7b44a0d736657868e722a5b839647148a6208624e7298cd824e33353bdce785259113f31bd03681086ad096e5ab5a4084c5df9f3dac3026aa76245f2096f70a01a4b5f58f308adc3d882b1ee13a33ac6cf594828e05697d52cd151ee2e2d5eaf921da2d751b4eecc3b98b9c0a848bee02f461e5d4d85b53d5ed700ef46b07f431636829a8991d80347224fa75b10a1a74365f899b03e07e38b866") connect(r0, &(0x7f0000002000)=@ethernet, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f000000ffd8)={'vcan0\x00', 0x0}) r2 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r2, &(0x7f0000010ff0), 0x10) clock_gettime(0x0, &(0x7f0000001240)={0x0, 0x0}) recvmmsg(r2, &(0x7f0000001500)=[{{&(0x7f00000000c0)=@hci, 0x80, &(0x7f0000000500)=[{&(0x7f0000000340)=""/48, 0x30}], 0x1, &(0x7f0000000580)=""/251, 0xfb}}, {{&(0x7f0000000e40)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000000f00), 0x1ba, &(0x7f0000000f40)=""/47, 0x2f}}], 0x2, 0x0, &(0x7f0000001600)={0x0, r3+10000000}) sendmsg$can_bcm(r0, &(0x7f0000000000)={&(0x7f0000007ff0)={0x1d, r1}, 0x10, &(0x7f0000002ff0)={&(0x7f000000afb8)={0x1, 0x3, 0x0, {0x0, 0x2710}, {0x0, 0x7530}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "8e15adecfc04aba1"}}, 0x48}}, 0x0) 22:58:12 executing program 2: mkdir(&(0x7f00000008c0)='./file0\x00', 0x0) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000480)) unlinkat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x0) epoll_pwait(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x8001, &(0x7f00000000c0)={0xfffffffffffff1d8}, 0x8) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x6000000, 0x3ef, 0x0, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x1000000, 0x0, 0x0, 0x6]}}) connect$l2tp(0xffffffffffffffff, &(0x7f0000000580)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x1, 0x2, 0x0, 0x0, {0xa, 0x4e24, 0x0, @mcast2, 0x5}}}, 0x32) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000004c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000500)='ppp0posix_acl_accessuserposix_acl_access\x00'}, 0x30) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000600), &(0x7f0000000640)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000740), &(0x7f0000000780)=0x8) getpgid(0xffffffffffffffff) setpriority(0x1, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) umount2(&(0x7f0000000700)='./file0\x00', 0x2) ioctl$KVM_SET_XSAVE(0xffffffffffffffff, 0x5000aea5, &(0x7f0000000200)={"f519c26b46710ca78e04d78c1919b555b36974efefd12a5f693fed32d32e4afb3b7acb8d05ff620fa450096177657adaf73e6281a99f2bd97da49be3c011a372ccd10467917c62526764ecce731d7daa44a7b4747f9bdd3a837565958c32d3b04de8745247696a320a7cc3d8d19cd7c8ac7eadd62713f27ab43d88d64439b4e4984214a4e06891cd37992574d2678c56fcda8399ab173613bc35d0a53e617c4d3dc3a078f643883bcf028a87441630dc1972a204830674e678a1051c4aac49f040cda971395717c516e6c05b7722f69ecafade2054088b147e35675af272afaeff24cff4880243832d9099038e7df06bb1ad162678bf9952aa5ab758714e4a0aa8114c51f33af2fa1632a9cac985bf40f38e5cdfe7b57d2ad9cb47d13b7d7e20e61c5a7597d586c54961d9d2af6670ab9538c34d2a86d0123077fcd9a36861504535e944aa0cf07b56687b583afb6fa07fb62c2a9e11822c8e09234a001f8bc7fe17a83a22e1b02a31ba85d04e72c2f2d4942d264c12eab0b3bc6116ac23c1df6dfd4a46b254fc2fa97439637a80b23a8d0103ac9b012fcca76750b68cb9f891a32bf2e1f1f4b50af28f7b698d0486d8ba39c85d894d906c4beaf4287577a212f05db8dd0fca4d7a6cc9185e7bf0f6197918d8df2d8f85178bed4a374249b472f0f43daeebea2ca6f3cc98c851858b7d6d3d17d98afb79798849b076a73f46574b0f206bbcc9f0fbb90347df3d259ee0f2a2b13bbf88c9d3f522dacd1c466b0681e4b36fc0e37f7426a7ca42976d56fa7c0418d80e3395808768b7cc2441dd1f1f7c69322abb61fa35986daa55a30150b8e09ac6ca29def750ec6481cc5eb865b94121739babb9113065963d64b6743e307207970c4d40196a1fec59fe996efd6d9f223225af228f00bc1dd97c26feb91dd07ef3e6de2e79d44558f9741ef37e0c92689529fd5397319336c4d40a643d3858a0727dce2f39805724089b61b5d4c12e8c10c7f3809ae80fc3c6c54d404e909e33e0f0014501b7f4a05d972fd48f5b8dbcb847be5cbdb0b0621d9ece9fb14d748ee9c522fee9dbc371d72acdd2c9400eb50e1d1336497c12d1f58cd71c60c9ee14a47131af699dbe20928c8616dfae9b14ea92d64ee0b9b57e52f013e436005f0507784cf8fda98e01bcb5471c551e4bf9a0da52b6c310206b464914ac8fcd36a2e2f1c40d0b55ecf1dff89fada96105318e01bc23f52afab72e078c9eabf31620092919d692dd7836d1bae2d65a5b8be79e6d92128a7a43f19bbf6e45033530ec4db8f5c25206fd96c141de7744ef07142800d75984e24f9d92f4e4be723539bd07a6ab29e1a055de36e360d16254e193c3532df960f30527737b5d538969ef54d923b2a333564a256fe9872cad4cdbe4e635ec31ef75f0571bdd496962905f3a57ba778b04240167eed7976043"}) setxattr$security_smack_entry(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)='security.SMACK64EXEC\x00', &(0x7f00000007c0)='ntfs\x00', 0x5, 0x1) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e23, @multicast1}, 0x10) 22:58:12 executing program 4: mkdir(&(0x7f00000008c0)='./file0\x00', 0x0) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000480)={0xffffffffffffffff}) unlinkat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x0) epoll_pwait(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x8001, &(0x7f00000000c0)={0xfffffffffffff1d8}, 0x8) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x6000000, 0x3ef, 0x0, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x1000000, 0x0, 0x0, 0x6]}}) connect$l2tp(0xffffffffffffffff, &(0x7f0000000580)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0, {0xa, 0x4e24, 0x0, @mcast2, 0x5}}}, 0x32) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000004c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000500)='ppp0posix_acl_accessuserposix_acl_access\x00'}, 0x30) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000600), &(0x7f0000000640)=0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000740), &(0x7f0000000780)=0x8) getpgid(0xffffffffffffffff) setpriority(0x1, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) umount2(&(0x7f0000000700)='./file0\x00', 0x2) ioctl$KVM_SET_XSAVE(0xffffffffffffffff, 0x5000aea5, &(0x7f0000000200)={"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"}) setxattr$security_smack_entry(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)='security.SMACK64EXEC\x00', &(0x7f00000007c0)='ntfs\x00', 0x5, 0x1) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e23, @multicast1}, 0x10) 22:58:12 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000280)='./file0\x00', 0x80000001, 0x1, &(0x7f00000002c0)=[{&(0x7f00000000c0)="800000000002000019000000e60100006c00000000000025f700000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1014001, &(0x7f00000003c0)={[{@journal_checksum='journal_checksum'}]}) 22:58:13 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517, 0x0, 0x0, 0x0, 0x1e83010000000000}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) [ 1317.957068] EXT4-fs (loop1): Unsupported filesystem blocksize 0 (247 log_block_size) [ 1318.024145] overlayfs: failed to resolve './file1': -2 [ 1318.037406] overlayfs: failed to resolve './file1': -2 [ 1318.044581] EXT4-fs (loop1): Unsupported filesystem blocksize 0 (247 log_block_size) 22:58:13 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517, 0x0, 0x0, 0x0, 0x25830100}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) 22:58:13 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000280)='./file0\x00', 0x80000001, 0x1, &(0x7f00000002c0)=[{&(0x7f00000000c0)="800000000002000019000000e60100006c7fffffff0000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1014001, &(0x7f00000003c0)={[{@journal_checksum='journal_checksum'}]}) 22:58:13 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000002c0)=0x40, 0x4) 22:58:13 executing program 2: mkdir(&(0x7f00000008c0)='./file0\x00', 0x0) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000480)={0xffffffffffffffff}) unlinkat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x0) epoll_pwait(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x8001, &(0x7f00000000c0)={0xfffffffffffff1d8}, 0x8) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x6000000, 0x3ef, 0x0, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x1000000, 0x0, 0x0, 0x6]}}) connect$l2tp(0xffffffffffffffff, &(0x7f0000000580)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x1, 0x2, 0x0, 0x0, {0xa, 0x4e24, 0x0, @mcast2, 0x5}}}, 0x32) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000004c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000500)='ppp0posix_acl_accessuserposix_acl_access\x00'}, 0x30) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000600), &(0x7f0000000640)=0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000740), &(0x7f0000000780)=0x8) getpgid(0xffffffffffffffff) setpriority(0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) umount2(&(0x7f0000000700)='./file0\x00', 0x2) ioctl$KVM_SET_XSAVE(0xffffffffffffffff, 0x5000aea5, &(0x7f0000000200)={"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"}) setxattr$security_smack_entry(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)='security.SMACK64EXEC\x00', &(0x7f00000007c0)='ntfs\x00', 0x5, 0x1) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e23, @multicast1}, 0x10) 22:58:13 executing program 4: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000140)={0x18, 0x6}, 0x18) [ 1318.306639] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1318.335072] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1318.361428] EXT4-fs (loop1): group descriptors corrupted! [ 1318.381154] device nr0 entered promiscuous mode [ 1318.426361] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1318.436437] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1318.438446] overlayfs: failed to resolve './file1': -2 [ 1318.446630] EXT4-fs (loop1): group descriptors corrupted! 22:58:13 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x40, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1001, 0x4, 0x7ff, 0x2, 0x0, 0x10000, 0x0, 0xc776, 0x9, 0x1, 0x3, 0xa76, 0x3, 0x3, 0x401, 0x7, 0x200, 0x384, 0x0, 0x200, 0x7f, 0x2, 0x9, 0x7f, 0x4, 0x7ff, 0x2, 0x99a, 0xd, 0x0, 0x0, 0x85e, 0x0, @perf_config_ext={0x0, 0xb6}, 0x10000, 0x79, 0xa2, 0x4, 0x100000000, 0x9, 0xdfa8}, 0x0, 0x10, r0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000240)=""/80) ioctl$TUNSETLINK(r0, 0x400454cd, 0x200) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="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") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) openat$cgroup_int(r2, &(0x7f0000000040)='io.weight\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r3, &(0x7f0000000000), 0x17b) 22:58:13 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000080)='hfsplus\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)}], 0x0, &(0x7f0000000540)={[], [{@subj_type={'subj_type', 0x3d, 'vmnet1user]%}userlo!GPL.['}}]}) 22:58:13 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000140)=""/11, 0x5bd) prctl$intptr(0x1d, 0xfffffffffffff0a2) prctl$void(0x1e) syz_execute_func(&(0x7f0000000080)="3666440f9bf541c3c4e2c9975842c4c27d794e003e0f11581010196f04cdc4a1f1eef30f2902") 22:58:13 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517, 0x0, 0x0, 0x0, 0x35830100}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) 22:58:13 executing program 2: mkdir(&(0x7f00000008c0)='./file0\x00', 0x0) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000480)={0xffffffffffffffff}) unlinkat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x0) epoll_pwait(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x8001, &(0x7f00000000c0)={0xfffffffffffff1d8}, 0x8) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x6000000, 0x3ef, 0x0, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x1000000, 0x0, 0x0, 0x6]}}) connect$l2tp(0xffffffffffffffff, &(0x7f0000000580)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x1, 0x2, 0x0, 0x0, {0xa, 0x4e24, 0x0, @mcast2, 0x5}}}, 0x32) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000004c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000500)='ppp0posix_acl_accessuserposix_acl_access\x00'}, 0x30) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000600), &(0x7f0000000640)=0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000740), &(0x7f0000000780)=0x8) getpgid(0xffffffffffffffff) setpriority(0x1, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) umount2(&(0x7f0000000700)='./file0\x00', 0x2) ioctl$KVM_SET_XSAVE(0xffffffffffffffff, 0x5000aea5, &(0x7f0000000200)={"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"}) setxattr$security_smack_entry(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)='security.SMACK64EXEC\x00', &(0x7f00000007c0)='ntfs\x00', 0x5, 0x1) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e23, @multicast1}, 0x10) 22:58:13 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000280)='./file0\x00', 0x80000001, 0x1, &(0x7f00000002c0)=[{&(0x7f00000000c0)="800000000002000019000000e60100006c000000010000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1014001, &(0x7f00000003c0)={[{@journal_checksum='journal_checksum'}]}) [ 1318.831589] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 22:58:13 executing program 5: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r6 = gettid() sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x139f605562ecba0b, 0x70, 0x9, 0x6, 0x7fff, 0x4, 0x0, 0x5, 0x400, 0x2, 0x0, 0x4, 0x7, 0x9, 0x1, 0x5, 0x80, 0x5, 0x9, 0x4, 0x9, 0xb61c, 0x7f, 0xffff, 0x7fff, 0xfff, 0x6, 0xfffffffffffffffb, 0x8, 0x6, 0x6, 0xfffffffffffffffd, 0x8, 0x80000001, 0x1ff, 0x1000, 0x4dfc, 0x80, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000500), 0x4}, 0x10020, 0x3f, 0x3, 0x4, 0x8000, 0x7fffffff, 0x5}, r6, 0x6, r1, 0x8) 22:58:13 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517, 0x0, 0x0, 0x0, 0x1833d}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) [ 1318.877433] overlayfs: failed to resolve './file1': -2 [ 1318.908044] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! 22:58:14 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517, 0x0, 0x0, 0x0, 0x7a}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) [ 1318.952768] EXT4-fs (loop1): group descriptors corrupted! 22:58:14 executing program 2: mkdir(&(0x7f00000008c0)='./file0\x00', 0x0) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000480)={0xffffffffffffffff}) unlinkat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x0) epoll_pwait(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x8001, &(0x7f00000000c0)={0xfffffffffffff1d8}, 0x8) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x6000000, 0x3ef, 0x0, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x1000000, 0x0, 0x0, 0x6]}}) connect$l2tp(0xffffffffffffffff, &(0x7f0000000580)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x1, 0x2, 0x0, 0x0, {0xa, 0x4e24, 0x0, @mcast2, 0x5}}}, 0x32) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000004c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000500)='ppp0posix_acl_accessuserposix_acl_access\x00'}, 0x30) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000600), &(0x7f0000000640)=0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000740), &(0x7f0000000780)=0x8) getpgid(0xffffffffffffffff) setpriority(0x1, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) umount2(&(0x7f0000000700)='./file0\x00', 0x2) ioctl$KVM_SET_XSAVE(0xffffffffffffffff, 0x5000aea5, &(0x7f0000000200)={"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"}) setxattr$security_smack_entry(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)='security.SMACK64EXEC\x00', &(0x7f00000007c0)='ntfs\x00', 0x5, 0x1) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e23, @multicast1}, 0x10) [ 1319.044817] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1319.069751] device lo entered promiscuous mode [ 1319.077794] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1319.087227] EXT4-fs (loop1): group descriptors corrupted! 22:58:14 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517, 0x0, 0x0, 0x0, 0x3683010000000000}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) 22:58:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000280)='./file0\x00', 0x80000001, 0x1, &(0x7f00000002c0)=[{&(0x7f00000000c0)="800000000002000019000000e60100006c600000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1014001, &(0x7f00000003c0)={[{@journal_checksum='journal_checksum'}]}) [ 1319.293054] overlayfs: failed to resolve './file1': -2 [ 1319.360536] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1319.396045] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 1319.427854] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1319.453361] EXT4-fs (loop1): can't mount with journal_checksum, fs mounted w/o journal [ 1319.916647] device nr0 entered promiscuous mode [ 1319.932655] netlink: 3 bytes leftover after parsing attributes in process `syz-executor5'. [ 1320.000622] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1320.031435] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 1320.074103] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1320.093873] EXT4-fs (loop1): can't mount with journal_checksum, fs mounted w/o journal 22:58:15 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x40, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1001, 0x4, 0x7ff, 0x2, 0x0, 0x10000, 0x0, 0xc776, 0x9, 0x1, 0x3, 0xa76, 0x3, 0x3, 0x401, 0x7, 0x200, 0x384, 0x0, 0x200, 0x7f, 0x2, 0x9, 0x7f, 0x4, 0x7ff, 0x2, 0x99a, 0xd, 0x0, 0x0, 0x85e, 0x0, @perf_config_ext={0x0, 0xb6}, 0x10000, 0x79, 0xa2, 0x4, 0x100000000, 0x9, 0xdfa8}, 0x0, 0x10, r0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000240)=""/80) ioctl$TUNSETLINK(r0, 0x400454cd, 0x200) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) openat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="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") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r2, &(0x7f0000000000), 0x17b) 22:58:15 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517, 0x0, 0x0, 0x0, 0x2783010000000000}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) 22:58:15 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x13, 0x5d}}, &(0x7f0000000000)="504c20004cf7d12af11ce92537b5e3191e66de5d4ec18e4c2df01484a86d77842f624946eae310794c8c96ff1466232e25951139bda5d2990e523f8ec3080ffc1224d8dc4c84a9c8e8ab31576806715523fa749e8615c61049b8b1be6aa7740702cc5add", 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x9e, &(0x7f0000000380)="263abd030e98ff4dc870bd6688a8", &(0x7f00000001c0)=""/158, 0x1200}, 0x28) 22:58:15 executing program 2: mkdir(&(0x7f00000008c0)='./file0\x00', 0x0) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000480)={0xffffffffffffffff}) unlinkat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x0) epoll_pwait(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x8001, &(0x7f00000000c0)={0xfffffffffffff1d8}, 0x8) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x6000000, 0x3ef, 0x0, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x1000000, 0x0, 0x0, 0x6]}}) connect$l2tp(0xffffffffffffffff, &(0x7f0000000580)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x1, 0x2, 0x0, 0x0, {0xa, 0x4e24, 0x0, @mcast2, 0x5}}}, 0x32) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000004c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000500)='ppp0posix_acl_accessuserposix_acl_access\x00'}, 0x30) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000600), &(0x7f0000000640)=0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000740), &(0x7f0000000780)=0x8) getpgid(0xffffffffffffffff) setpriority(0x1, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) umount2(&(0x7f0000000700)='./file0\x00', 0x2) ioctl$KVM_SET_XSAVE(0xffffffffffffffff, 