063690011000200303030303a30303a31302e300000000008000300030000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008000300020000000e0001006e657464657673696d0000000f0002006e657464657673696d3000000800030000000000"], 0xd4}, 0x1, 0x0, 0x0, 0x20000081}, 0x10) r9 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) close(r0) socket(0x18, 0x0, 0x0) r10 = ioctl$KVM_CREATE_VCPU(r9, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r10, &(0x7f000000f000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffa5) socket$inet(0x2, 0x0, 0x0) 13:29:04 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000040)=[{r1}], 0x1, 0x100) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup2(r0, r1) 13:29:04 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="028000000a0000000004f90000000080000002004e21000002000000000000000088053d"], 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x74000000, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 703.850967][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 703.856754][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 704.024924][T17899] ================================================================== [ 704.033085][T17899] BUG: KCSAN: data-race in bio_chain / bio_endio [ 704.039404][T17899] [ 704.041858][T17899] read to 0xffff8881221a0194 of 2 bytes by interrupt on cpu 1: [ 704.049409][T17899] bio_endio+0x3e/0x400 [ 704.053570][T17899] blk_update_request+0x427/0x7b0 [ 704.058593][T17899] scsi_end_request+0x6b/0x360 [ 704.063360][T17899] scsi_io_completion+0x11d/0xc80 [ 704.068417][T17899] scsi_finish_command+0x283/0x380 [ 704.073533][T17899] scsi_softirq_done+0x259/0x280 [ 704.078475][T17899] blk_done_softirq+0x1eb/0x250 [ 704.083353][T17899] __do_softirq+0x115/0x33f [ 704.087861][T17899] irq_exit+0xbb/0xe0 [ 704.091845][T17899] do_IRQ+0x81/0x130 [ 704.095742][T17899] ret_from_intr+0x0/0x21 [ 704.100076][T17899] kcsan_setup_watchpoint+0x1d4/0x460 [ 704.105458][T17899] __tsan_read2+0xc6/0x100 [ 704.109881][T17899] tomoyo_check_path_acl+0x2b/0xa0 [ 704.115001][T17899] tomoyo_check_acl+0xf6/0x270 [ 704.119771][T17899] tomoyo_path_permission+0xe3/0x160 [ 704.125060][T17899] tomoyo_check_open_permission+0x2fd/0x320 [ 704.130950][T17899] tomoyo_file_open+0x75/0x90 [ 704.135626][T17899] security_file_open+0x69/0x210 [ 704.140562][T17899] do_dentry_open+0x211/0x970 [ 704.145236][T17899] vfs_open+0x62/0x80 [ 704.149269][T17899] path_openat+0xf9f/0x3580 [ 704.153778][T17899] do_filp_open+0x11e/0x1b0 [ 704.158293][T17899] do_sys_open+0x3b3/0x4f0 [ 704.162720][T17899] __x64_sys_open+0x55/0x70 [ 704.167226][T17899] do_syscall_64+0xcc/0x3a0 [ 704.171736][T17899] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 704.177614][T17899] [ 704.180035][T17899] write to 0xffff8881221a0194 of 2 bytes by task 17899 on cpu 0: [ 704.187790][T17899] bio_chain+0x86/0xb0 [ 704.191874][T17899] __blk_queue_split+0x757/0xc40 [ 704.196812][T17899] blk_mq_make_request+0x104/0xf60 [ 704.201935][T17899] generic_make_request+0x196/0x700 [ 704.207142][T17899] submit_bio+0x96/0x3c0 [ 704.211390][T17899] iomap_dio_submit_bio.isra.0+0xfc/0x120 [ 704.217117][T17899] iomap_dio_bio_actor+0x40a/0x960 [ 704.222256][T17899] iomap_dio_actor+0x87/0x3a0 [ 704.226941][T17899] iomap_apply+0x20d/0x6a0 [ 704.231357][T17899] iomap_dio_rw+0x67e/0x9a0 [ 704.235872][T17899] ext4_file_write_iter+0xc38/0xd40 [ 704.241082][T17899] new_sync_write+0x388/0x4a0 [ 704.245768][T17899] __vfs_write+0xb1/0xc0 [ 704.250015][T17899] vfs_write+0x18a/0x390 [ 704.254264][T17899] ksys_write+0xd5/0x1b0 [ 704.258515][T17899] __x64_sys_write+0x4c/0x60 [ 704.263114][T17899] do_syscall_64+0xcc/0x3a0 [ 704.267647][T17899] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 704.273526][T17899] [ 704.275843][T17899] Reported by Kernel Concurrency Sanitizer on: [ 704.282000][T17899] CPU: 0 PID: 17899 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 704.290665][T17899] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 704.300723][T17899] ================================================================== [ 704.308796][T17899] Kernel panic - not syncing: panic_on_warn set ... [ 704.315390][T17899] CPU: 0 PID: 17899 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 704.324052][T17899] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 704.334112][T17899] Call Trace: [ 704.337411][T17899] dump_stack+0x11d/0x181 [ 704.341749][T17899] panic+0x210/0x640 [ 704.345649][T17899] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 704.351574][T17899] ? vprintk_func+0x8d/0x140 [ 704.356177][T17899] kcsan_report.cold+0xc/0xd [ 704.360785][T17899] kcsan_setup_watchpoint+0x3fe/0x460 [ 704.366170][T17899] __tsan_unaligned_write2+0xc7/0x110 [ 704.371545][T17899] bio_chain+0x86/0xb0 [ 704.375623][T17899] __blk_queue_split+0x757/0xc40 [ 704.380594][T17899] blk_mq_make_request+0x104/0xf60 [ 704.385718][T17899] ? blk_queue_enter+0x532/0x570 [ 704.390671][T17899] generic_make_request+0x196/0x700 [ 704.395907][T17899] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 704.402156][T17899] submit_bio+0x96/0x3c0 [ 704.406409][T17899] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 704.412652][T17899] ? bio_iov_iter_get_pages+0x44a/0x5a0 [ 704.418204][T17899] iomap_dio_submit_bio.isra.0+0xfc/0x120 [ 704.423933][T17899] iomap_dio_bio_actor+0x40a/0x960 [ 704.429065][T17899] iomap_dio_actor+0x87/0x3a0 [ 704.433752][T17899] iomap_apply+0x20d/0x6a0 [ 704.438289][T17899] ? iomap_dio_bio_actor+0x960/0x960 [ 704.443586][T17899] iomap_dio_rw+0x67e/0x9a0 [ 704.448088][T17899] ? iomap_dio_bio_actor+0x960/0x960 [ 704.453407][T17899] ext4_file_write_iter+0xc38/0xd40 [ 704.458613][T17899] ? ext4_file_write_iter+0xc38/0xd40 [ 704.464004][T17899] ? iov_iter_init+0xe2/0x120 [ 704.468704][T17899] new_sync_write+0x388/0x4a0 [ 704.473398][T17899] __vfs_write+0xb1/0xc0 [ 704.477653][T17899] vfs_write+0x18a/0x390 [ 704.481916][T17899] ksys_write+0xd5/0x1b0 [ 704.486167][T17899] __x64_sys_write+0x4c/0x60 [ 704.490764][T17899] do_syscall_64+0xcc/0x3a0 [ 704.495282][T17899] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 704.501179][T17899] RIP: 0033:0x45b159 [ 704.505081][T17899] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 704.524857][T17899] RSP: 002b:00007f9027924c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 704.533268][T17899] RAX: ffffffffffffffda RBX: 00007f90279256d4 RCX: 000000000045b159 [ 704.541248][T17899] RDX: 00000000175d900f RSI: 0000000020000200 RDI: 0000000000000007 [ 704.549216][T17899] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 704.557183][T17899] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 704.565149][T17899] R13: 0000000000000c7d R14: 00000000004cd3db R15: 000000000075bfd4 [ 704.574416][T17899] Kernel Offset: disabled [ 704.578740][T17899] Rebooting in 86400 seconds..