0x5000aea5, &(0x7f0000000200)={"f519c26b46710ca78e04d78c1919b555b36974efefd12a5f693fed32d32e4afb3b7acb8d05ff620fa450096177657adaf73e6281a99f2bd97da49be3c011a372ccd10467917c62526764ecce731d7daa44a7b4747f9bdd3a837565958c32d3b04de8745247696a320a7cc3d8d19cd7c8ac7eadd62713f27ab43d88d64439b4e4984214a4e06891cd37992574d2678c56fcda8399ab173613bc35d0a53e617c4d3dc3a078f643883bcf028a87441630dc1972a204830674e678a1051c4aac49f040cda971395717c516e6c05b7722f69ecafade2054088b147e35675af272afaeff24cff4880243832d9099038e7df06bb1ad162678bf9952aa5ab758714e4a0aa8114c51f33af2fa1632a9cac985bf40f38e5cdfe7b57d2ad9cb47d13b7d7e20e61c5a7597d586c54961d9d2af6670ab9538c34d2a86d0123077fcd9a36861504535e944aa0cf07b56687b583afb6fa07fb62c2a9e11822c8e09234a001f8bc7fe17a83a22e1b02a31ba85d04e72c2f2d4942d264c12eab0b3bc6116ac23c1df6dfd4a46b254fc2fa97439637a80b23a8d0103ac9b012fcca76750b68cb9f891a32bf2e1f1f4b50af28f7b698d0486d8ba39c85d894d906c4beaf4287577a212f05db8dd0fca4d7a6cc9185e7bf0f6197918d8df2d8f85178bed4a374249b472f0f43daeebea2ca6f3cc98c851858b7d6d3d17d98afb79798849b076a73f46574b0f206bbcc9f0fbb90347df3d259ee0f2a2b13bbf88c9d3f522dacd1c466b0681e4b36fc0e37f7426a7ca42976d56fa7c0418d80e3395808768b7cc2441dd1f1f7c69322abb61fa35986daa55a30150b8e09ac6ca29def750ec6481cc5eb865b94121739babb9113065963d64b6743e307207970c4d40196a1fec59fe996efd6d9f223225af228f00bc1dd97c26feb91dd07ef3e6de2e79d44558f9741ef37e0c92689529fd5397319336c4d40a643d3858a0727dce2f39805724089b61b5d4c12e8c10c7f3809ae80fc3c6c54d404e909e33e0f0014501b7f4a05d972fd48f5b8dbcb847be5cbdb0b0621d9ece9fb14d748ee9c522fee9dbc371d72acdd2c9400eb50e1d1336497c12d1f58cd71c60c9ee14a47131af699dbe20928c8616dfae9b14ea92d64ee0b9b57e52f013e436005f0507784cf8fda98e01bcb5471c551e4bf9a0da52b6c310206b464914ac8fcd36a2e2f1c40d0b55ecf1dff89fada96105318e01bc23f52afab72e078c9eabf31620092919d692dd7836d1bae2d65a5b8be79e6d92128a7a43f19bbf6e45033530ec4db8f5c25206fd96c141de7744ef07142800d75984e24f9d92f4e4be723539bd07a6ab29e1a055de36e360d16254e193c3532df960f30527737b5d538969ef54d923b2a333564a256fe9872cad4cdbe4e635ec31ef75f0571bdd496962905f3a57ba778b04240167eed7976043"}) setxattr$security_smack_entry(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)='security.SMACK64EXEC\x00', &(0x7f00000007c0)='ntfs\x00', 0x5, 0x1) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e23, @multicast1}, 0x10) 22:58:15 executing program 5: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r6 = gettid() sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x139f605562ecba0b, 0x70, 0x9, 0x6, 0x7fff, 0x4, 0x0, 0x5, 0x400, 0x2, 0x0, 0x4, 0x7, 0x9, 0x1, 0x5, 0x80, 0x5, 0x9, 0x4, 0x9, 0xb61c, 0x7f, 0xffff, 0x7fff, 0xfff, 0x6, 0xfffffffffffffffb, 0x8, 0x6, 0x6, 0xfffffffffffffffd, 0x8, 0x80000001, 0x1ff, 0x1000, 0x4dfc, 0x80, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000500), 0x4}, 0x10020, 0x3f, 0x3, 0x4, 0x8000, 0x7fffffff, 0x5}, r6, 0x6, r1, 0x8) 22:58:15 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000280)='./file0\x00', 0x80000001, 0x1, &(0x7f00000002c0)=[{&(0x7f00000000c0)="800000000002000019000000e60100006c000000230000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1014001, &(0x7f00000003c0)={[{@journal_checksum='journal_checksum'}]}) [ 1320.505485] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1320.516347] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1320.526769] EXT4-fs (loop1): group descriptors corrupted! [ 1320.555307] overlayfs: failed to resolve './file1': -2 22:58:15 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517, 0x0, 0x0, 0x0, 0x10830100}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) [ 1320.605115] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1320.647946] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1320.685601] EXT4-fs (loop1): group descriptors corrupted! 22:58:15 executing program 2: mkdir(&(0x7f00000008c0)='./file0\x00', 0x0) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000480)={0xffffffffffffffff}) unlinkat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x0) epoll_pwait(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x8001, &(0x7f00000000c0)={0xfffffffffffff1d8}, 0x8) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x6000000, 0x3ef, 0x0, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x1000000, 0x0, 0x0, 0x6]}}) connect$l2tp(0xffffffffffffffff, &(0x7f0000000580)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x1, 0x2, 0x0, 0x0, {0xa, 0x4e24, 0x0, @mcast2, 0x5}}}, 0x32) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000004c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000500)='ppp0posix_acl_accessuserposix_acl_access\x00'}, 0x30) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000600), &(0x7f0000000640)=0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000740), &(0x7f0000000780)=0x8) getpgid(0xffffffffffffffff) setpriority(0x1, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}]}) umount2(&(0x7f0000000700)='./file0\x00', 0x2) ioctl$KVM_SET_XSAVE(0xffffffffffffffff, 0x5000aea5, &(0x7f0000000200)={"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"}) setxattr$security_smack_entry(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)='security.SMACK64EXEC\x00', &(0x7f00000007c0)='ntfs\x00', 0x5, 0x1) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e23, @multicast1}, 0x10) 22:58:15 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517, 0x0, 0x0, 0x0, 0x1000000}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) 22:58:15 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000280)='./file0\x00', 0x80000001, 0x1, &(0x7f00000002c0)=[{&(0x7f00000000c0)="800000000002000019000000e60100006c000004000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1014001, &(0x7f00000003c0)={[{@journal_checksum='journal_checksum'}]}) 22:58:15 executing program 4: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r6 = gettid() sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x139f605562ecba0b, 0x70, 0x9, 0x6, 0x7fff, 0x4, 0x0, 0x5, 0x400, 0x2, 0x0, 0x4, 0x7, 0x9, 0x1, 0x5, 0x80, 0x5, 0x9, 0x4, 0x9, 0xb61c, 0x7f, 0xffff, 0x7fff, 0xfff, 0x6, 0xfffffffffffffffb, 0x8, 0x6, 0x6, 0xfffffffffffffffd, 0x8, 0x80000001, 0x1ff, 0x1000, 0x4dfc, 0x80, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000500), 0x4}, 0x10020, 0x3f, 0x3, 0x4, 0x8000, 0x7fffffff, 0x5}, r6, 0x6, r1, 0x8) 22:58:16 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517, 0x0, 0x0, 0x0, 0x3f830100}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) [ 1320.925771] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1320.948035] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 1320.952114] device nr0 entered promiscuous mode [ 1320.990548] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1321.000401] overlayfs: missing 'workdir' [ 1321.008728] EXT4-fs (loop1): can't mount with journal_checksum, fs mounted w/o journal [ 1321.080212] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1321.089691] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 1321.099828] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1321.109569] EXT4-fs (loop1): can't mount with journal_checksum, fs mounted w/o journal [ 1321.512833] device lo entered promiscuous mode [ 1321.539852] netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. 22:58:16 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x40, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1001, 0x4, 0x7ff, 0x2, 0x0, 0x10000, 0x0, 0xc776, 0x9, 0x1, 0x3, 0xa76, 0x3, 0x3, 0x401, 0x7, 0x200, 0x384, 0x0, 0x200, 0x7f, 0x2, 0x9, 0x7f, 0x4, 0x7ff, 0x2, 0x99a, 0xd, 0x0, 0x0, 0x85e, 0x0, @perf_config_ext={0x0, 0xb6}, 0x10000, 0x79, 0xa2, 0x4, 0x100000000, 0x9, 0xdfa8}, 0x0, 0x10, r0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000240)=""/80) ioctl$TUNSETLINK(r0, 0x400454cd, 0x200) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="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") openat$cgroup_int(r2, &(0x7f0000000040)='io.weight\x00', 0x2, 0x0) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x17b) 22:58:16 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517, 0x0, 0x0, 0x0, 0x7a000000}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) 22:58:16 executing program 5: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r6 = gettid() sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x139f605562ecba0b, 0x70, 0x9, 0x6, 0x7fff, 0x4, 0x0, 0x5, 0x400, 0x2, 0x0, 0x4, 0x7, 0x9, 0x1, 0x5, 0x80, 0x5, 0x9, 0x4, 0x9, 0xb61c, 0x7f, 0xffff, 0x7fff, 0xfff, 0x6, 0xfffffffffffffffb, 0x8, 0x6, 0x6, 0xfffffffffffffffd, 0x8, 0x80000001, 0x1ff, 0x1000, 0x4dfc, 0x80, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000500), 0x4}, 0x10020, 0x3f, 0x3, 0x4, 0x8000, 0x7fffffff, 0x5}, r6, 0x6, r1, 0x8) 22:58:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000280)='./file0\x00', 0x80000001, 0x1, &(0x7f00000002c0)=[{&(0x7f00000000c0)="800000000002000019000000e60100006c000000000000261d00000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1014001, &(0x7f00000003c0)={[{@journal_checksum='journal_checksum'}]}) 22:58:16 executing program 2: mkdir(&(0x7f00000008c0)='./file0\x00', 0x0) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000480)={0xffffffffffffffff}) unlinkat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x0) epoll_pwait(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x8001, &(0x7f00000000c0)={0xfffffffffffff1d8}, 0x8) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x6000000, 0x3ef, 0x0, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x1000000, 0x0, 0x0, 0x6]}}) connect$l2tp(0xffffffffffffffff, &(0x7f0000000580)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x1, 0x2, 0x0, 0x0, {0xa, 0x4e24, 0x0, @mcast2, 0x5}}}, 0x32) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000004c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000500)='ppp0posix_acl_accessuserposix_acl_access\x00'}, 0x30) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000600), &(0x7f0000000640)=0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000740), &(0x7f0000000780)=0x8) getpgid(0xffffffffffffffff) setpriority(0x1, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}]}) umount2(&(0x7f0000000700)='./file0\x00', 0x2) ioctl$KVM_SET_XSAVE(0xffffffffffffffff, 0x5000aea5, &(0x7f0000000200)={"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"}) setxattr$security_smack_entry(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)='security.SMACK64EXEC\x00', &(0x7f00000007c0)='ntfs\x00', 0x5, 0x1) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e23, @multicast1}, 0x10) 22:58:16 executing program 4: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r6 = gettid() sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x139f605562ecba0b, 0x70, 0x9, 0x6, 0x7fff, 0x4, 0x0, 0x5, 0x400, 0x2, 0x0, 0x4, 0x7, 0x9, 0x1, 0x5, 0x80, 0x5, 0x9, 0x4, 0x9, 0xb61c, 0x7f, 0xffff, 0x7fff, 0xfff, 0x6, 0xfffffffffffffffb, 0x8, 0x6, 0x6, 0xfffffffffffffffd, 0x8, 0x80000001, 0x1ff, 0x1000, 0x4dfc, 0x80, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000500), 0x4}, 0x10020, 0x3f, 0x3, 0x4, 0x8000, 0x7fffffff, 0x5}, r6, 0x6, r1, 0x8) [ 1321.641731] EXT4-fs (loop1): Unsupported filesystem blocksize 0 (29 log_block_size) 22:58:16 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517, 0x0, 0x0, 0x0, 0x18342}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) [ 1321.721536] overlayfs: missing 'workdir' [ 1321.726957] EXT4-fs (loop1): Unsupported filesystem blocksize 0 (29 log_block_size) 22:58:16 executing program 2: mkdir(&(0x7f00000008c0)='./file0\x00', 0x0) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000480)={0xffffffffffffffff}) unlinkat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x0) epoll_pwait(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x8001, &(0x7f00000000c0)={0xfffffffffffff1d8}, 0x8) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x6000000, 0x3ef, 0x0, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x1000000, 0x0, 0x0, 0x6]}}) connect$l2tp(0xffffffffffffffff, &(0x7f0000000580)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x1, 0x2, 0x0, 0x0, {0xa, 0x4e24, 0x0, @mcast2, 0x5}}}, 0x32) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000004c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000500)='ppp0posix_acl_accessuserposix_acl_access\x00'}, 0x30) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000600), &(0x7f0000000640)=0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000740), &(0x7f0000000780)=0x8) getpgid(0xffffffffffffffff) setpriority(0x1, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) umount2(&(0x7f0000000700)='./file0\x00', 0x2) ioctl$KVM_SET_XSAVE(0xffffffffffffffff, 0x5000aea5, &(0x7f0000000200)={"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"}) setxattr$security_smack_entry(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)='security.SMACK64EXEC\x00', &(0x7f00000007c0)='ntfs\x00', 0x5, 0x1) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e23, @multicast1}, 0x10) 22:58:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000280)='./file0\x00', 0x80000001, 0x1, &(0x7f00000002c0)=[{&(0x7f00000000c0)="800000000002000019000000e60100006c680000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1014001, &(0x7f00000003c0)={[{@journal_checksum='journal_checksum'}]}) [ 1321.856096] netlink: 3 bytes leftover after parsing attributes in process `syz-executor5'. 22:58:16 executing program 5: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r6 = gettid() sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x139f605562ecba0b, 0x70, 0x9, 0x6, 0x7fff, 0x4, 0x0, 0x5, 0x400, 0x2, 0x0, 0x4, 0x7, 0x9, 0x1, 0x5, 0x80, 0x5, 0x9, 0x4, 0x9, 0xb61c, 0x7f, 0xffff, 0x7fff, 0xfff, 0x6, 0xfffffffffffffffb, 0x8, 0x6, 0x6, 0xfffffffffffffffd, 0x8, 0x80000001, 0x1ff, 0x1000, 0x4dfc, 0x80, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000500), 0x4}, 0x10020, 0x3f, 0x3, 0x4, 0x8000, 0x7fffffff, 0x5}, r6, 0x6, r1, 0x8) 22:58:16 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517, 0x0, 0x0, 0x0, 0x1830f}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) [ 1321.907432] netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. [ 1321.980316] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1322.010527] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 22:58:17 executing program 4: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r6 = gettid() sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x139f605562ecba0b, 0x70, 0x9, 0x6, 0x7fff, 0x4, 0x0, 0x5, 0x400, 0x2, 0x0, 0x4, 0x7, 0x9, 0x1, 0x5, 0x80, 0x5, 0x9, 0x4, 0x9, 0xb61c, 0x7f, 0xffff, 0x7fff, 0xfff, 0x6, 0xfffffffffffffffb, 0x8, 0x6, 0x6, 0xfffffffffffffffd, 0x8, 0x80000001, 0x1ff, 0x1000, 0x4dfc, 0x80, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000500), 0x4}, 0x10020, 0x3f, 0x3, 0x4, 0x8000, 0x7fffffff, 0x5}, r6, 0x6, r1, 0x8) [ 1322.033597] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock 22:58:17 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x40, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1001, 0x4, 0x7ff, 0x2, 0x0, 0x10000, 0x0, 0xc776, 0x9, 0x1, 0x3, 0xa76, 0x3, 0x3, 0x401, 0x7, 0x200, 0x384, 0x0, 0x200, 0x7f, 0x2, 0x9, 0x7f, 0x4, 0x7ff, 0x2, 0x99a, 0xd, 0x0, 0x0, 0x85e, 0x0, @perf_config_ext={0x0, 0xb6}, 0x10000, 0x79, 0xa2, 0x4, 0x100000000, 0x9, 0xdfa8}, 0x0, 0x10, r0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000240)=""/80) ioctl$TUNSETLINK(r0, 0x400454cd, 0x200) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x200002, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) openat$cgroup_int(r2, &(0x7f0000000040)='io.weight\x00', 0x2, 0x0) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r3, &(0x7f0000000000), 0x17b) 22:58:17 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517, 0x0, 0x0, 0x0, 0x18323}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) [ 1322.079037] EXT4-fs (loop1): can't mount with journal_checksum, fs mounted w/o journal [ 1322.122198] overlayfs: missing 'lowerdir' [ 1322.172721] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1322.197773] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 1322.209253] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1322.242315] EXT4-fs (loop1): can't mount with journal_checksum, fs mounted w/o journal 22:58:17 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517, 0x0, 0x0, 0x0, 0x42830100}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) 22:58:17 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 1322.284467] netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. 22:58:17 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000280)='./file0\x00', 0x80000001, 0x1, &(0x7f00000002c0)=[{&(0x7f00000000c0)="800000000002000019000000e60100006c230000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1014001, &(0x7f00000003c0)={[{@journal_checksum='journal_checksum'}]}) 22:58:17 executing program 2: mkdir(&(0x7f00000008c0)='./file0\x00', 0x0) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000480)={0xffffffffffffffff}) unlinkat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x0) epoll_pwait(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x8001, &(0x7f00000000c0)={0xfffffffffffff1d8}, 0x8) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x6000000, 0x3ef, 0x0, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x1000000, 0x0, 0x0, 0x6]}}) connect$l2tp(0xffffffffffffffff, &(0x7f0000000580)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x1, 0x2, 0x0, 0x0, {0xa, 0x4e24, 0x0, @mcast2, 0x5}}}, 0x32) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000004c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000500)='ppp0posix_acl_accessuserposix_acl_access\x00'}, 0x30) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000600), &(0x7f0000000640)=0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000740), &(0x7f0000000780)=0x8) getpgid(0xffffffffffffffff) setpriority(0x1, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) umount2(&(0x7f0000000700)='./file0\x00', 0x2) ioctl$KVM_SET_XSAVE(0xffffffffffffffff, 0x5000aea5, &(0x7f0000000200)={"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"}) setxattr$security_smack_entry(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)='security.SMACK64EXEC\x00', &(0x7f00000007c0)='ntfs\x00', 0x5, 0x1) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e23, @multicast1}, 0x10) 22:58:17 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517, 0x0, 0x0, 0x0, 0x18348}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) 22:58:17 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x379) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001fbe, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f00000002c0)={0x369, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4}}}, 0x108) fcntl$setstatus(r0, 0x4, 0x2400) 22:58:17 executing program 4: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) gettid() sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) 22:58:17 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x40, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1001, 0x4, 0x7ff, 0x2, 0x0, 0x10000, 0x0, 0xc776, 0x9, 0x1, 0x3, 0xa76, 0x3, 0x3, 0x401, 0x7, 0x200, 0x384, 0x0, 0x200, 0x7f, 0x2, 0x9, 0x7f, 0x4, 0x7ff, 0x2, 0x99a, 0xd, 0x0, 0x0, 0x85e, 0x0, @perf_config_ext={0x0, 0xb6}, 0x10000, 0x79, 0xa2, 0x4, 0x100000000, 0x9, 0xdfa8}, 0x0, 0x10, r0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000240)=""/80) ioctl$TUNSETLINK(r0, 0x400454cd, 0x200) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="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") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='io.weight\x00', 0x2, 0x0) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r2, &(0x7f0000000000), 0x17b) [ 1322.476438] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1322.518106] overlayfs: missing 'lowerdir' [ 1322.527683] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 22:58:17 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517, 0x0, 0x0, 0x0, 0x3583010000000000}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) [ 1322.575356] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1322.605452] EXT4-fs (loop1): can't mount with journal_checksum, fs mounted w/o journal 22:58:17 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517, 0x0, 0x0, 0x0, 0x20000000}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) [ 1322.682221] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1322.719619] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 22:58:17 executing program 2: mkdir(&(0x7f00000008c0)='./file0\x00', 0x0) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000480)={0xffffffffffffffff}) unlinkat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x0) epoll_pwait(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x8001, &(0x7f00000000c0)={0xfffffffffffff1d8}, 0x8) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x6000000, 0x3ef, 0x0, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x1000000, 0x0, 0x0, 0x6]}}) connect$l2tp(0xffffffffffffffff, &(0x7f0000000580)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x1, 0x2, 0x0, 0x0, {0xa, 0x4e24, 0x0, @mcast2, 0x5}}}, 0x32) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000004c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000500)='ppp0posix_acl_accessuserposix_acl_access\x00'}, 0x30) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000600), &(0x7f0000000640)=0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000740), &(0x7f0000000780)=0x8) getpgid(0xffffffffffffffff) setpriority(0x1, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) umount2(&(0x7f0000000700)='./file0\x00', 0x2) ioctl$KVM_SET_XSAVE(0xffffffffffffffff, 0x5000aea5, &(0x7f0000000200)={"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"}) setxattr$security_smack_entry(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)='security.SMACK64EXEC\x00', &(0x7f00000007c0)='ntfs\x00', 0x5, 0x1) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e23, @multicast1}, 0x10) [ 1322.760683] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1322.781856] EXT4-fs (loop1): can't mount with journal_checksum, fs mounted w/o journal 22:58:17 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517, 0x0, 0x0, 0x0, 0x1a830100}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) 22:58:17 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000280)='./file0\x00', 0x80000001, 0x1, &(0x7f00000002c0)=[{&(0x7f00000000c0)="800000000002000019000000e60100006c020000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1014001, &(0x7f00000003c0)={[{@journal_checksum='journal_checksum'}]}) 22:58:18 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517, 0x0, 0x0, 0x0, 0x37830100}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) [ 1322.934362] overlayfs: option "workdir=./file1\" is useless in a non-upper mount, ignore [ 1322.948827] overlayfs: at least 2 lowerdir are needed while upperdir nonexistent [ 1322.988652] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1323.003861] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 1323.016378] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1323.029606] EXT4-fs (loop1): can't mount with journal_checksum, fs mounted w/o journal 22:58:18 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517, 0x0, 0x0, 0x0, 0x34830100}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) [ 1323.111750] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1323.136280] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 22:58:18 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517, 0x0, 0x0, 0x0, 0x18321}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) [ 1323.159691] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1323.169676] EXT4-fs (loop1): can't mount with journal_checksum, fs mounted w/o journal 22:58:18 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000280)='./file0\x00', 0x80000001, 0x1, &(0x7f00000002c0)=[{&(0x7f00000000c0)="800000000002000019000000e60100006c0000004c0000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1014001, &(0x7f00000003c0)={[{@journal_checksum='journal_checksum'}]}) [ 1323.337408] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1323.352783] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1323.373540] EXT4-fs (loop1): group descriptors corrupted! 22:58:18 executing program 5: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = gettid() wait4(0x0, &(0x7f00000003c0), 0x80000000, &(0x7f0000000340)) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast2, @mcast1, @mcast2, 0x0, 0x0, 0x0, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) [ 1323.408019] netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. [ 1323.442687] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 22:58:18 executing program 4: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r6 = gettid() sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x139f605562ecba0b, 0x70, 0x9, 0x6, 0x7fff, 0x4, 0x0, 0x5, 0x400, 0x2, 0x0, 0x4, 0x7, 0x9, 0x1, 0x5, 0x80, 0x5, 0x9, 0x4, 0x9, 0xb61c, 0x7f, 0xffff, 0x7fff, 0xfff, 0x6, 0xfffffffffffffffb, 0x8, 0x6, 0x6, 0xfffffffffffffffd, 0x8, 0x80000001, 0x1ff, 0x1000, 0x4dfc, 0x80, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000500), 0x4}, 0x10020, 0x3f, 0x3, 0x4, 0x8000, 0x7fffffff, 0x5}, r6, 0x6, r1, 0x8) [ 1323.468306] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1323.494250] EXT4-fs (loop1): group descriptors corrupted! [ 1323.516997] device nr0 entered promiscuous mode [ 1324.285925] netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. 22:58:19 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x40, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1001, 0x4, 0x7ff, 0x2, 0x0, 0x10000, 0x0, 0xc776, 0x9, 0x1, 0x3, 0xa76, 0x3, 0x3, 0x401, 0x7, 0x200, 0x384, 0x0, 0x200, 0x7f, 0x2, 0x9, 0x7f, 0x4, 0x7ff, 0x2, 0x99a, 0xd, 0x0, 0x0, 0x85e, 0x0, @perf_config_ext={0x0, 0xb6}, 0x10000, 0x79, 0xa2, 0x4, 0x100000000, 0x9, 0xdfa8}, 0x0, 0x10, r0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000240)=""/80) ioctl$TUNSETLINK(r0, 0x400454cd, 0x200) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="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") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) openat$cgroup_int(r2, &(0x7f0000000040)='io.weight\x00', 0x2, 0x0) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r3, &(0x7f0000000000), 0x17b) 22:58:19 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517, 0x0, 0x0, 0x0, 0x2683010000000000}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) 22:58:19 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000280)='./file0\x00', 0x80000001, 0x1, &(0x7f00000002c0)=[{&(0x7f00000000c0)="800000000002000019000000e60100006c0000006c0000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1014001, &(0x7f00000003c0)={[{@journal_checksum='journal_checksum'}]}) 22:58:19 executing program 2: mkdir(&(0x7f00000008c0)='./file0\x00', 0x0) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000480)={0xffffffffffffffff}) unlinkat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x0) epoll_pwait(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x8001, &(0x7f00000000c0)={0xfffffffffffff1d8}, 0x8) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x6000000, 0x3ef, 0x0, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x1000000, 0x0, 0x0, 0x6]}}) connect$l2tp(0xffffffffffffffff, &(0x7f0000000580)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x1, 0x2, 0x0, 0x0, {0xa, 0x4e24, 0x0, @mcast2, 0x5}}}, 0x32) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000004c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000500)='ppp0posix_acl_accessuserposix_acl_access\x00'}, 0x30) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000600), &(0x7f0000000640)=0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000740), &(0x7f0000000780)=0x8) getpgid(0xffffffffffffffff) setpriority(0x1, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) umount2(&(0x7f0000000700)='./file0\x00', 0x0) ioctl$KVM_SET_XSAVE(0xffffffffffffffff, 0x5000aea5, &(0x7f0000000200)={"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"}) setxattr$security_smack_entry(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)='security.SMACK64EXEC\x00', &(0x7f00000007c0)='ntfs\x00', 0x5, 0x1) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e23, @multicast1}, 0x10) 22:58:19 executing program 4: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r6 = gettid() sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x139f605562ecba0b, 0x70, 0x9, 0x6, 0x7fff, 0x4, 0x0, 0x5, 0x400, 0x2, 0x0, 0x4, 0x7, 0x9, 0x1, 0x5, 0x80, 0x5, 0x9, 0x4, 0x9, 0xb61c, 0x7f, 0xffff, 0x7fff, 0xfff, 0x6, 0xfffffffffffffffb, 0x8, 0x6, 0x6, 0xfffffffffffffffd, 0x8, 0x80000001, 0x1ff, 0x1000, 0x4dfc, 0x80, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000500), 0x4}, 0x10020, 0x3f, 0x3, 0x4, 0x8000, 0x7fffffff, 0x5}, r6, 0x6, r1, 0x8) [ 1324.818773] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1324.834206] netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. 22:58:19 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517, 0x0, 0x0, 0x0, 0x74000000}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) [ 1324.861999] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1324.908890] overlayfs: failed to resolve './file1': -2 [ 1324.919891] EXT4-fs (loop1): group descriptors corrupted! 22:58:20 executing program 4: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r6 = gettid() sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x139f605562ecba0b, 0x70, 0x9, 0x6, 0x7fff, 0x4, 0x0, 0x5, 0x400, 0x2, 0x0, 0x4, 0x7, 0x9, 0x1, 0x5, 0x80, 0x5, 0x9, 0x4, 0x9, 0xb61c, 0x7f, 0xffff, 0x7fff, 0xfff, 0x6, 0xfffffffffffffffb, 0x8, 0x6, 0x6, 0xfffffffffffffffd, 0x8, 0x80000001, 0x1ff, 0x1000, 0x4dfc, 0x80, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000500), 0x4}, 0x10020, 0x3f, 0x3, 0x4, 0x8000, 0x7fffffff, 0x5}, r6, 0x6, r1, 0x8) 22:58:20 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517, 0x0, 0x0, 0x0, 0x4283010000000000}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) 22:58:20 executing program 2: mkdir(&(0x7f00000008c0)='./file0\x00', 0x0) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000480)={0xffffffffffffffff}) unlinkat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x0) epoll_pwait(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x8001, &(0x7f00000000c0)={0xfffffffffffff1d8}, 0x8) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x6000000, 0x3ef, 0x0, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x1000000, 0x0, 0x0, 0x6]}}) connect$l2tp(0xffffffffffffffff, &(0x7f0000000580)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x1, 0x2, 0x0, 0x0, {0xa, 0x4e24, 0x0, @mcast2, 0x5}}}, 0x32) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000004c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000500)='ppp0posix_acl_accessuserposix_acl_access\x00'}, 0x30) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000600), &(0x7f0000000640)=0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000740), &(0x7f0000000780)=0x8) getpgid(0xffffffffffffffff) setpriority(0x1, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) umount2(&(0x7f0000000700)='./file0\x00', 0x2) ioctl$KVM_SET_XSAVE(0xffffffffffffffff, 0x5000aea5, &(0x7f0000000200)={"f519c26b46710ca78e04d78c1919b555b36974efefd12a5f693fed32d32e4afb3b7acb8d05ff620fa450096177657adaf73e6281a99f2bd97da49be3c011a372ccd10467917c62526764ecce731d7daa44a7b4747f9bdd3a837565958c32d3b04de8745247696a320a7cc3d8d19cd7c8ac7eadd62713f27ab43d88d64439b4e4984214a4e06891cd37992574d2678c56fcda8399ab173613bc35d0a53e617c4d3dc3a078f643883bcf028a87441630dc1972a204830674e678a1051c4aac49f040cda971395717c516e6c05b7722f69ecafade2054088b147e35675af272afaeff24cff4880243832d9099038e7df06bb1ad162678bf9952aa5ab758714e4a0aa8114c51f33af2fa1632a9cac985bf40f38e5cdfe7b57d2ad9cb47d13b7d7e20e61c5a7597d586c54961d9d2af6670ab9538c34d2a86d0123077fcd9a36861504535e944aa0cf07b56687b583afb6fa07fb62c2a9e11822c8e09234a001f8bc7fe17a83a22e1b02a31ba85d04e72c2f2d4942d264c12eab0b3bc6116ac23c1df6dfd4a46b254fc2fa97439637a80b23a8d0103ac9b012fcca76750b68cb9f891a32bf2e1f1f4b50af28f7b698d0486d8ba39c85d894d906c4beaf4287577a212f05db8dd0fca4d7a6cc9185e7bf0f6197918d8df2d8f85178bed4a374249b472f0f43daeebea2ca6f3cc98c851858b7d6d3d17d98afb79798849b076a73f46574b0f206bbcc9f0fbb90347df3d259ee0f2a2b13bbf88c9d3f522dacd1c466b0681e4b36fc0e37f7426a7ca42976d56fa7c0418d80e3395808768b7cc2441dd1f1f7c69322abb61fa35986daa55a30150b8e09ac6ca29def750ec6481cc5eb865b94121739babb9113065963d64b6743e307207970c4d40196a1fec59fe996efd6d9f223225af228f00bc1dd97c26feb91dd07ef3e6de2e79d44558f9741ef37e0c92689529fd5397319336c4d40a643d3858a0727dce2f39805724089b61b5d4c12e8c10c7f3809ae80fc3c6c54d404e909e33e0f0014501b7f4a05d972fd48f5b8dbcb847be5cbdb0b0621d9ece9fb14d748ee9c522fee9dbc371d72acdd2c9400eb50e1d1336497c12d1f58cd71c60c9ee14a47131af699dbe20928c8616dfae9b14ea92d64ee0b9b57e52f013e436005f0507784cf8fda98e01bcb5471c551e4bf9a0da52b6c310206b464914ac8fcd36a2e2f1c40d0b55ecf1dff89fada96105318e01bc23f52afab72e078c9eabf31620092919d692dd7836d1bae2d65a5b8be79e6d92128a7a43f19bbf6e45033530ec4db8f5c25206fd96c141de7744ef07142800d75984e24f9d92f4e4be723539bd07a6ab29e1a055de36e360d16254e193c3532df960f30527737b5d538969ef54d923b2a333564a256fe9872cad4cdbe4e635ec31ef75f0571bdd496962905f3a57ba778b04240167eed7976043"}) setxattr$security_smack_entry(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)='security.SMACK64EXEC\x00', &(0x7f00000007c0)='ntfs\x00', 0x5, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e23, @multicast1}, 0x10) 22:58:20 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517, 0x0, 0x0, 0x0, 0x48830100}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) 22:58:20 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000008ff3)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) 22:58:20 executing program 4: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r6 = gettid() sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x139f605562ecba0b, 0x70, 0x9, 0x6, 0x7fff, 0x4, 0x0, 0x5, 0x400, 0x2, 0x0, 0x4, 0x7, 0x9, 0x1, 0x5, 0x80, 0x5, 0x9, 0x4, 0x9, 0xb61c, 0x7f, 0xffff, 0x7fff, 0xfff, 0x6, 0xfffffffffffffffb, 0x8, 0x6, 0x6, 0xfffffffffffffffd, 0x8, 0x80000001, 0x1ff, 0x1000, 0x4dfc, 0x80, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000500), 0x4}, 0x10020, 0x3f, 0x3, 0x4, 0x8000, 0x7fffffff, 0x5}, r6, 0x6, r1, 0x8) [ 1325.429552] overlayfs: failed to resolve './file1': -2 [ 1325.541521] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1325.565350] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1325.607023] EXT4-fs (loop1): group descriptors corrupted! [ 1325.824843] IPVS: ftp: loaded support on port[0] = 21 22:58:21 executing program 4: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r6 = gettid() sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x139f605562ecba0b, 0x70, 0x9, 0x6, 0x7fff, 0x4, 0x0, 0x5, 0x400, 0x2, 0x0, 0x4, 0x7, 0x9, 0x1, 0x5, 0x80, 0x5, 0x9, 0x4, 0x9, 0xb61c, 0x7f, 0xffff, 0x7fff, 0xfff, 0x6, 0xfffffffffffffffb, 0x8, 0x6, 0x6, 0xfffffffffffffffd, 0x8, 0x80000001, 0x1ff, 0x1000, 0x4dfc, 0x80, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000500), 0x4}, 0x10020, 0x3f, 0x3, 0x4, 0x8000, 0x7fffffff, 0x5}, r6, 0x6, r1, 0x8) 22:58:21 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517, 0x0, 0x0, 0x0, 0x3483010000000000}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) 22:58:21 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000280)='./file0\x00', 0x80000001, 0x1, &(0x7f00000002c0)=[{&(0x7f00000000c0)="800000000002000019000000e60100006c00000000000025f600000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1014001, &(0x7f00000003c0)={[{@journal_checksum='journal_checksum'}]}) 22:58:21 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x40, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1001, 0x4, 0x7ff, 0x2, 0x0, 0x10000, 0x0, 0xc776, 0x9, 0x1, 0x3, 0xa76, 0x3, 0x3, 0x401, 0x7, 0x200, 0x384, 0x0, 0x200, 0x7f, 0x2, 0x9, 0x7f, 0x4, 0x7ff, 0x2, 0x99a, 0xd, 0x0, 0x0, 0x85e, 0x0, @perf_config_ext={0x0, 0xb6}, 0x10000, 0x79, 0xa2, 0x4, 0x100000000, 0x9, 0xdfa8}, 0x0, 0x10, r0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000240)=""/80) ioctl$TUNSETLINK(r0, 0x400454cd, 0x200) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="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") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) openat$cgroup_int(r2, &(0x7f0000000040)='io.weight\x00', 0x2, 0x0) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r3, &(0x7f0000000000), 0x17b) 22:58:21 executing program 2: mkdir(&(0x7f00000008c0)='./file0\x00', 0x0) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000480)={0xffffffffffffffff}) unlinkat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x0) epoll_pwait(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x8001, &(0x7f00000000c0)={0xfffffffffffff1d8}, 0x8) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x6000000, 0x3ef, 0x0, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x1000000, 0x0, 0x0, 0x6]}}) connect$l2tp(0xffffffffffffffff, &(0x7f0000000580)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x1, 0x2, 0x0, 0x0, {0xa, 0x4e24, 0x0, @mcast2, 0x5}}}, 0x32) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000004c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000500)='ppp0posix_acl_accessuserposix_acl_access\x00'}, 0x30) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000600), &(0x7f0000000640)=0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000740), &(0x7f0000000780)=0x8) getpgid(0xffffffffffffffff) setpriority(0x1, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) umount2(&(0x7f0000000700)='./file0\x00', 0x2) ioctl$KVM_SET_XSAVE(0xffffffffffffffff, 0x5000aea5, &(0x7f0000000200)={"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"}) setxattr$security_smack_entry(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)='security.SMACK64EXEC\x00', &(0x7f00000007c0)='ntfs\x00', 0x5, 0x1) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) 22:58:21 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517, 0x0, 0x0, 0x0, 0x4e83010000000000}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) [ 1326.535334] EXT4-fs (loop1): Unsupported filesystem blocksize 0 (246 log_block_size) 22:58:21 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517, 0x0, 0x0, 0x0, 0x23830100}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) [ 1326.630713] EXT4-fs (loop1): Unsupported filesystem blocksize 0 (246 log_block_size) [ 1326.655435] overlayfs: failed to resolve './file1': -2 22:58:21 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000280)='./file0\x00', 0x80000001, 0x1, &(0x7f00000002c0)=[{&(0x7f00000000c0)="800000000002000019000000e60100006c000000000002040000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1014001, &(0x7f00000003c0)={[{@journal_checksum='journal_checksum'}]}) 22:58:21 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517, 0x0, 0x0, 0x0, 0x3c830100}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) [ 1326.811042] EXT4-fs (loop1): fragment/cluster size (2048) != block size (1024) 22:58:21 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517, 0x0, 0x0, 0x0, 0x600}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) [ 1326.881573] EXT4-fs (loop1): fragment/cluster size (2048) != block size (1024) [ 1327.248665] netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. [ 1329.565366] device bridge_slave_1 left promiscuous mode [ 1329.577784] bridge0: port 2(bridge_slave_1) entered disabled state [ 1329.638568] device bridge_slave_0 left promiscuous mode [ 1329.644099] bridge0: port 1(bridge_slave_0) entered disabled state [ 1334.250573] team0 (unregistering): Port device team_slave_1 removed [ 1334.264650] team0 (unregistering): Port device team_slave_0 removed [ 1334.280204] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1334.337880] device bond_slave_1 left promiscuous mode [ 1334.351238] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1334.408497] device bond_slave_0 left promiscuous mode [ 1334.465344] bond0 (unregistering): Released all slaves [ 1334.787201] bridge0: port 1(bridge_slave_0) entered blocking state [ 1334.807723] bridge0: port 1(bridge_slave_0) entered disabled state [ 1334.815182] device bridge_slave_0 entered promiscuous mode [ 1334.900460] bridge0: port 2(bridge_slave_1) entered blocking state [ 1334.906914] bridge0: port 2(bridge_slave_1) entered disabled state [ 1334.914804] device bridge_slave_1 entered promiscuous mode [ 1334.998061] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1335.106742] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1335.363457] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1335.415544] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1335.717741] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1335.725195] team0: Port device team_slave_0 added [ 1335.791167] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1335.798847] team0: Port device team_slave_1 added [ 1335.897964] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1335.905394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1335.918410] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1336.050287] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1336.179636] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1336.186843] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1336.208478] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1336.308065] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1336.315282] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1336.338474] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1337.262486] bridge0: port 2(bridge_slave_1) entered blocking state [ 1337.268955] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1337.275652] bridge0: port 1(bridge_slave_0) entered blocking state [ 1337.282136] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1337.290723] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1337.587814] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1339.265185] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1339.448719] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1339.629953] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1339.636151] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1339.653278] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1339.820813] 8021q: adding VLAN 0 to HW filter on device team0 22:58:35 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") recvmmsg(0xffffffffffffff9c, &(0x7f0000001840)=[{{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f00000014c0)=""/87, 0x57}, {&(0x7f0000001540)=""/11, 0xb}], 0x2, &(0x7f0000001600)=""/133, 0x85}}], 0x1, 0x0, &(0x7f0000006500)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmmsg(r1, &(0x7f0000000640), 0x40000000000029b, 0x9a02) 22:58:35 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000280)='./file0\x00', 0x80000001, 0x1, &(0x7f00000002c0)=[{&(0x7f00000000c0)="800000000002000019000000e60100006cffffffffffffffff00000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1014001, &(0x7f00000003c0)={[{@journal_checksum='journal_checksum'}]}) 22:58:35 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517, 0x0, 0x0, 0x0, 0x1833c}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) 22:58:35 executing program 4: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r6 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x139f605562ecba0b, 0x70, 0x9, 0x6, 0x7fff, 0x4, 0x0, 0x5, 0x400, 0x2, 0x0, 0x4, 0x7, 0x9, 0x1, 0x5, 0x80, 0x5, 0x9, 0x4, 0x9, 0xb61c, 0x7f, 0xffff, 0x7fff, 0xfff, 0x6, 0xfffffffffffffffb, 0x8, 0x6, 0x6, 0xfffffffffffffffd, 0x8, 0x80000001, 0x1ff, 0x1000, 0x4dfc, 0x80, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000500), 0x4}, 0x10020, 0x3f, 0x3, 0x4, 0x8000, 0x7fffffff, 0x5}, r6, 0x6, r1, 0x8) 22:58:35 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f00004c0000)={0xa, 0x3, 0x0, @ipv4}, 0x1c) syz_genetlink_get_family_id$fou(&(0x7f0000000180)='fou\x00') listen(r1, 0x43) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e21, @multicast1}}, 0x0, 0x0, 0x7f, 0xfff}, &(0x7f00000000c0)=0x98) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f00000002c0)={0x0, 0xd, "2549052811da333d2c17b8c749"}, &(0x7f0000000100)=0x15) r2 = socket$inet6_sctp(0xa, 0x4000000000000001, 0x84) sendto$inet6(r2, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f0000000380)={0xa, 0x3, 0x0, @loopback}, 0x1c) r3 = accept(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) setsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000140)={0x0, 0xffffffffffff0145}, 0x14) 22:58:35 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x40, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1001, 0x4, 0x7ff, 0x2, 0x0, 0x10000, 0x0, 0xc776, 0x9, 0x1, 0x3, 0xa76, 0x3, 0x3, 0x401, 0x7, 0x200, 0x384, 0x0, 0x200, 0x7f, 0x2, 0x9, 0x7f, 0x4, 0x7ff, 0x2, 0x99a, 0xd, 0x0, 0x0, 0x85e, 0x0, @perf_config_ext={0x0, 0xb6}, 0x10000, 0x79, 0xa2, 0x4, 0x100000000, 0x9, 0xdfa8}, 0x0, 0x10, r0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000240)=""/80) ioctl$TUNSETLINK(r0, 0x400454cd, 0x200) close(0xffffffffffffffff) socket$kcm(0x2, 0x3, 0x2) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000780)="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") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) openat$cgroup_int(r1, &(0x7f0000000040)='io.weight\x00', 0x2, 0x0) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r2, &(0x7f0000000000), 0x17b) [ 1340.959366] EXT4-fs (loop1): Unsupported filesystem blocksize 0 (255 log_block_size) 22:58:36 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517, 0x0, 0x0, 0x0, 0x18345}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) [ 1341.043770] netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. 22:58:36 executing program 4: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x139f605562ecba0b, 0x70, 0x9, 0x6, 0x7fff, 0x4, 0x0, 0x5, 0x400, 0x2, 0x0, 0x4, 0x7, 0x9, 0x1, 0x5, 0x80, 0x5, 0x9, 0x4, 0x9, 0xb61c, 0x7f, 0xffff, 0x7fff, 0xfff, 0x6, 0xfffffffffffffffb, 0x8, 0x6, 0x6, 0xfffffffffffffffd, 0x8, 0x80000001, 0x1ff, 0x1000, 0x4dfc, 0x80, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000500), 0x4}, 0x10020, 0x3f, 0x3, 0x4, 0x8000, 0x7fffffff, 0x5}, 0x0, 0x6, r1, 0x8) [ 1341.093519] EXT4-fs (loop1): Unsupported filesystem blocksize 0 (255 log_block_size) 22:58:36 executing program 5: capset(&(0x7f0000000080)={0x20080522}, &(0x7f0000002000)) r0 = getpgrp(0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000000)) 22:58:36 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000280)='./file0\x00', 0x80000001, 0x1, &(0x7f00000002c0)=[{&(0x7f00000000c0)="800000000002000019000000e60100006c740000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1014001, &(0x7f00000003c0)={[{@journal_checksum='journal_checksum'}]}) 22:58:36 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517, 0x0, 0x0, 0x0, 0x18324}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) 22:58:36 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x40, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1001, 0x4, 0x7ff, 0x2, 0x0, 0x10000, 0x0, 0xc776, 0x9, 0x1, 0x3, 0xa76, 0x3, 0x3, 0x401, 0x7, 0x200, 0x384, 0x0, 0x200, 0x7f, 0x2, 0x9, 0x7f, 0x4, 0x7ff, 0x2, 0x99a, 0xd, 0x0, 0x0, 0x85e, 0x0, @perf_config_ext={0x0, 0xb6}, 0x10000, 0x79, 0xa2, 0x4, 0x100000000, 0x9, 0xdfa8}, 0x0, 0x10, r0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000240)=""/80) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="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") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) openat$cgroup_int(r2, &(0x7f0000000040)='io.weight\x00', 0x2, 0x0) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r3, &(0x7f0000000000), 0x17b) [ 1341.300014] netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. [ 1341.325357] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1341.348155] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 1341.384524] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock 22:58:36 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, &(0x7f0000000380)) clone(0x210007fa, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) sendmsg$xdp(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f00000003c0), 0x10, &(0x7f0000003740)}, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000000c0)=ANY=[]) 22:58:36 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517, 0x0, 0x0, 0x0, 0x7a00}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) 22:58:36 executing program 2: clock_settime(0x5, &(0x7f0000000040)) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f0000000200)={0x18, 0x0, 0x2}, 0x18) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000240)=0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x3, 0x0, 0x101, 0x2, 0x0, 0xffffffffffffff6f, 0x0, 0x2, 0x6, 0x0, 0x81, 0x3, 0x10000000002, 0xffffffffffff0001, 0x1, 0x400000ea89, 0xfffffffffffffffd, 0x7, 0x4, 0x1ff0000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x100000000, 0x4, 0x1000, 0x3f, 0x5, 0x0, 0x3, 0x0, 0xec8, 0x0, 0xd0, 0x0, @perf_config_ext={0x5}, 0x204, 0x3, 0x7, 0x0, 0x7f}, r1, 0x9, r0, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) tkill(r1, 0x2) syz_mount_image$msdos(&(0x7f0000000500)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f0000000540)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000580)=ANY=[]) creat(&(0x7f0000000600)='./bus\x00', 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000480)='./bus\x00', 0x200) syz_mount_image$msdos(&(0x7f0000000140)='msdos\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f00000003c0)=ANY=[]) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f00000000c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000640)='./file0\x00', 0x0) [ 1341.397932] EXT4-fs (loop1): can't mount with journal_checksum, fs mounted w/o journal 22:58:36 executing program 4: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) r6 = gettid() sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x139f605562ecba0b, 0x70, 0x9, 0x6, 0x7fff, 0x4, 0x0, 0x5, 0x400, 0x2, 0x0, 0x4, 0x7, 0x9, 0x1, 0x5, 0x80, 0x5, 0x9, 0x4, 0x9, 0xb61c, 0x7f, 0xffff, 0x7fff, 0xfff, 0x6, 0xfffffffffffffffb, 0x8, 0x6, 0x6, 0xfffffffffffffffd, 0x8, 0x80000001, 0x1ff, 0x1000, 0x4dfc, 0x80, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000500), 0x4}, 0x10020, 0x3f, 0x3, 0x4, 0x8000, 0x7fffffff, 0x5}, r6, 0x6, r1, 0x8) [ 1341.478322] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1341.496067] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 1341.529321] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1341.545287] QAT: Invalid ioctl 22:58:36 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) syz_mount_image$hfsplus(&(0x7f0000000080)='hfsplus\x00', &(0x7f0000000100)='./file0\x00', 0x779, 0x1, &(0x7f0000000480)=[{&(0x7f0000000800)}], 0x400, &(0x7f0000000540)={[{@nobarrier='nobarrier'}], [{@func={'func', 0x3d, 'POLICY_CHECK'}}, {@context={'context', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'vmnet1user]%}userlo!GPL.['}}]}) [ 1341.590651] device nr0 entered promiscuous mode [ 1341.633519] QAT: Invalid ioctl 22:58:36 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517, 0x0, 0x0, 0x0, 0x2000000000000000}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) 22:58:36 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000280)='./file0\x00', 0x80000001, 0x1, &(0x7f00000002c0)=[{&(0x7f00000000c0)="800000000002000019000000e60100006cf9fdffff0000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1014001, &(0x7f00000003c0)={[{@journal_checksum='journal_checksum'}]}) [ 1341.687397] netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. [ 1341.709776] hfsplus: unable to parse mount options 22:58:36 executing program 2: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x139f605562ecba0b, 0x70, 0x9, 0x6, 0x7fff, 0x4, 0x0, 0x5, 0x400, 0x2, 0x0, 0x4, 0x7, 0x9, 0x1, 0x5, 0x80, 0x5, 0x9, 0x4, 0x9, 0xb61c, 0x7f, 0xffff, 0x7fff, 0xfff, 0x6, 0xfffffffffffffffb, 0x8, 0x6, 0x6, 0xfffffffffffffffd, 0x8, 0x80000001, 0x1ff, 0x1000, 0x4dfc, 0x80, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000500), 0x4}, 0x10020, 0x3f, 0x3, 0x4, 0x8000, 0x7fffffff, 0x5}, 0x0, 0x6, r1, 0x8) 22:58:36 executing program 4: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r6 = gettid() sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x139f605562ecba0b, 0x70, 0x9, 0x6, 0x7fff, 0x4, 0x0, 0x5, 0x400, 0x2, 0x0, 0x4, 0x7, 0x9, 0x1, 0x5, 0x80, 0x5, 0x9, 0x4, 0x9, 0xb61c, 0x7f, 0xffff, 0x7fff, 0xfff, 0x6, 0xfffffffffffffffb, 0x8, 0x6, 0x6, 0xfffffffffffffffd, 0x8, 0x80000001, 0x1ff, 0x1000, 0x4dfc, 0x80, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000500), 0x4}, 0x10020, 0x3f, 0x3, 0x4, 0x8000, 0x7fffffff, 0x5}, r6, 0x6, r1, 0x8) [ 1341.748953] hfsplus: unable to parse mount options [ 1341.789189] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 22:58:36 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517, 0x0, 0x0, 0x0, 0x40830100}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) 22:58:36 executing program 5: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r6 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x139f605562ecba0b, 0x70, 0x9, 0x6, 0x7fff, 0x4, 0x0, 0x5, 0x400, 0x2, 0x0, 0x4, 0x7, 0x9, 0x1, 0x5, 0x80, 0x5, 0x9, 0x4, 0x9, 0xb61c, 0x7f, 0xffff, 0x7fff, 0xfff, 0x6, 0xfffffffffffffffb, 0x8, 0x6, 0x6, 0xfffffffffffffffd, 0x8, 0x80000001, 0x1ff, 0x1000, 0x4dfc, 0x80, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000500), 0x4}, 0x10020, 0x3f, 0x3, 0x4, 0x8000, 0x7fffffff, 0x5}, r6, 0x6, r1, 0x8) [ 1341.901217] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1341.950231] EXT4-fs (loop1): group descriptors corrupted! [ 1342.054053] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1342.084505] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1342.117640] EXT4-fs (loop1): group descriptors corrupted! [ 1342.446925] device lo entered promiscuous mode [ 1342.962353] netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. [ 1342.975208] netlink: 3 bytes leftover after parsing attributes in process `syz-executor2'. [ 1342.991397] device lo entered promiscuous mode [ 1343.005933] netlink: 3 bytes leftover after parsing attributes in process `syz-executor5'. 22:58:38 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000280)='./file0\x00', 0x80000001, 0x1, &(0x7f00000002c0)=[{&(0x7f00000000c0)="800000000002000019000000e60100006c060000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1014001, &(0x7f00000003c0)={[{@journal_checksum='journal_checksum'}]}) 22:58:38 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517, 0x0, 0x0, 0x0, 0x7a00000000000000}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) 22:58:38 executing program 4: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r6 = gettid() sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x139f605562ecba0b, 0x70, 0x9, 0x6, 0x7fff, 0x4, 0x0, 0x5, 0x400, 0x2, 0x0, 0x4, 0x7, 0x9, 0x1, 0x5, 0x80, 0x5, 0x9, 0x4, 0x9, 0xb61c, 0x7f, 0xffff, 0x7fff, 0xfff, 0x6, 0xfffffffffffffffb, 0x8, 0x6, 0x6, 0xfffffffffffffffd, 0x8, 0x80000001, 0x1ff, 0x1000, 0x4dfc, 0x80, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000500), 0x4}, 0x10020, 0x3f, 0x3, 0x4, 0x8000, 0x7fffffff, 0x5}, r6, 0x6, r1, 0x8) 22:58:38 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x40, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1001, 0x4, 0x7ff, 0x2, 0x0, 0x10000, 0x0, 0xc776, 0x9, 0x1, 0x3, 0xa76, 0x3, 0x3, 0x401, 0x7, 0x200, 0x384, 0x0, 0x200, 0x7f, 0x2, 0x9, 0x7f, 0x4, 0x7ff, 0x2, 0x99a, 0xd, 0x0, 0x0, 0x85e, 0x0, @perf_config_ext={0x0, 0xb6}, 0x10000, 0x79, 0xa2, 0x4, 0x100000000, 0x9, 0xdfa8}, 0x0, 0x10, r0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000240)=""/80) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="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") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) openat$cgroup_int(r2, &(0x7f0000000040)='io.weight\x00', 0x2, 0x0) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r3, &(0x7f0000000000), 0x17b) 22:58:38 executing program 2: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x139f605562ecba0b, 0x70, 0x9, 0x6, 0x7fff, 0x4, 0x0, 0x5, 0x400, 0x2, 0x0, 0x4, 0x7, 0x9, 0x1, 0x5, 0x80, 0x5, 0x9, 0x4, 0x9, 0xb61c, 0x7f, 0xffff, 0x7fff, 0xfff, 0x6, 0xfffffffffffffffb, 0x8, 0x6, 0x6, 0xfffffffffffffffd, 0x8, 0x80000001, 0x1ff, 0x1000, 0x4dfc, 0x80, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000500), 0x4}, 0x10020, 0x3f, 0x3, 0x4, 0x8000, 0x7fffffff, 0x5}, 0x0, 0x6, r1, 0x8) 22:58:38 executing program 5: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r6 = gettid() sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x139f605562ecba0b, 0x70, 0x9, 0x6, 0x7fff, 0x4, 0x0, 0x5, 0x400, 0x2, 0x0, 0x4, 0x7, 0x9, 0x1, 0x5, 0x80, 0x5, 0x9, 0x4, 0x9, 0xb61c, 0x7f, 0xffff, 0x7fff, 0xfff, 0x6, 0xfffffffffffffffb, 0x8, 0x6, 0x6, 0xfffffffffffffffd, 0x8, 0x80000001, 0x1ff, 0x1000, 0x4dfc, 0x80, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000500), 0x4}, 0x10020, 0x3f, 0x3, 0x4, 0x8000, 0x7fffffff, 0x5}, r6, 0x6, r1, 0x8) [ 1343.148707] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 22:58:38 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517, 0x0, 0x0, 0x0, 0x3a830100}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) [ 1343.191339] netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. [ 1343.218016] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 1343.242283] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1343.276237] netlink: 3 bytes leftover after parsing attributes in process `syz-executor2'. 22:58:38 executing program 4: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r6 = gettid() sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x139f605562ecba0b, 0x70, 0x9, 0x6, 0x7fff, 0x4, 0x0, 0x5, 0x400, 0x2, 0x0, 0x4, 0x7, 0x9, 0x1, 0x5, 0x80, 0x5, 0x9, 0x4, 0x9, 0xb61c, 0x7f, 0xffff, 0x7fff, 0xfff, 0x6, 0xfffffffffffffffb, 0x8, 0x6, 0x6, 0xfffffffffffffffd, 0x8, 0x80000001, 0x1ff, 0x1000, 0x4dfc, 0x80, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000500), 0x4}, 0x10020, 0x3f, 0x3, 0x4, 0x8000, 0x7fffffff, 0x5}, r6, 0x6, r1, 0x8) [ 1343.295596] EXT4-fs (loop1): can't mount with journal_checksum, fs mounted w/o journal [ 1343.306404] netlink: 3 bytes leftover after parsing attributes in process `syz-executor5'. 22:58:38 executing program 2: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r6 = gettid() sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x139f605562ecba0b, 0x70, 0x9, 0x6, 0x7fff, 0x4, 0x0, 0x5, 0x400, 0x2, 0x0, 0x4, 0x7, 0x9, 0x1, 0x5, 0x80, 0x5, 0x9, 0x4, 0x9, 0xb61c, 0x7f, 0xffff, 0x7fff, 0xfff, 0x6, 0xfffffffffffffffb, 0x8, 0x6, 0x6, 0xfffffffffffffffd, 0x8, 0x80000001, 0x1ff, 0x1000, 0x4dfc, 0x80, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000500), 0x4}, 0x10020, 0x3f, 0x3, 0x4, 0x8000, 0x7fffffff, 0x5}, r6, 0x6, r1, 0x8) 22:58:38 executing program 5: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r6 = gettid() sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x139f605562ecba0b, 0x70, 0x9, 0x6, 0x7fff, 0x4, 0x0, 0x5, 0x400, 0x2, 0x0, 0x4, 0x7, 0x9, 0x1, 0x5, 0x80, 0x5, 0x9, 0x4, 0x9, 0xb61c, 0x7f, 0xffff, 0x7fff, 0xfff, 0x6, 0xfffffffffffffffb, 0x8, 0x6, 0x6, 0xfffffffffffffffd, 0x8, 0x80000001, 0x1ff, 0x1000, 0x4dfc, 0x80, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000500), 0x4}, 0x10020, 0x3f, 0x3, 0x4, 0x8000, 0x7fffffff, 0x5}, r6, 0x6, r1, 0x8) [ 1343.411925] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 22:58:38 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517, 0x0, 0x0, 0x0, 0xd830100}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) [ 1343.483799] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 1343.518902] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1343.528569] EXT4-fs (loop1): can't mount with journal_checksum, fs mounted w/o journal [ 1343.566260] device nr0 entered promiscuous mode 22:58:38 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000280)='./file0\x00', 0x80000001, 0x1, &(0x7f00000002c0)=[{&(0x7f00000000c0)="800000000002000019000000e60100006c000204000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1014001, &(0x7f00000003c0)={[{@journal_checksum='journal_checksum'}]}) [ 1343.622493] netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. 22:58:38 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517, 0x0, 0x0, 0x0, 0xf0}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) 22:58:38 executing program 2: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r6 = gettid() sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x139f605562ecba0b, 0x70, 0x9, 0x6, 0x7fff, 0x4, 0x0, 0x5, 0x400, 0x2, 0x0, 0x4, 0x7, 0x9, 0x1, 0x5, 0x80, 0x5, 0x9, 0x4, 0x9, 0xb61c, 0x7f, 0xffff, 0x7fff, 0xfff, 0x6, 0xfffffffffffffffb, 0x8, 0x6, 0x6, 0xfffffffffffffffd, 0x8, 0x80000001, 0x1ff, 0x1000, 0x4dfc, 0x80, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000500), 0x4}, 0x10020, 0x3f, 0x3, 0x4, 0x8000, 0x7fffffff, 0x5}, r6, 0x6, r1, 0x8) 22:58:38 executing program 4: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r6 = gettid() sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x139f605562ecba0b, 0x70, 0x9, 0x6, 0x7fff, 0x4, 0x0, 0x5, 0x400, 0x2, 0x0, 0x4, 0x7, 0x9, 0x1, 0x5, 0x80, 0x5, 0x9, 0x4, 0x9, 0xb61c, 0x7f, 0xffff, 0x7fff, 0xfff, 0x6, 0xfffffffffffffffb, 0x8, 0x6, 0x6, 0xfffffffffffffffd, 0x8, 0x80000001, 0x1ff, 0x1000, 0x4dfc, 0x80, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000500), 0x4}, 0x10020, 0x3f, 0x3, 0x4, 0x8000, 0x7fffffff, 0x5}, r6, 0x6, r1, 0x8) [ 1343.760297] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1343.795774] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 1343.827725] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1343.862624] EXT4-fs (loop1): can't mount with journal_checksum, fs mounted w/o journal [ 1343.942250] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1343.960243] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 1343.983050] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1344.007413] EXT4-fs (loop1): can't mount with journal_checksum, fs mounted w/o journal 22:58:39 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x40, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1001, 0x4, 0x7ff, 0x2, 0x0, 0x10000, 0x0, 0xc776, 0x9, 0x1, 0x3, 0xa76, 0x3, 0x3, 0x401, 0x7, 0x200, 0x384, 0x0, 0x200, 0x7f, 0x2, 0x9, 0x7f, 0x4, 0x7ff, 0x2, 0x99a, 0xd, 0x0, 0x0, 0x85e, 0x0, @perf_config_ext={0x0, 0xb6}, 0x10000, 0x79, 0xa2, 0x4, 0x100000000, 0x9, 0xdfa8}, 0x0, 0x10, r0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x200) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="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") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) openat$cgroup_int(r2, &(0x7f0000000040)='io.weight\x00', 0x2, 0x0) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r3, &(0x7f0000000000), 0x17b) 22:58:39 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517, 0x0, 0x0, 0x0, 0x1831a}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) 22:58:39 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000280)='./file0\x00', 0x80000001, 0x1, &(0x7f00000002c0)=[{&(0x7f00000000c0)="800000000002000019000000e60100006c000000090000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1014001, &(0x7f00000003c0)={[{@journal_checksum='journal_checksum'}]}) 22:58:39 executing program 4: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r6 = gettid() sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x139f605562ecba0b, 0x70, 0x9, 0x6, 0x7fff, 0x4, 0x0, 0x5, 0x400, 0x2, 0x0, 0x4, 0x7, 0x9, 0x1, 0x5, 0x80, 0x5, 0x9, 0x4, 0x9, 0xb61c, 0x7f, 0xffff, 0x7fff, 0xfff, 0x6, 0xfffffffffffffffb, 0x8, 0x6, 0x6, 0xfffffffffffffffd, 0x8, 0x80000001, 0x1ff, 0x1000, 0x4dfc, 0x80, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000500), 0x4}, 0x10020, 0x3f, 0x3, 0x4, 0x8000, 0x7fffffff, 0x5}, r6, 0x6, r1, 0x8) 22:58:39 executing program 2: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r6 = gettid() sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x139f605562ecba0b, 0x70, 0x9, 0x6, 0x7fff, 0x4, 0x0, 0x5, 0x400, 0x2, 0x0, 0x4, 0x7, 0x9, 0x1, 0x5, 0x80, 0x5, 0x9, 0x4, 0x9, 0xb61c, 0x7f, 0xffff, 0x7fff, 0xfff, 0x6, 0xfffffffffffffffb, 0x8, 0x6, 0x6, 0xfffffffffffffffd, 0x8, 0x80000001, 0x1ff, 0x1000, 0x4dfc, 0x80, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000500), 0x4}, 0x10020, 0x3f, 0x3, 0x4, 0x8000, 0x7fffffff, 0x5}, r6, 0x6, r1, 0x8) 22:58:39 executing program 5: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r6 = gettid() sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x139f605562ecba0b, 0x70, 0x9, 0x6, 0x7fff, 0x4, 0x0, 0x5, 0x400, 0x2, 0x0, 0x4, 0x7, 0x9, 0x1, 0x5, 0x80, 0x5, 0x9, 0x4, 0x9, 0xb61c, 0x7f, 0xffff, 0x7fff, 0xfff, 0x6, 0xfffffffffffffffb, 0x8, 0x6, 0x6, 0xfffffffffffffffd, 0x8, 0x80000001, 0x1ff, 0x1000, 0x4dfc, 0x80, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000500), 0x4}, 0x10020, 0x3f, 0x3, 0x4, 0x8000, 0x7fffffff, 0x5}, r6, 0x6, r1, 0x8) 22:58:39 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517, 0x0, 0x0, 0x0, 0x1832b}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) [ 1344.568335] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1344.602223] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! 22:58:39 executing program 5: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r6 = gettid() sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x139f605562ecba0b, 0x70, 0x9, 0x6, 0x7fff, 0x4, 0x0, 0x5, 0x400, 0x2, 0x0, 0x4, 0x7, 0x9, 0x1, 0x5, 0x80, 0x5, 0x9, 0x4, 0x9, 0xb61c, 0x7f, 0xffff, 0x7fff, 0xfff, 0x6, 0xfffffffffffffffb, 0x8, 0x6, 0x6, 0xfffffffffffffffd, 0x8, 0x80000001, 0x1ff, 0x1000, 0x4dfc, 0x80, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000500), 0x4}, 0x10020, 0x3f, 0x3, 0x4, 0x8000, 0x7fffffff, 0x5}, r6, 0x6, r1, 0x8) [ 1344.637786] EXT4-fs (loop1): group descriptors corrupted! 22:58:39 executing program 2: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r6 = gettid() sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x139f605562ecba0b, 0x70, 0x9, 0x6, 0x7fff, 0x4, 0x0, 0x5, 0x400, 0x2, 0x0, 0x4, 0x7, 0x9, 0x1, 0x5, 0x80, 0x5, 0x9, 0x4, 0x9, 0xb61c, 0x7f, 0xffff, 0x7fff, 0xfff, 0x6, 0xfffffffffffffffb, 0x8, 0x6, 0x6, 0xfffffffffffffffd, 0x8, 0x80000001, 0x1ff, 0x1000, 0x4dfc, 0x80, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000500), 0x4}, 0x10020, 0x3f, 0x3, 0x4, 0x8000, 0x7fffffff, 0x5}, r6, 0x6, r1, 0x8) 22:58:39 executing program 4: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r6 = gettid() sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x139f605562ecba0b, 0x70, 0x9, 0x6, 0x7fff, 0x4, 0x0, 0x5, 0x400, 0x2, 0x0, 0x4, 0x7, 0x9, 0x1, 0x5, 0x80, 0x5, 0x9, 0x4, 0x9, 0xb61c, 0x7f, 0xffff, 0x7fff, 0xfff, 0x6, 0xfffffffffffffffb, 0x8, 0x6, 0x6, 0xfffffffffffffffd, 0x8, 0x80000001, 0x1ff, 0x1000, 0x4dfc, 0x80, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000500), 0x4}, 0x10020, 0x3f, 0x3, 0x4, 0x8000, 0x7fffffff, 0x5}, r6, 0x6, r1, 0x8) [ 1344.713958] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1344.748307] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1344.777227] EXT4-fs (loop1): group descriptors corrupted! 22:58:39 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517, 0x0, 0x0, 0x0, 0x2b83010000000000}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) [ 1344.835743] device nr0 entered promiscuous mode 22:58:39 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000280)='./file0\x00', 0x80000001, 0x1, &(0x7f00000002c0)=[{&(0x7f00000000c0)="800000000002000019000000e60100006c000000000000042c00000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1014001, &(0x7f00000003c0)={[{@journal_checksum='journal_checksum'}]}) [ 1345.041849] EXT4-fs (loop1): Unsupported filesystem blocksize 4194304 (44 log_block_size) [ 1345.138567] EXT4-fs (loop1): Unsupported filesystem blocksize 4194304 (44 log_block_size) 22:58:40 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x40, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1001, 0x4, 0x7ff, 0x2, 0x0, 0x10000, 0x0, 0xc776, 0x9, 0x1, 0x3, 0xa76, 0x3, 0x3, 0x401, 0x7, 0x200, 0x384, 0x0, 0x200, 0x7f, 0x2, 0x9, 0x7f, 0x4, 0x7ff, 0x2, 0x99a, 0xd, 0x0, 0x0, 0x85e, 0x0, @perf_config_ext={0x0, 0xb6}, 0x10000, 0x79, 0xa2, 0x4, 0x100000000, 0x9, 0xdfa8}, 0x0, 0x10, r0, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000240)=""/80) ioctl$TUNSETLINK(r0, 0x400454cd, 0x200) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="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") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) openat$cgroup_int(r2, &(0x7f0000000040)='io.weight\x00', 0x2, 0x0) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r3, &(0x7f0000000000), 0x17b) 22:58:40 executing program 2: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) gettid() sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) 22:58:40 executing program 5: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r6 = gettid() sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x139f605562ecba0b, 0x70, 0x9, 0x6, 0x7fff, 0x4, 0x0, 0x5, 0x400, 0x2, 0x0, 0x4, 0x7, 0x9, 0x1, 0x5, 0x80, 0x5, 0x9, 0x4, 0x9, 0xb61c, 0x7f, 0xffff, 0x7fff, 0xfff, 0x6, 0xfffffffffffffffb, 0x8, 0x6, 0x6, 0xfffffffffffffffd, 0x8, 0x80000001, 0x1ff, 0x1000, 0x4dfc, 0x80, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000500), 0x4}, 0x10020, 0x3f, 0x3, 0x4, 0x8000, 0x7fffffff, 0x5}, r6, 0x6, r1, 0x8) 22:58:40 executing program 4: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r6 = gettid() sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x139f605562ecba0b, 0x70, 0x9, 0x6, 0x7fff, 0x4, 0x0, 0x5, 0x400, 0x2, 0x0, 0x4, 0x7, 0x9, 0x1, 0x5, 0x80, 0x5, 0x9, 0x4, 0x9, 0xb61c, 0x7f, 0xffff, 0x7fff, 0xfff, 0x6, 0xfffffffffffffffb, 0x8, 0x6, 0x6, 0xfffffffffffffffd, 0x8, 0x80000001, 0x1ff, 0x1000, 0x4dfc, 0x80, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000500), 0x4}, 0x10020, 0x3f, 0x3, 0x4, 0x8000, 0x7fffffff, 0x5}, r6, 0x6, r1, 0x8) 22:58:40 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517, 0x0, 0x0, 0x0, 0x18337}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) 22:58:40 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000280)='./file0\x00', 0x80000001, 0x1, &(0x7f00000002c0)=[{&(0x7f00000000c0)="800000000002000019000000e60100006c480000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1014001, &(0x7f00000003c0)={[{@journal_checksum='journal_checksum'}]}) [ 1345.666905] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 22:58:40 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517, 0x0, 0x0, 0x0, 0x2083010000000000}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) [ 1345.737777] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 22:58:40 executing program 5: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r6 = gettid() sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x139f605562ecba0b, 0x70, 0x9, 0x6, 0x7fff, 0x4, 0x0, 0x5, 0x400, 0x2, 0x0, 0x4, 0x7, 0x9, 0x1, 0x5, 0x80, 0x5, 0x9, 0x4, 0x9, 0xb61c, 0x7f, 0xffff, 0x7fff, 0xfff, 0x6, 0xfffffffffffffffb, 0x8, 0x6, 0x6, 0xfffffffffffffffd, 0x8, 0x80000001, 0x1ff, 0x1000, 0x4dfc, 0x80, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000500), 0x4}, 0x10020, 0x3f, 0x3, 0x4, 0x8000, 0x7fffffff, 0x5}, r6, 0x6, r1, 0x8) 22:58:40 executing program 2: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) gettid() sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) [ 1345.790643] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock 22:58:40 executing program 4: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r6 = gettid() sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x139f605562ecba0b, 0x70, 0x9, 0x6, 0x7fff, 0x4, 0x0, 0x5, 0x400, 0x2, 0x0, 0x4, 0x7, 0x9, 0x1, 0x5, 0x80, 0x5, 0x9, 0x4, 0x9, 0xb61c, 0x7f, 0xffff, 0x7fff, 0xfff, 0x6, 0xfffffffffffffffb, 0x8, 0x6, 0x6, 0xfffffffffffffffd, 0x8, 0x80000001, 0x1ff, 0x1000, 0x4dfc, 0x80, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000500), 0x4}, 0x10020, 0x3f, 0x3, 0x4, 0x8000, 0x7fffffff, 0x5}, r6, 0x6, r1, 0x8) [ 1345.844226] EXT4-fs (loop1): can't mount with journal_checksum, fs mounted w/o journal [ 1345.923687] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 22:58:41 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517, 0x0, 0x0, 0x0, 0x44830100}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) [ 1345.972058] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 1346.011836] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1346.063496] EXT4-fs (loop1): can't mount with journal_checksum, fs mounted w/o journal [ 1346.086204] device nr0 entered promiscuous mode 22:58:41 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517, 0x0, 0x0, 0x0, 0x29830100}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) [ 1346.127719] __nla_parse: 9 callbacks suppressed [ 1346.145049] netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. [ 1346.727104] netlink: 3 bytes leftover after parsing attributes in process `syz-executor5'. 22:58:41 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x40, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000240)=""/80) ioctl$TUNSETLINK(r0, 0x400454cd, 0x200) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="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") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) openat$cgroup_int(r2, &(0x7f0000000040)='io.weight\x00', 0x2, 0x0) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r3, &(0x7f0000000000), 0x17b) 22:58:41 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000280)='./file0\x00', 0x80000001, 0x1, &(0x7f00000002c0)=[{&(0x7f00000000c0)="800000000002000019000000e60100006c000000000000000300000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1014001, &(0x7f00000003c0)={[{@journal_checksum='journal_checksum'}]}) 22:58:41 executing program 2: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) gettid() sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) 22:58:41 executing program 4: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r6 = gettid() sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x139f605562ecba0b, 0x70, 0x9, 0x6, 0x7fff, 0x4, 0x0, 0x5, 0x400, 0x2, 0x0, 0x4, 0x7, 0x9, 0x1, 0x5, 0x80, 0x5, 0x9, 0x4, 0x9, 0xb61c, 0x7f, 0xffff, 0x7fff, 0xfff, 0x6, 0xfffffffffffffffb, 0x8, 0x6, 0x6, 0xfffffffffffffffd, 0x8, 0x80000001, 0x1ff, 0x1000, 0x4dfc, 0x80, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000500), 0x4}, 0x10020, 0x3f, 0x3, 0x4, 0x8000, 0x7fffffff, 0x5}, r6, 0x6, r1, 0x8) 22:58:41 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517, 0x0, 0x0, 0x0, 0x4800}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) 22:58:41 executing program 5: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r6 = gettid() sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x139f605562ecba0b, 0x70, 0x9, 0x6, 0x7fff, 0x4, 0x0, 0x5, 0x400, 0x2, 0x0, 0x4, 0x7, 0x9, 0x1, 0x5, 0x80, 0x5, 0x9, 0x4, 0x9, 0xb61c, 0x7f, 0xffff, 0x7fff, 0xfff, 0x6, 0xfffffffffffffffb, 0x8, 0x6, 0x6, 0xfffffffffffffffd, 0x8, 0x80000001, 0x1ff, 0x1000, 0x4dfc, 0x80, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000500), 0x4}, 0x10020, 0x3f, 0x3, 0x4, 0x8000, 0x7fffffff, 0x5}, r6, 0x6, r1, 0x8) [ 1346.884643] netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. [ 1346.944043] EXT4-fs (loop1): bad block size 8192 22:58:42 executing program 2: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) gettid() sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) [ 1347.052459] EXT4-fs (loop1): bad block size 8192 22:58:42 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517, 0x0, 0x0, 0x0, 0x1834b}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) 22:58:42 executing program 4: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r5 = gettid() sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x139f605562ecba0b, 0x70, 0x9, 0x6, 0x7fff, 0x4, 0x0, 0x5, 0x400, 0x2, 0x0, 0x4, 0x7, 0x9, 0x1, 0x5, 0x80, 0x5, 0x9, 0x4, 0x9, 0xb61c, 0x7f, 0xffff, 0x7fff, 0xfff, 0x6, 0xfffffffffffffffb, 0x8, 0x6, 0x6, 0xfffffffffffffffd, 0x8, 0x80000001, 0x1ff, 0x1000, 0x4dfc, 0x80, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000500), 0x4}, 0x10020, 0x3f, 0x3, 0x4, 0x8000, 0x7fffffff, 0x5}, r5, 0x6, r1, 0x8) 22:58:42 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000280)='./file0\x00', 0x80000001, 0x1, &(0x7f00000002c0)=[{&(0x7f00000000c0)="800000000002000019000000e60100006c030000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1014001, &(0x7f00000003c0)={[{@journal_checksum='journal_checksum'}]}) [ 1347.194891] device nr0 entered promiscuous mode 22:58:42 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517, 0x0, 0x0, 0x0, 0x4083010000000000}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) [ 1347.249520] netlink: 3 bytes leftover after parsing attributes in process `syz-executor5'. 22:58:42 executing program 2: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) gettid() sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) [ 1347.341794] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1347.373162] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 1347.396420] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1347.407152] EXT4-fs (loop1): can't mount with journal_checksum, fs mounted w/o journal [ 1347.501253] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1347.518396] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 1347.539367] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1347.559362] EXT4-fs (loop1): can't mount with journal_checksum, fs mounted w/o journal [ 1347.926055] netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. 22:58:43 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1001, 0x4, 0x7ff, 0x2, 0x0, 0x10000, 0x0, 0xc776, 0x9, 0x1, 0x3, 0xa76, 0x3, 0x3, 0x401, 0x7, 0x200, 0x384, 0x0, 0x200, 0x7f, 0x2, 0x9, 0x7f, 0x4, 0x7ff, 0x2, 0x99a, 0xd, 0x0, 0x0, 0x85e, 0x0, @perf_config_ext={0x0, 0xb6}, 0x10000, 0x79, 0xa2, 0x4, 0x100000000, 0x9, 0xdfa8}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000240)=""/80) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x200) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000780)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3dad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88bc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e57e43a3e36bd48d2a85bf4fd4a804e83f2f3cf378a435af5e287d4e27337b4ada11b26219832ec6b2b38446b3b95fe3771e9f42ca30fb21e12f0a3d8bc2d85454af9fcc0232d8fd909448b01f46c593d31ea1c926465e35a4199079c3ca41128b17cb01fbf5b522be0fd02022ada37fecc14b6c8c8831883b85a1106f2f867020d529f17a350f20dd3bf51a98cfda70c2e3638a483fd3f87940bb478b07c4c110394c0093d17955089f2ca97bbe075124c9b1ff6500d536a95d96f03d48596e008bf0a028b539cec796cec9bf585eb80fe3e0d26") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) openat$cgroup_int(r1, &(0x7f0000000040)='io.weight\x00', 0x2, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r2, &(0x7f0000000000), 0x17b) 22:58:43 executing program 5: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) gettid() sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) 22:58:43 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517, 0x0, 0x0, 0x0, 0x300000000000000}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) 22:58:43 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000280)='./file0\x00', 0x80000001, 0x1, &(0x7f00000002c0)=[{&(0x7f00000000c0)="800000000002000019000000e60100006c041000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1014001, &(0x7f00000003c0)={[{@journal_checksum='journal_checksum'}]}) 22:58:43 executing program 2: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) gettid() 22:58:43 executing program 4: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r4 = gettid() sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x139f605562ecba0b, 0x70, 0x9, 0x6, 0x7fff, 0x4, 0x0, 0x5, 0x400, 0x2, 0x0, 0x4, 0x7, 0x9, 0x1, 0x5, 0x80, 0x5, 0x9, 0x4, 0x9, 0xb61c, 0x7f, 0xffff, 0x7fff, 0xfff, 0x6, 0xfffffffffffffffb, 0x8, 0x6, 0x6, 0xfffffffffffffffd, 0x8, 0x80000001, 0x1ff, 0x1000, 0x4dfc, 0x80, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000500), 0x4}, 0x10020, 0x3f, 0x3, 0x4, 0x8000, 0x7fffffff, 0x5}, r4, 0x6, r1, 0x8) 22:58:43 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517, 0x0, 0x0, 0x0, 0xe4ffffff}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) [ 1348.082245] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1348.117961] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 22:58:43 executing program 2: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) [ 1348.160485] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1348.211142] EXT4-fs (loop1): can't mount with journal_checksum, fs mounted w/o journal [ 1348.232497] netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. 22:58:43 executing program 4: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r4, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r5 = gettid() sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x139f605562ecba0b, 0x70, 0x9, 0x6, 0x7fff, 0x4, 0x0, 0x5, 0x400, 0x2, 0x0, 0x4, 0x7, 0x9, 0x1, 0x5, 0x80, 0x5, 0x9, 0x4, 0x9, 0xb61c, 0x7f, 0xffff, 0x7fff, 0xfff, 0x6, 0xfffffffffffffffb, 0x8, 0x6, 0x6, 0xfffffffffffffffd, 0x8, 0x80000001, 0x1ff, 0x1000, 0x4dfc, 0x80, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000500), 0x4}, 0x10020, 0x3f, 0x3, 0x4, 0x8000, 0x7fffffff, 0x5}, r5, 0x6, r1, 0x8) 22:58:43 executing program 5: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r5 = gettid() sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x139f605562ecba0b, 0x70, 0x9, 0x6, 0x7fff, 0x4, 0x0, 0x5, 0x400, 0x2, 0x0, 0x4, 0x7, 0x9, 0x1, 0x5, 0x80, 0x5, 0x9, 0x4, 0x9, 0xb61c, 0x7f, 0xffff, 0x7fff, 0xfff, 0x6, 0xfffffffffffffffb, 0x8, 0x6, 0x6, 0xfffffffffffffffd, 0x8, 0x80000001, 0x1ff, 0x1000, 0x4dfc, 0x80, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000500), 0x4}, 0x10020, 0x3f, 0x3, 0x4, 0x8000, 0x7fffffff, 0x5}, r5, 0x6, r1, 0x8) 22:58:43 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_opts(r1, 0x29, 0x3f, &(0x7f0000000080)=@srh={0xbf, 0x4, 0x4, 0x2, 0x8, 0x8, 0x6, [@empty, @mcast1]}, 0x28) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) ioctl$EVIOCSABS0(r0, 0x401845c0, &(0x7f0000000040)={0x9d, 0x0, 0x7, 0x8, 0xfffffffffffff082, 0x8}) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f00000000c0)="7e57618d98a2ccf293f7f4d0503411a4271f0d1967169c80ee94b8d46d27cb5441c326665e4762f06eb8890cb4bc1806e4") setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='ip6tnl0\x00', 0x10) [ 1348.351802] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1348.367896] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 1348.377035] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock 22:58:43 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000280)='./file0\x00', 0x80000001, 0x1, &(0x7f00000002c0)=[{&(0x7f00000000c0)="800000000002000019000000e60100006c000000000000480000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1014001, &(0x7f00000003c0)={[{@journal_checksum='journal_checksum'}]}) [ 1348.533876] device nr0 entered promiscuous mode [ 1348.565588] netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. [ 1348.599513] EXT4-fs (loop1): fragment/cluster size (2048) != block size (1024) [ 1348.659626] EXT4-fs (loop1): fragment/cluster size (2048) != block size (1024) [ 1349.237772] netlink: 3 bytes leftover after parsing attributes in process `syz-executor5'. 22:58:44 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x40, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1001, 0x4, 0x7ff, 0x2, 0x0, 0x10000, 0x0, 0xc776, 0x9, 0x1, 0x3, 0xa76, 0x3, 0x3, 0x401, 0x7, 0x200, 0x384, 0x0, 0x200, 0x7f, 0x2, 0x9, 0x7f, 0x4, 0x7ff, 0x2, 0x99a, 0xd, 0x0, 0x0, 0x85e, 0x0, @perf_config_ext={0x0, 0xb6}, 0x10000, 0x79, 0xa2, 0x4, 0x100000000, 0x9, 0xdfa8}, 0x0, 0x10, r0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000240)=""/80) ioctl$TUNSETLINK(r0, 0x400454cd, 0x200) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="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") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) openat$cgroup_int(r2, &(0x7f0000000040)='io.weight\x00', 0x2, 0x0) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r3, &(0x7f0000000000), 0x17b) 22:58:44 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517, 0x0, 0x100000000}) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in={0x2, 0x4e24}], 0x10) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) 22:58:44 executing program 2: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) 22:58:44 executing program 4: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r6 = gettid() sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x139f605562ecba0b, 0x70, 0x9, 0x6, 0x7fff, 0x4, 0x0, 0x5, 0x400, 0x2, 0x0, 0x4, 0x7, 0x9, 0x1, 0x5, 0x80, 0x5, 0x9, 0x4, 0x9, 0xb61c, 0x7f, 0xffff, 0x7fff, 0xfff, 0x6, 0xfffffffffffffffb, 0x8, 0x6, 0x6, 0xfffffffffffffffd, 0x8, 0x80000001, 0x1ff, 0x1000, 0x4dfc, 0x80, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000500), 0x4}, 0x10020, 0x3f, 0x3, 0x4, 0x8000, 0x7fffffff, 0x5}, r6, 0x6, r1, 0x8) 22:58:44 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000280)='./file0\x00', 0x80000001, 0x1, &(0x7f00000002c0)=[{&(0x7f00000000c0)="800000000002000019000000e60100006c000001ff0000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1014001, &(0x7f00000003c0)={[{@journal_checksum='journal_checksum'}]}) 22:58:44 executing program 5: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r4, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r5 = gettid() sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x139f605562ecba0b, 0x70, 0x9, 0x6, 0x7fff, 0x4, 0x0, 0x5, 0x400, 0x2, 0x0, 0x4, 0x7, 0x9, 0x1, 0x5, 0x80, 0x5, 0x9, 0x4, 0x9, 0xb61c, 0x7f, 0xffff, 0x7fff, 0xfff, 0x6, 0xfffffffffffffffb, 0x8, 0x6, 0x6, 0xfffffffffffffffd, 0x8, 0x80000001, 0x1ff, 0x1000, 0x4dfc, 0x80, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000500), 0x4}, 0x10020, 0x3f, 0x3, 0x4, 0x8000, 0x7fffffff, 0x5}, r5, 0x6, r1, 0x8) [ 1349.372847] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1349.413341] netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. [ 1349.422486] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1349.445040] EXT4-fs (loop1): group descriptors corrupted! 22:58:44 executing program 4: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r4, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r5 = gettid() sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x139f605562ecba0b, 0x70, 0x9, 0x6, 0x7fff, 0x4, 0x0, 0x5, 0x400, 0x2, 0x0, 0x4, 0x7, 0x9, 0x1, 0x5, 0x80, 0x5, 0x9, 0x4, 0x9, 0xb61c, 0x7f, 0xffff, 0x7fff, 0xfff, 0x6, 0xfffffffffffffffb, 0x8, 0x6, 0x6, 0xfffffffffffffffd, 0x8, 0x80000001, 0x1ff, 0x1000, 0x4dfc, 0x80, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000500), 0x4}, 0x10020, 0x3f, 0x3, 0x4, 0x8000, 0x7fffffff, 0x5}, r5, 0x6, r1, 0x8) [ 1349.469249] netlink: 3 bytes leftover after parsing attributes in process `syz-executor5'. 22:58:44 executing program 2: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) 22:58:44 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ffd000/0x3000)=nil, 0x3000}, &(0x7f0000000080)=0x10) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517}) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x480040, 0x0) ioctl$VIDIOC_G_STD(r1, 0x80085617, &(0x7f0000000140)) r2 = getpgid(0x0) sched_getscheduler(r2) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) [ 1349.516529] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1349.559554] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1349.599937] EXT4-fs (loop1): group descriptors corrupted! 22:58:44 executing program 5: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) 22:58:44 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000280)='./file0\x00', 0x80000001, 0x1, &(0x7f00000002c0)=[{&(0x7f00000000c0)="800000000002000019000000e60100006c01ff00000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1014001, &(0x7f00000003c0)={[{@journal_checksum='journal_checksum'}]}) 22:58:44 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x117, 0x3}}, 0x20) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) [ 1349.737383] device nr0 entered promiscuous mode [ 1349.871982] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1349.917694] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 1349.947730] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1349.956856] EXT4-fs (loop1): can't mount with journal_checksum, fs mounted w/o journal [ 1350.028685] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1350.045794] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 1350.065128] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1350.084874] EXT4-fs (loop1): can't mount with journal_checksum, fs mounted w/o journal 22:58:45 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x40, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1001, 0x4, 0x7ff, 0x2, 0x0, 0x10000, 0x0, 0xc776, 0x9, 0x1, 0x3, 0xa76, 0x3, 0x3, 0x401, 0x7, 0x200, 0x384, 0x0, 0x200, 0x7f, 0x2, 0x9, 0x7f, 0x4, 0x7ff, 0x2, 0x99a, 0xd, 0x0, 0x0, 0x85e, 0x0, @perf_config_ext={0x0, 0xb6}, 0x10000, 0x79, 0xa2, 0x4, 0x100000000, 0x9, 0xdfa8}, 0x0, 0x10, r0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000240)=""/80) ioctl$TUNSETLINK(r0, 0x400454cd, 0x200) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="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") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) openat$cgroup_int(r2, &(0x7f0000000040)='io.weight\x00', 0x2, 0x0) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r3, &(0x7f0000000000), 0x17b) 22:58:45 executing program 2: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) 22:58:45 executing program 4: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r6 = gettid() sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x139f605562ecba0b, 0x70, 0x9, 0x6, 0x7fff, 0x4, 0x0, 0x5, 0x400, 0x2, 0x0, 0x4, 0x7, 0x9, 0x1, 0x5, 0x80, 0x5, 0x9, 0x4, 0x9, 0xb61c, 0x7f, 0xffff, 0x7fff, 0xfff, 0x6, 0xfffffffffffffffb, 0x8, 0x6, 0x6, 0xfffffffffffffffd, 0x8, 0x80000001, 0x1ff, 0x1000, 0x4dfc, 0x80, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000500), 0x4}, 0x10020, 0x3f, 0x3, 0x4, 0x8000, 0x7fffffff, 0x5}, r6, 0x6, r1, 0x8) 22:58:45 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x2000) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517}) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000140)=0x7, 0x4) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000200)='./file0\x00', 0x8, 0x2) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r0, 0xc008551c, &(0x7f0000000180)=ANY=[@ANYBLOB="0001000020700000000000800000e2ca0000000000000000004f51492e2c2a00d7a47f87a841a55b651ca8a3f2f20da48509539acb510595"]) setsockopt$IP_VS_SO_SET_ADDDEST(r0, 0x0, 0x487, &(0x7f0000000040)={{0x84, @loopback, 0x4e23, 0x1, 'ovf\x00', 0x10, 0x6, 0x77}, {@local, 0x4e24, 0x1, 0x1, 0x5, 0x40400000}}, 0x44) 22:58:45 executing program 5: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r4, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r5 = gettid() sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x139f605562ecba0b, 0x70, 0x9, 0x6, 0x7fff, 0x4, 0x0, 0x5, 0x400, 0x2, 0x0, 0x4, 0x7, 0x9, 0x1, 0x5, 0x80, 0x5, 0x9, 0x4, 0x9, 0xb61c, 0x7f, 0xffff, 0x7fff, 0xfff, 0x6, 0xfffffffffffffffb, 0x8, 0x6, 0x6, 0xfffffffffffffffd, 0x8, 0x80000001, 0x1ff, 0x1000, 0x4dfc, 0x80, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000500), 0x4}, 0x10020, 0x3f, 0x3, 0x4, 0x8000, 0x7fffffff, 0x5}, r5, 0x6, r1, 0x8) 22:58:45 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000280)='./file0\x00', 0x80000001, 0x1, &(0x7f00000002c0)=[{&(0x7f00000000c0)="800000000002000019000000e60100006c006800000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1014001, &(0x7f00000003c0)={[{@journal_checksum='journal_checksum'}]}) [ 1350.518706] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1350.543084] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 22:58:45 executing program 5: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r6 = gettid() sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x139f605562ecba0b, 0x70, 0x9, 0x6, 0x7fff, 0x4, 0x0, 0x5, 0x400, 0x2, 0x0, 0x4, 0x7, 0x9, 0x1, 0x5, 0x80, 0x5, 0x9, 0x4, 0x9, 0xb61c, 0x7f, 0xffff, 0x7fff, 0xfff, 0x6, 0xfffffffffffffffb, 0x8, 0x6, 0x6, 0xfffffffffffffffd, 0x8, 0x80000001, 0x1ff, 0x1000, 0x4dfc, 0x80, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000500), 0x4}, 0x10020, 0x3f, 0x3, 0x4, 0x8000, 0x7fffffff, 0x5}, r6, 0x6, r1, 0x8) [ 1350.571973] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1350.601592] EXT4-fs (loop1): can't mount with journal_checksum, fs mounted w/o journal 22:58:45 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) write$binfmt_misc(r0, &(0x7f0000000200)={'syz1', "b31d0328aee0a6767d195d48714f8c4eff1730411cb46b4a082a29facc0cb45dc71c29e3120f5bbd420439b6ab6c371543d3044aa588b2569264fd5b6dfac43a67325d825963dc0f072bc204ba845cdc6803eb1b732d7bbf77bdc38b3846690780f619b7e9c858256f5997e0dba01a48581fa95b27e7a75c636583abc1b0165c6bd3cf9f690ab81c7a1541e6dfe4a108ddb905b006003a4a00540b0f93e3f9c886c102cea8abbbc5cdcdca38777c7992d96d0a44c7b10b5a234106f8c553661af31d5ad7c06c"}, 0xca) 22:58:45 executing program 2: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") 22:58:45 executing program 4: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000340)) r1 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={0xffffffffffffffff, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r4 = gettid() sendmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x139f605562ecba0b, 0x70, 0x9, 0x6, 0x7fff, 0x4, 0x0, 0x5, 0x400, 0x2, 0x0, 0x4, 0x7, 0x9, 0x1, 0x5, 0x80, 0x5, 0x9, 0x4, 0x9, 0xb61c, 0x7f, 0xffff, 0x7fff, 0xfff, 0x6, 0xfffffffffffffffb, 0x8, 0x6, 0x6, 0xfffffffffffffffd, 0x8, 0x80000001, 0x1ff, 0x1000, 0x4dfc, 0x80, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000500), 0x4}, 0x10020, 0x3f, 0x3, 0x4, 0x8000, 0x7fffffff, 0x5}, r4, 0x6, 0xffffffffffffffff, 0x8) [ 1350.733363] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1350.765532] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 1350.800882] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1350.826499] EXT4-fs (loop1): can't mount with journal_checksum, fs mounted w/o journal 22:58:45 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000080)) [ 1350.875676] device nr0 entered promiscuous mode 22:58:46 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000280)='./file0\x00', 0x80000001, 0x1, &(0x7f00000002c0)=[{&(0x7f00000000c0)="800000000002000019000000e60100006c002d00000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1014001, &(0x7f00000003c0)={[{@journal_checksum='journal_checksum'}]}) [ 1351.077646] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1351.112315] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 1351.138177] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1351.157740] EXT4-fs (loop1): can't mount with journal_checksum, fs mounted w/o journal [ 1351.240304] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1351.256323] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 1351.276836] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1351.297444] EXT4-fs (loop1): can't mount with journal_checksum, fs mounted w/o journal 22:58:46 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x40, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1001, 0x4, 0x7ff, 0x2, 0x0, 0x10000, 0x0, 0xc776, 0x9, 0x1, 0x3, 0xa76, 0x3, 0x3, 0x401, 0x7, 0x200, 0x384, 0x0, 0x200, 0x7f, 0x2, 0x9, 0x7f, 0x4, 0x7ff, 0x2, 0x99a, 0xd, 0x0, 0x0, 0x85e, 0x0, @perf_config_ext={0x0, 0xb6}, 0x10000, 0x79, 0xa2, 0x4, 0x100000000, 0x9, 0xdfa8}, 0x0, 0x10, r0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000240)=""/80) ioctl$TUNSETLINK(r0, 0x400454cd, 0x200) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="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") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) openat$cgroup_int(r2, &(0x7f0000000040)='io.weight\x00', 0x2, 0x0) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r3, &(0x7f0000000000), 0x17b) 22:58:46 executing program 2: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) 22:58:46 executing program 5: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r6 = gettid() sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x139f605562ecba0b, 0x70, 0x9, 0x6, 0x7fff, 0x4, 0x0, 0x5, 0x400, 0x2, 0x0, 0x4, 0x7, 0x9, 0x1, 0x5, 0x80, 0x5, 0x9, 0x4, 0x9, 0xb61c, 0x7f, 0xffff, 0x7fff, 0xfff, 0x6, 0xfffffffffffffffb, 0x8, 0x6, 0x6, 0xfffffffffffffffd, 0x8, 0x80000001, 0x1ff, 0x1000, 0x4dfc, 0x80, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000500), 0x4}, 0x10020, 0x3f, 0x3, 0x4, 0x8000, 0x7fffffff, 0x5}, r6, 0x6, r1, 0x8) 22:58:46 executing program 4: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r6 = gettid() sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x139f605562ecba0b, 0x70, 0x9, 0x6, 0x7fff, 0x4, 0x0, 0x5, 0x400, 0x2, 0x0, 0x4, 0x7, 0x9, 0x1, 0x5, 0x80, 0x5, 0x9, 0x4, 0x9, 0xb61c, 0x7f, 0xffff, 0x7fff, 0xfff, 0x6, 0xfffffffffffffffb, 0x8, 0x6, 0x6, 0xfffffffffffffffd, 0x8, 0x80000001, 0x1ff, 0x1000, 0x4dfc, 0x80, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000500), 0x4}, 0x10020, 0x3f, 0x3, 0x4, 0x8000, 0x7fffffff, 0x5}, r6, 0x6, r1, 0x8) 22:58:46 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x8000) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517}) r1 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0xa41d, 0x10000) ioctl$KVM_SET_CPUID2(r1, 0x4008ae90, &(0x7f0000000200)={0x6, 0x0, [{0xc000001f, 0x3ff, 0x2, 0x3, 0x80, 0x6, 0x9}, {0x0, 0x0, 0x4, 0x6, 0x81, 0x9, 0xfffffffffffffffd}, {0x0, 0x5791, 0x2, 0x81, 0x3, 0x1ff, 0x1f}, {0x0, 0xfd2f, 0x3, 0x20000000, 0x2, 0x20, 0x7ff}, {0x80000001, 0x1, 0x0, 0xbf, 0x1, 0x80000000, 0x3}, {0x80000019, 0x1, 0x5, 0x1, 0xff00, 0x0, 0xcc}]}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) 22:58:46 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000280)='./file0\x00', 0x80000001, 0x1, &(0x7f00000002c0)=[{&(0x7f00000000c0)="800000000002000019000000e60100006c000000000000042d00000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1014001, &(0x7f00000003c0)={[{@journal_checksum='journal_checksum'}]}) 22:58:46 executing program 3: r0 = socket$bt_bnep(0x1f, 0x3, 0x4) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000040)={0x5, 0xffffffff, 0x0, 0x7, 0x2}) r1 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0105512, &(0x7f0000000080)={0x0, 0x5517}) ioctl$KVM_GET_PIT(r1, 0xc048ae65, &(0x7f0000000140)) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc0045540, &(0x7f00000000c0)=0x9) ioctl$FIGETBSZ(r1, 0x2, &(0x7f0000000000)) [ 1351.643532] EXT4-fs (loop1): Unsupported filesystem blocksize 8388608 (45 log_block_size) [ 1351.673900] __nla_parse: 5 callbacks suppressed [ 1351.673916] netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. 22:58:46 executing program 2: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) [ 1351.747489] netlink: 3 bytes leftover after parsing attributes in process `syz-executor5'. [ 1351.797772] EXT4-fs (loop1): Unsupported filesystem blocksize 8388608 (45 log_block_size) 22:58:46 executing program 5: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) 22:58:46 executing program 4: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r6 = gettid() sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x139f605562ecba0b, 0x70, 0x9, 0x6, 0x7fff, 0x4, 0x0, 0x5, 0x400, 0x2, 0x0, 0x4, 0x7, 0x9, 0x1, 0x5, 0x80, 0x5, 0x9, 0x4, 0x9, 0xb61c, 0x7f, 0xffff, 0x7fff, 0xfff, 0x6, 0xfffffffffffffffb, 0x8, 0x6, 0x6, 0xfffffffffffffffd, 0x8, 0x80000001, 0x1ff, 0x1000, 0x4dfc, 0x80, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000500), 0x4}, 0x10020, 0x3f, 0x3, 0x4, 0x8000, 0x7fffffff, 0x5}, r6, 0x6, r1, 0x8) 22:58:46 executing program 2: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) 22:58:46 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000280)='./file0\x00', 0x80000001, 0x1, &(0x7f00000002c0)=[{&(0x7f00000000c0)="800000000002000019000000e60100006cfeffffff0000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1014001, &(0x7f00000003c0)={[{@journal_checksum='journal_checksum'}]}) [ 1352.046600] device nr0 entered promiscuous mode [ 1352.110833] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1352.120563] netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. [ 1352.141538] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1352.152866] EXT4-fs (loop1): group descriptors corrupted! [ 1352.206971] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1352.238535] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1352.248738] EXT4-fs (loop1): group descriptors corrupted! 22:58:47 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x40, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1001, 0x4, 0x7ff, 0x2, 0x0, 0x10000, 0x0, 0xc776, 0x9, 0x1, 0x3, 0xa76, 0x3, 0x3, 0x401, 0x7, 0x200, 0x384, 0x0, 0x200, 0x7f, 0x2, 0x9, 0x7f, 0x4, 0x7ff, 0x2, 0x99a, 0xd, 0x0, 0x0, 0x85e, 0x0, @perf_config_ext={0x0, 0xb6}, 0x10000, 0x79, 0xa2, 0x4, 0x100000000, 0x9, 0xdfa8}, 0x0, 0x10, r0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000240)=""/80) ioctl$TUNSETLINK(r0, 0x400454cd, 0x200) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3dad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88bc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e57e43a3e36bd48d2a85bf4fd4a804e83f2f3cf378a435af5e287d4e27337b4ada11b26219832ec6b2b38446b3b95fe3771e9f42ca30fb21e12f0a3d8bc2d85454af9fcc0232d8fd909448b01f46c593d31ea1c926465e35a4199079c3ca41128b17cb01fbf5b522be0fd02022ada37fecc14b6c8c8831883b85a1106f2f867020d529f17a350f20dd3bf51a98cfda70c2e3638a483fd3f87940bb478b07c4c110394c0093d17955089f2ca97bbe075124c9b1ff6500d536a95d96f03d48596e008bf0a028b539cec796cec9bf585eb80fe3e0d26") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) openat$cgroup_int(r2, &(0x7f0000000040)='io.weight\x00', 0x2, 0x0) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r3, &(0x7f0000000000), 0x17b) 22:58:47 executing program 3: mknodat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x200, 0x8) r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x400000000000000, 0x5517, 0x0, 0x0, 0xfffffffffffffffd}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x400000, 0x0) 22:58:47 executing program 2: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) 22:58:47 executing program 5: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) 22:58:47 executing program 4: openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000340)) r2 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r4, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r0, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r0, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r0, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r0, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r5 = gettid() sendmsg(r1, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x139f605562ecba0b, 0x70, 0x9, 0x6, 0x7fff, 0x4, 0x0, 0x5, 0x400, 0x2, 0x0, 0x4, 0x7, 0x9, 0x1, 0x5, 0x80, 0x5, 0x9, 0x4, 0x9, 0xb61c, 0x7f, 0xffff, 0x7fff, 0xfff, 0x6, 0xfffffffffffffffb, 0x8, 0x6, 0x6, 0xfffffffffffffffd, 0x8, 0x80000001, 0x1ff, 0x1000, 0x4dfc, 0x80, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000500), 0x4}, 0x10020, 0x3f, 0x3, 0x4, 0x8000, 0x7fffffff, 0x5}, r5, 0x6, r0, 0x8) 22:58:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000280)='./file0\x00', 0x80000001, 0x1, &(0x7f00000002c0)=[{&(0x7f00000000c0)="800000000002000019000000e60100006c0000003f0000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1014001, &(0x7f00000003c0)={[{@journal_checksum='journal_checksum'}]}) [ 1352.848027] netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. 22:58:47 executing program 4: bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={0xffffffffffffffff, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000340)) r2 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r4, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r0, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r0, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r0, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r0, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r5 = gettid() sendmsg(r1, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x139f605562ecba0b, 0x70, 0x9, 0x6, 0x7fff, 0x4, 0x0, 0x5, 0x400, 0x2, 0x0, 0x4, 0x7, 0x9, 0x1, 0x5, 0x80, 0x5, 0x9, 0x4, 0x9, 0xb61c, 0x7f, 0xffff, 0x7fff, 0xfff, 0x6, 0xfffffffffffffffb, 0x8, 0x6, 0x6, 0xfffffffffffffffd, 0x8, 0x80000001, 0x1ff, 0x1000, 0x4dfc, 0x80, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000500), 0x4}, 0x10020, 0x3f, 0x3, 0x4, 0x8000, 0x7fffffff, 0x5}, r5, 0x6, r0, 0x8) [ 1352.891416] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 22:58:48 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r0, 0x800448d2, &(0x7f0000000080)={0x5, &(0x7f0000000200)=[{}, {}, {}, {}, {}]}) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0xfff, @mcast1, 0x80000000}, 0x1c) 22:58:48 executing program 2: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) 22:58:48 executing program 5: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) [ 1352.948737] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1352.970318] device nr0 entered promiscuous mode [ 1352.977837] EXT4-fs (loop1): group descriptors corrupted! [ 1353.062270] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 22:58:48 executing program 3: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x1, 0x0) ioctl$KDGKBLED(r0, 0x4b64, &(0x7f0000000080)) r1 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517}) ioctl$FIGETBSZ(r1, 0x2, &(0x7f0000000000)) [ 1353.120838] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1353.142529] EXT4-fs (loop1): group descriptors corrupted! 22:58:48 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000280)='./file0\x00', 0x80000001, 0x1, &(0x7f00000002c0)=[{&(0x7f00000000c0)="800000000002000019000000e60100006cffffff8c0000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1014001, &(0x7f00000003c0)={[{@journal_checksum='journal_checksum'}]}) [ 1353.367908] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1353.403970] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1353.446006] EXT4-fs (loop1): group descriptors corrupted! [ 1353.524192] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1353.547096] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1353.574091] EXT4-fs (loop1): group descriptors corrupted! [ 1353.628665] netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. 22:58:48 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x40, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1001, 0x4, 0x7ff, 0x2, 0x0, 0x10000, 0x0, 0xc776, 0x9, 0x1, 0x3, 0xa76, 0x3, 0x3, 0x401, 0x7, 0x200, 0x384, 0x0, 0x200, 0x7f, 0x2, 0x9, 0x7f, 0x4, 0x7ff, 0x2, 0x99a, 0xd, 0x0, 0x0, 0x85e, 0x0, @perf_config_ext={0x0, 0xb6}, 0x10000, 0x79, 0xa2, 0x4, 0x100000000, 0x9, 0xdfa8}, 0x0, 0x10, r0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000240)=""/80) ioctl$TUNSETLINK(r0, 0x400454cd, 0x200) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="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") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) openat$cgroup_int(r2, &(0x7f0000000040)='io.weight\x00', 0x2, 0x0) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r3, &(0x7f0000000000), 0x17b) 22:58:48 executing program 3: r0 = syz_open_dev$usb(&(0x7f00000002c0)='/dev/bus/usb/00#/00#\x00', 0x40000000004, 0x0) ioctl$KVM_GET_XCRS(r0, 0x8188aea6, &(0x7f0000000080)={0x1, 0x3, [{0x22, 0x0, 0x2}]}) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000040)=0xfffffffffffffffe) 22:58:48 executing program 2: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) 22:58:48 executing program 5: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") 22:58:48 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000280)='./file0\x00', 0x80000001, 0x1, &(0x7f00000002c0)=[{&(0x7f00000000c0)="800000000002000019000000e60100006c000300000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1014001, &(0x7f00000003c0)={[{@journal_checksum='journal_checksum'}]}) 22:58:48 executing program 4: openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={0xffffffffffffffff, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000340)) r2 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r4, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r0, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r0, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r0, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r0, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r5 = gettid() sendmsg(r1, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x139f605562ecba0b, 0x70, 0x9, 0x6, 0x7fff, 0x4, 0x0, 0x5, 0x400, 0x2, 0x0, 0x4, 0x7, 0x9, 0x1, 0x5, 0x80, 0x5, 0x9, 0x4, 0x9, 0xb61c, 0x7f, 0xffff, 0x7fff, 0xfff, 0x6, 0xfffffffffffffffb, 0x8, 0x6, 0x6, 0xfffffffffffffffd, 0x8, 0x80000001, 0x1ff, 0x1000, 0x4dfc, 0x80, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000500), 0x4}, 0x10020, 0x3f, 0x3, 0x4, 0x8000, 0x7fffffff, 0x5}, r5, 0x6, r0, 0x8) [ 1353.834980] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1353.867951] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 22:58:48 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) openat$cgroup_type(r0, &(0x7f0000000040)='cgroup.type\x00', 0x2, 0x0) 22:58:48 executing program 5: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) 22:58:48 executing program 2: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) [ 1353.884109] netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. [ 1353.895430] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock 22:58:49 executing program 4: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x0, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r6 = gettid() sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x139f605562ecba0b, 0x70, 0x9, 0x6, 0x7fff, 0x4, 0x0, 0x5, 0x400, 0x2, 0x0, 0x4, 0x7, 0x9, 0x1, 0x5, 0x80, 0x5, 0x9, 0x4, 0x9, 0xb61c, 0x7f, 0xffff, 0x7fff, 0xfff, 0x6, 0xfffffffffffffffb, 0x8, 0x6, 0x6, 0xfffffffffffffffd, 0x8, 0x80000001, 0x1ff, 0x1000, 0x4dfc, 0x80, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000500), 0x4}, 0x10020, 0x3f, 0x3, 0x4, 0x8000, 0x7fffffff, 0x5}, r6, 0x6, r1, 0x8) [ 1353.935551] EXT4-fs (loop1): can't mount with journal_checksum, fs mounted w/o journal [ 1354.042009] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1354.045370] device nr0 entered promiscuous mode 22:58:49 executing program 3: ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517}) syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x800, 0x2000) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, &(0x7f0000000000)) 22:58:49 executing program 5: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) [ 1354.089572] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 1354.126661] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1354.162052] EXT4-fs (loop1): can't mount with journal_checksum, fs mounted w/o journal [ 1354.714327] netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. 22:58:49 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x40, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1001, 0x4, 0x7ff, 0x2, 0x0, 0x10000, 0x0, 0xc776, 0x9, 0x1, 0x3, 0xa76, 0x3, 0x3, 0x401, 0x7, 0x200, 0x384, 0x0, 0x200, 0x7f, 0x2, 0x9, 0x7f, 0x4, 0x7ff, 0x2, 0x99a, 0xd, 0x0, 0x0, 0x85e, 0x0, @perf_config_ext={0x0, 0xb6}, 0x10000, 0x79, 0xa2, 0x4, 0x100000000, 0x9, 0xdfa8}, 0x0, 0x10, r0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000240)=""/80) ioctl$TUNSETLINK(r0, 0x400454cd, 0x200) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="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") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) openat$cgroup_int(r2, &(0x7f0000000040)='io.weight\x00', 0x2, 0x0) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r3, &(0x7f0000000000), 0x17b) 22:58:49 executing program 2: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) 22:58:49 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) ioctl$KVM_GET_DEVICE_ATTR(r0, 0x4018aee2, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0xd2, &(0x7f0000000000)=0x101}) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0xfffffffffffffffd, 0xc, 0x10001}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000040)) 22:58:49 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000280)='./file0\x00', 0x80000001, 0x1, &(0x7f00000002c0)=[{&(0x7f00000000c0)="800000000002000019000000e60100006c000000000000006500000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1014001, &(0x7f00000003c0)={[{@journal_checksum='journal_checksum'}]}) 22:58:49 executing program 4: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x0, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r6 = gettid() sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x139f605562ecba0b, 0x70, 0x9, 0x6, 0x7fff, 0x4, 0x0, 0x5, 0x400, 0x2, 0x0, 0x4, 0x7, 0x9, 0x1, 0x5, 0x80, 0x5, 0x9, 0x4, 0x9, 0xb61c, 0x7f, 0xffff, 0x7fff, 0xfff, 0x6, 0xfffffffffffffffb, 0x8, 0x6, 0x6, 0xfffffffffffffffd, 0x8, 0x80000001, 0x1ff, 0x1000, 0x4dfc, 0x80, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000500), 0x4}, 0x10020, 0x3f, 0x3, 0x4, 0x8000, 0x7fffffff, 0x5}, r6, 0x6, r1, 0x8) 22:58:49 executing program 5: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) [ 1354.842898] EXT4-fs (loop1): Invalid log block size: 101 22:58:49 executing program 2: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) 22:58:49 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517, 0x0, 0x0, 0x2d}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) [ 1354.935040] netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. [ 1354.947490] EXT4-fs (loop1): Invalid log block size: 101 22:58:50 executing program 4: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x0, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r6 = gettid() sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x139f605562ecba0b, 0x70, 0x9, 0x6, 0x7fff, 0x4, 0x0, 0x5, 0x400, 0x2, 0x0, 0x4, 0x7, 0x9, 0x1, 0x5, 0x80, 0x5, 0x9, 0x4, 0x9, 0xb61c, 0x7f, 0xffff, 0x7fff, 0xfff, 0x6, 0xfffffffffffffffb, 0x8, 0x6, 0x6, 0xfffffffffffffffd, 0x8, 0x80000001, 0x1ff, 0x1000, 0x4dfc, 0x80, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000500), 0x4}, 0x10020, 0x3f, 0x3, 0x4, 0x8000, 0x7fffffff, 0x5}, r6, 0x6, r1, 0x8) 22:58:50 executing program 5: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) 22:58:50 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000280)='./file0\x00', 0x80000001, 0x1, &(0x7f00000002c0)=[{&(0x7f00000000c0)="800000000002000019000000e60100006c0000002d0000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1014001, &(0x7f00000003c0)={[{@journal_checksum='journal_checksum'}]}) 22:58:50 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517, 0x0, 0x0, 0x8000000000000}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) [ 1355.196317] device nr0 entered promiscuous mode [ 1355.202867] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1355.223740] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1355.246104] EXT4-fs (loop1): group descriptors corrupted! [ 1355.272211] netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. [ 1355.324062] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1355.337819] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1355.362699] EXT4-fs (loop1): group descriptors corrupted! 22:58:50 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x40, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1001, 0x4, 0x7ff, 0x2, 0x0, 0x10000, 0x0, 0xc776, 0x9, 0x1, 0x3, 0xa76, 0x3, 0x3, 0x401, 0x7, 0x200, 0x384, 0x0, 0x200, 0x7f, 0x2, 0x9, 0x7f, 0x4, 0x7ff, 0x2, 0x99a, 0xd, 0x0, 0x0, 0x85e, 0x0, @perf_config_ext={0x0, 0xb6}, 0x10000, 0x79, 0xa2, 0x4, 0x100000000, 0x9, 0xdfa8}, 0x0, 0x10, r0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000240)=""/80) ioctl$TUNSETLINK(r0, 0x400454cd, 0x200) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="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") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) openat$cgroup_int(r2, &(0x7f0000000040)='io.weight\x00', 0x2, 0x0) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r3, &(0x7f0000000000), 0x17b) 22:58:50 executing program 2: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) 22:58:50 executing program 5: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) 22:58:50 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000002, 0xfffffffffffffffe) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517, 0x1}) dup2(r0, r0) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000040)) fcntl$getflags(r0, 0x0) 22:58:51 executing program 4: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r6 = gettid() sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x139f605562ecba0b, 0x70, 0x9, 0x6, 0x7fff, 0x4, 0x0, 0x5, 0x400, 0x2, 0x0, 0x4, 0x7, 0x9, 0x1, 0x5, 0x80, 0x5, 0x9, 0x4, 0x9, 0xb61c, 0x7f, 0xffff, 0x7fff, 0xfff, 0x6, 0xfffffffffffffffb, 0x8, 0x6, 0x6, 0xfffffffffffffffd, 0x8, 0x80000001, 0x1ff, 0x1000, 0x4dfc, 0x80, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000500), 0x4}, 0x10020, 0x3f, 0x3, 0x4, 0x8000, 0x7fffffff, 0x5}, r6, 0x6, r1, 0x8) 22:58:51 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000280)='./file0\x00', 0x80000001, 0x1, &(0x7f00000002c0)=[{&(0x7f00000000c0)="800000000002000019000000e60100006c8cffffff0000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1014001, &(0x7f00000003c0)={[{@journal_checksum='journal_checksum'}]}) [ 1356.018981] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1356.057662] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! 22:58:51 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x0, 0x101}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) [ 1356.085446] netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. [ 1356.089305] EXT4-fs (loop1): group descriptors corrupted! 22:58:51 executing program 2: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) 22:58:51 executing program 5: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) [ 1356.209622] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1356.237547] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! 22:58:51 executing program 4: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r6 = gettid() sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x139f605562ecba0b, 0x70, 0x9, 0x6, 0x7fff, 0x4, 0x0, 0x5, 0x400, 0x2, 0x0, 0x4, 0x7, 0x9, 0x1, 0x5, 0x80, 0x5, 0x9, 0x4, 0x9, 0xb61c, 0x7f, 0xffff, 0x7fff, 0xfff, 0x6, 0xfffffffffffffffb, 0x8, 0x6, 0x6, 0xfffffffffffffffd, 0x8, 0x80000001, 0x1ff, 0x1000, 0x4dfc, 0x80, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000500), 0x4}, 0x10020, 0x3f, 0x3, 0x4, 0x8000, 0x7fffffff, 0x5}, r6, 0x6, r1, 0x8) [ 1356.257713] EXT4-fs (loop1): group descriptors corrupted! 22:58:51 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x24000, 0x0) fcntl$setsig(r0, 0xa, 0x24) r1 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0105512, &(0x7f00000001c0)={0x1, 0x5517, 0x0, 0x8, 0xfffffffffffffffb}) ioctl$FIGETBSZ(r1, 0x2, &(0x7f0000000000)) 22:58:51 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000280)='./file0\x00', 0x80000001, 0x1, &(0x7f00000002c0)=[{&(0x7f00000000c0)="800000000002000019000000e60100006c000002000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1014001, &(0x7f00000003c0)={[{@journal_checksum='journal_checksum'}]}) [ 1356.421895] device nr0 entered promiscuous mode [ 1356.532093] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1356.548038] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 1356.582417] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1356.606287] EXT4-fs (loop1): can't mount with journal_checksum, fs mounted w/o journal [ 1356.689961] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1356.719986] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 1356.737763] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1356.757719] EXT4-fs (loop1): can't mount with journal_checksum, fs mounted w/o journal 22:58:52 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x40, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1001, 0x4, 0x7ff, 0x2, 0x0, 0x10000, 0x0, 0xc776, 0x9, 0x1, 0x3, 0xa76, 0x3, 0x3, 0x401, 0x7, 0x200, 0x384, 0x0, 0x200, 0x7f, 0x2, 0x9, 0x7f, 0x4, 0x7ff, 0x2, 0x99a, 0xd, 0x0, 0x0, 0x85e, 0x0, @perf_config_ext={0x0, 0xb6}, 0x10000, 0x79, 0xa2, 0x4, 0x100000000, 0x9, 0xdfa8}, 0x0, 0x10, r0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000240)=""/80) ioctl$TUNSETLINK(r0, 0x400454cd, 0x200) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="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") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) openat$cgroup_int(r2, &(0x7f0000000040)='io.weight\x00', 0x2, 0x0) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r3, &(0x7f0000000000), 0x17b) 22:58:52 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000003, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) 22:58:52 executing program 4: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r6 = gettid() sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x139f605562ecba0b, 0x70, 0x9, 0x6, 0x7fff, 0x4, 0x0, 0x5, 0x400, 0x2, 0x0, 0x4, 0x7, 0x9, 0x1, 0x5, 0x80, 0x5, 0x9, 0x4, 0x9, 0xb61c, 0x7f, 0xffff, 0x7fff, 0xfff, 0x6, 0xfffffffffffffffb, 0x8, 0x6, 0x6, 0xfffffffffffffffd, 0x8, 0x80000001, 0x1ff, 0x1000, 0x4dfc, 0x80, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000500), 0x4}, 0x10020, 0x3f, 0x3, 0x4, 0x8000, 0x7fffffff, 0x5}, r6, 0x6, r1, 0x8) 22:58:52 executing program 2: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) 22:58:52 executing program 5: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) 22:58:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000280)='./file0\x00', 0x80000001, 0x1, &(0x7f00000002c0)=[{&(0x7f00000000c0)="800000000002000019000000e60100006c000000000000262100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1014001, &(0x7f00000003c0)={[{@journal_checksum='journal_checksum'}]}) [ 1357.175655] EXT4-fs (loop1): Invalid log block size: 33 [ 1357.197281] __nla_parse: 1 callbacks suppressed [ 1357.197299] netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. 22:58:52 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f0000000040)={0x80000001, 0x677, 0x3ff, 0xffffffffffffff06, 0x4, 0x3}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) 22:58:52 executing program 2: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) 22:58:52 executing program 5: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) [ 1357.263609] EXT4-fs (loop1): Invalid log block size: 33 22:58:52 executing program 4: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r6 = gettid() sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x139f605562ecba0b, 0x70, 0x9, 0x6, 0x7fff, 0x4, 0x0, 0x5, 0x400, 0x2, 0x0, 0x4, 0x7, 0x9, 0x1, 0x5, 0x80, 0x5, 0x9, 0x4, 0x9, 0xb61c, 0x7f, 0xffff, 0x7fff, 0xfff, 0x6, 0xfffffffffffffffb, 0x8, 0x6, 0x6, 0xfffffffffffffffd, 0x8, 0x80000001, 0x1ff, 0x1000, 0x4dfc, 0x80, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000500), 0x4}, 0x10020, 0x3f, 0x3, 0x4, 0x8000, 0x7fffffff, 0x5}, r6, 0x6, r1, 0x8) 22:58:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000280)='./file0\x00', 0x80000001, 0x1, &(0x7f00000002c0)=[{&(0x7f00000000c0)="800000000002000019000000e60100006c000000030000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1014001, &(0x7f00000003c0)={[{@journal_checksum='journal_checksum'}]}) [ 1357.449548] device nr0 entered promiscuous mode 22:58:52 executing program 3: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x10) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000140)={&(0x7f0000000080)=[0x3, 0xa42, 0x1, 0xffffffffffffff80, 0x0], 0x5, 0x2, 0x6, 0xffffffffffffffb3, 0x4, 0xffff, {0x4, 0x1, 0x8, 0x7fff, 0x0, 0x1, 0x1, 0x7, 0x3ff, 0x100000001, 0x3, 0x3, 0xfffffffffffffffa, 0x8, "11f23b589015b16640f5874962c39f8e05b597f3f01c087d1bf64d86f686dca6"}}) r1 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517}) listxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/79, 0x4f) open$dir(&(0x7f00000000c0)='./file0\x00', 0x10400, 0x10) ioctl$FIGETBSZ(r1, 0x2, &(0x7f0000000000)) [ 1357.536325] netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. [ 1357.562017] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1357.617826] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1357.627244] EXT4-fs (loop1): group descriptors corrupted! [ 1357.710756] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1357.737706] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1357.747090] EXT4-fs (loop1): group descriptors corrupted! 22:58:53 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x40, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1001, 0x4, 0x7ff, 0x2, 0x0, 0x10000, 0x0, 0xc776, 0x9, 0x1, 0x3, 0xa76, 0x3, 0x3, 0x401, 0x7, 0x200, 0x384, 0x0, 0x200, 0x7f, 0x2, 0x9, 0x7f, 0x4, 0x7ff, 0x2, 0x99a, 0xd, 0x0, 0x0, 0x85e, 0x0, @perf_config_ext={0x0, 0xb6}, 0x10000, 0x79, 0xa2, 0x4, 0x100000000, 0x9, 0xdfa8}, 0x0, 0x10, r0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000240)=""/80) ioctl$TUNSETLINK(r0, 0x400454cd, 0x200) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="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") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) openat$cgroup_int(r2, &(0x7f0000000040)='io.weight\x00', 0x2, 0x0) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r3, &(0x7f0000000000), 0x17b) 22:58:53 executing program 2: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000340)) r2 = socket$kcm(0x2, 0x5, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x890b, &(0x7f0000000000)) 22:58:53 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) mknodat(r0, &(0x7f0000000040)='./file0\x00', 0x200, 0x8000) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000180)='./file0\x00'}, 0x10) 22:58:53 executing program 5: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) 22:58:53 executing program 4: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r6 = gettid() sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x139f605562ecba0b, 0x70, 0x9, 0x6, 0x7fff, 0x4, 0x0, 0x5, 0x400, 0x2, 0x0, 0x4, 0x7, 0x9, 0x1, 0x5, 0x80, 0x5, 0x9, 0x4, 0x9, 0xb61c, 0x7f, 0xffff, 0x7fff, 0xfff, 0x6, 0xfffffffffffffffb, 0x8, 0x6, 0x6, 0xfffffffffffffffd, 0x8, 0x80000001, 0x1ff, 0x1000, 0x4dfc, 0x80, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000500), 0x4}, 0x10020, 0x3f, 0x3, 0x4, 0x8000, 0x7fffffff, 0x5}, r6, 0x6, r1, 0x8) 22:58:53 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000280)='./file0\x00', 0x80000001, 0x1, &(0x7f00000002c0)=[{&(0x7f00000000c0)="800000000002000019000000e60100006c000000050000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1014001, &(0x7f00000003c0)={[{@journal_checksum='journal_checksum'}]}) 22:58:53 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0x7, &(0x7f00000000c0)={0xf3d, 0x9, 0x1, 0xffffffffffffffc0}, 0x10) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517}) utimensat(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={{}, {0x0, 0x7530}}, 0x100) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) [ 1358.332985] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 22:58:53 executing program 5: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) [ 1358.376189] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1358.390137] netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. [ 1358.397628] EXT4-fs (loop1): group descriptors corrupted! 22:58:53 executing program 2: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000340)) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) [ 1358.457389] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1358.471935] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! 22:58:53 executing program 4: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r6 = gettid() sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x139f605562ecba0b, 0x70, 0x9, 0x6, 0x7fff, 0x4, 0x0, 0x5, 0x400, 0x2, 0x0, 0x4, 0x7, 0x9, 0x1, 0x5, 0x80, 0x5, 0x9, 0x4, 0x9, 0xb61c, 0x7f, 0xffff, 0x7fff, 0xfff, 0x6, 0xfffffffffffffffb, 0x8, 0x6, 0x6, 0xfffffffffffffffd, 0x8, 0x80000001, 0x1ff, 0x1000, 0x4dfc, 0x80, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000500), 0x4}, 0x10020, 0x3f, 0x3, 0x4, 0x8000, 0x7fffffff, 0x5}, r6, 0x6, r1, 0x8) 22:58:53 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000040)=0x0) syz_open_procfs(r1, &(0x7f0000000080)='auxv\x00') getpriority(0x0, r1) [ 1358.547036] EXT4-fs (loop1): group descriptors corrupted! 22:58:53 executing program 5: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) [ 1358.669785] device nr0 entered promiscuous mode [ 1359.137203] netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. 22:58:54 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x40, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1001, 0x4, 0x7ff, 0x2, 0x0, 0x10000, 0x0, 0xc776, 0x9, 0x1, 0x3, 0xa76, 0x3, 0x3, 0x401, 0x7, 0x200, 0x384, 0x0, 0x200, 0x7f, 0x2, 0x9, 0x7f, 0x4, 0x7ff, 0x2, 0x99a, 0xd, 0x0, 0x0, 0x85e, 0x0, @perf_config_ext={0x0, 0xb6}, 0x10000, 0x79, 0xa2, 0x4, 0x100000000, 0x9, 0xdfa8}, 0x0, 0x10, r0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000240)=""/80) ioctl$TUNSETLINK(r0, 0x400454cd, 0x200) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="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") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) openat$cgroup_int(r2, &(0x7f0000000040)='io.weight\x00', 0x2, 0x0) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r3, &(0x7f0000000000), 0x17b) 22:58:54 executing program 2: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000340)) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) 22:58:54 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000280)='./file0\x00', 0x80000001, 0x1, &(0x7f00000002c0)=[{&(0x7f00000000c0)="800000000002000019000000e60100006c000900000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1014001, &(0x7f00000003c0)={[{@journal_checksum='journal_checksum'}]}) 22:58:54 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000040)=0x4b, 0x4) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) 22:58:54 executing program 5: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) 22:58:54 executing program 4: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r6 = gettid() sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x139f605562ecba0b, 0x70, 0x9, 0x6, 0x7fff, 0x4, 0x0, 0x5, 0x400, 0x2, 0x0, 0x4, 0x7, 0x9, 0x1, 0x5, 0x80, 0x5, 0x9, 0x4, 0x9, 0xb61c, 0x7f, 0xffff, 0x7fff, 0xfff, 0x6, 0xfffffffffffffffb, 0x8, 0x6, 0x6, 0xfffffffffffffffd, 0x8, 0x80000001, 0x1ff, 0x1000, 0x4dfc, 0x80, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000500), 0x4}, 0x10020, 0x3f, 0x3, 0x4, 0x8000, 0x7fffffff, 0x5}, r6, 0x6, r1, 0x8) [ 1359.320241] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 22:58:54 executing program 2: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000340)) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) 22:58:54 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f0000000040)={0x4000000000, 0x5517}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000080)) 22:58:54 executing program 5: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) [ 1359.367684] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 1359.427480] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1359.447749] EXT4-fs (loop1): can't mount with journal_checksum, fs mounted w/o journal 22:58:54 executing program 2: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)) r1 = socket$kcm(0x2, 0x5, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x890b, &(0x7f0000000000)) 22:58:54 executing program 3: r0 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r0, 0xc1205531, &(0x7f0000000200)={0x10001, 0x5, 0x3ff, 0x9, [], [], [], 0x6, 0x8, 0x0, 0x22, "71e373344c6bffc1fc9afa13d0f45452"}) r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x5) clock_nanosleep(0xd3e2ddfca2bfbf26, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@local, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000580)=0xe8) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517}) ioctl$KVM_HAS_DEVICE_ATTR(r1, 0x4018aee3, &(0x7f0000000380)={0x0, 0x9, 0x4, &(0x7f0000000340)=0x100000001}) ioctl$FIGETBSZ(r1, 0x2, &(0x7f0000000000)) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r1, 0xc058534f, &(0x7f0000000100)={{0xffffffffffffff99, 0x7ff}, 0x0, 0xff0, 0x100000001, {0x20, 0x6}, 0x4, 0x98}) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000180)={0x747, 0x400, 0x401, 0x8, 0x7}) [ 1359.533676] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1359.544951] device nr0 entered promiscuous mode [ 1359.555919] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 1359.564546] netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. 22:58:54 executing program 5: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000340)) r2 = socket$kcm(0x2, 0x5, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x890b, &(0x7f0000000000)) [ 1359.609088] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1359.638210] EXT4-fs (loop1): can't mount with journal_checksum, fs mounted w/o journal 22:58:55 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1001, 0x4, 0x7ff, 0x2, 0x0, 0x10000, 0x0, 0xc776, 0x9, 0x1, 0x3, 0xa76, 0x3, 0x3, 0x401, 0x7, 0x200, 0x384, 0x0, 0x200, 0x7f, 0x2, 0x9, 0x7f, 0x4, 0x7ff, 0x2, 0x99a, 0xd, 0x0, 0x0, 0x85e, 0x0, @perf_config_ext={0x0, 0xb6}, 0x10000, 0x79, 0xa2, 0x4, 0x100000000, 0x9, 0xdfa8}, 0x0, 0x10, r0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000240)=""/80) ioctl$TUNSETLINK(r0, 0x400454cd, 0x200) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="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") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) openat$cgroup_int(r2, &(0x7f0000000040)='io.weight\x00', 0x2, 0x0) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r3, &(0x7f0000000000), 0x17b) 22:58:55 executing program 4: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r6 = gettid() sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x139f605562ecba0b, 0x70, 0x9, 0x6, 0x7fff, 0x4, 0x0, 0x5, 0x400, 0x2, 0x0, 0x4, 0x7, 0x9, 0x1, 0x5, 0x80, 0x5, 0x9, 0x4, 0x9, 0xb61c, 0x7f, 0xffff, 0x7fff, 0xfff, 0x6, 0xfffffffffffffffb, 0x8, 0x6, 0x6, 0xfffffffffffffffd, 0x8, 0x80000001, 0x1ff, 0x1000, 0x4dfc, 0x80, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000500), 0x4}, 0x10020, 0x3f, 0x3, 0x4, 0x8000, 0x7fffffff, 0x5}, r6, 0x6, r1, 0x8) 22:58:55 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000280)='./file0\x00', 0x80000001, 0x1, &(0x7f00000002c0)=[{&(0x7f00000000c0)="800000000002000019000000e60100006c100400000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1014001, &(0x7f00000003c0)={[{@journal_checksum='journal_checksum'}]}) 22:58:55 executing program 3: socketpair(0x7, 0x7, 0xa1, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='westwood\x00', 0x9) r1 = socket$inet_sctp(0x2, 0x0, 0x84) ioctl$SG_GET_PACK_ID(r0, 0x227c, &(0x7f0000000200)) pread64(r1, &(0x7f0000000040)=""/157, 0x9d, 0x0) r2 = request_key(&(0x7f0000000240)='encrypted\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f00000002c0)='(proc*vmnet1lo[\x00', 0xffffffffffffffff) keyctl$invalidate(0x15, r2) r3 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) ioctl$FS_IOC_FSGETXATTR(r3, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517}) ioctl$FIGETBSZ(r3, 0x2, &(0x7f0000000000)) 22:58:55 executing program 5: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000340)) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) 22:58:55 executing program 2: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x5, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x890b, &(0x7f0000000000)) [ 1360.389508] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1360.397005] netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. 22:58:55 executing program 2: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) r1 = socket$kcm(0x2, 0x5, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x890b, &(0x7f0000000000)) 22:58:55 executing program 5: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000340)) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) [ 1360.434426] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 22:58:55 executing program 4: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r6 = gettid() sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x139f605562ecba0b, 0x70, 0x9, 0x6, 0x7fff, 0x4, 0x0, 0x5, 0x400, 0x2, 0x0, 0x4, 0x7, 0x9, 0x1, 0x5, 0x80, 0x5, 0x9, 0x4, 0x9, 0xb61c, 0x7f, 0xffff, 0x7fff, 0xfff, 0x6, 0xfffffffffffffffb, 0x8, 0x6, 0x6, 0xfffffffffffffffd, 0x8, 0x80000001, 0x1ff, 0x1000, 0x4dfc, 0x80, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000500), 0x4}, 0x10020, 0x3f, 0x3, 0x4, 0x8000, 0x7fffffff, 0x5}, r6, 0x6, r1, 0x8) [ 1360.489412] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1360.517963] EXT4-fs (loop1): can't mount with journal_checksum, fs mounted w/o journal [ 1360.616883] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 22:58:55 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='loginuid\x00') syz_mount_image$nfs4(&(0x7f0000000180)='nfs4\x00', &(0x7f0000000200)='./file0\x00', 0x546, 0x8, &(0x7f0000001700)=[{&(0x7f0000000240)="25d541e3761021ed685050eadd82db64fff048a4fd38205b9122f083088d93c0b033b2ee7f03ad368e15d91ef7a990943d8e373c", 0x34, 0xffffffffffffffff}, {&(0x7f0000000280)="038aaed2d049f0e5ff591c4b7f418a815de4598483d2e653f41dc3067989db6a26c42bcf7c7e6ecd3ffde6f0da82a44b1d9b5d4c11d9e61a672765c17a273d45b33787edcd0ba86079dd6bfc6a6ae74ca74028146ac863673eaa297ae5f2a662b222cc3aac5d9efc7e668d9c53cec2716ff518aa447ff6c88169e82617c63882dbf290723976efca957be0c8ffc4d83baac5545a2ecfcec486d2da44396b744d4c57be69abe32660a156c0d646e843c5471d510e7c716030b88fae9d7cf909238c425c", 0xc3, 0x9}, {&(0x7f0000000380)="e62f80fd07002acf72d06bf42df13994585ac381e1678f394bc918056c03ef4c1c78a5d179ab325fdd1955518f4b2cb0b4eed5cffe14f3e83e226070230b88f04a9781d8aa16846ab167298f703d5d190550bcaf3230adc54d8da32b2fc65fdfaa6a3d0c9623dc01650b101fdb3573463eb14e51eca650cc83bcc0c88761d6c80cb5bd806d82a32386fd4b4cedb3f5b1ac15b3c45a36c6c70d3709a06376615f62a28542bd180a415caac5576932de1c904adf7fef892c02fbc52b991d2c146b78e9e4dbaeb7a19952ac4b5e48133d41cc50e71aad0ff457fe374290dedd7d7376f8c67b84e117a2fa0f82c191b8cfe127f83b1d", 0xf4, 0x5e8000}, {&(0x7f0000000480)="6dc401a2b269fbf203e1d801528118fd46f0ffec5b4918a0399db8e319b6a830f02e644ffaff91cc9ed15868a1368ae893912cc88562670cb85ef64bf5198dfef5e5eebf5b92b5eb022e840de274acaee5f6744594419b46f79fd73d6a73e64e7e076da10c9910b289294d7eebcf2cff803b3b8d2e909eb0", 0x78, 0x2}, {&(0x7f0000000500)="39207dccc7276fe34fe061c14af804f02a4c4d0507dd44710d51f657473c31ec0d11fd2c573d45b71a204c9009f0f358942566db2c60ace3dd3611d9293325a830c40c6acc84cb0c25894f0d9e12b48453792cf210222161ef2986", 0x5b, 0xa5}, {&(0x7f0000000580)="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", 0x1000, 0x7ff}, {&(0x7f0000001580)="d089cabc661450e4eca8837c5af1498e285f1eec48ef03c559be358a63d67a62c1899b7898fc191d5c56f20087f2b850369ac9bc4765cbf15f30ad5a6a2bb86376c4d023e96b78c69d56dd75cfdd1b90023331d51086dd4894ee123fdeb2f1857b9f", 0x62, 0x100000000}, {&(0x7f0000001600)="f3b00710630d63c9ea3f568b21f52d9ad34b7b66249d4baa6a14b0cdc8b4353c5bef921c7a58297f017a2400804b4b344ff03d1bda5a2aa10eaf0955f17a2d911bf970bf18980b3cbcd21c803f68e0971d3ca80673fddc5e563d2e06c949f014d1e461091139edbdc0e6f5b630cdca43e224e6efd328c7d960530c77d22d05c297fb1ae4d750858ef13966c482290f87bd49f42d35d5e7a73ec6182e6eaa2d7b08fd99d7318b8a51d69cc09bced5a69c739c4b193ec3ec6e43004593a2af3a7a2b2f43047ea3fe7855e8bf313bea495f1528a378d76ab3ba5b6c06e37612c556c5f4f4737c66b150b47dda8409280db873e89fa85a337375", 0xf8, 0x8}], 0x80000, &(0x7f00000017c0)='/dev/bus/usb/00#/00#\x00') getsockopt$inet6_tcp_buf(r0, 0x6, 0xb, &(0x7f0000001800)=""/185, &(0x7f00000018c0)=0xb9) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000080)=@assoc_value={0x0}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000140)=@sack_info={r1, 0x40, 0x17}, 0xc) r2 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) ioctl$FS_IOC_FSGETXATTR(r2, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517}) ioctl$FIGETBSZ(r2, 0x2, &(0x7f0000001900)) 22:58:55 executing program 5: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000340)) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) [ 1360.727649] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 1360.751699] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1360.775072] device nr0 entered promiscuous mode [ 1360.784696] EXT4-fs (loop1): can't mount with journal_checksum, fs mounted w/o journal 22:58:55 executing program 2: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) r1 = socket$kcm(0x2, 0x5, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x890b, &(0x7f0000000000)) [ 1360.826235] netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. 22:58:56 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x40, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1001, 0x4, 0x7ff, 0x2, 0x0, 0x10000, 0x0, 0xc776, 0x9, 0x1, 0x3, 0xa76, 0x3, 0x3, 0x401, 0x7, 0x200, 0x384, 0x0, 0x200, 0x7f, 0x2, 0x9, 0x7f, 0x4, 0x7ff, 0x2, 0x99a, 0xd, 0x0, 0x0, 0x85e, 0x0, @perf_config_ext={0x0, 0xb6}, 0x10000, 0x79, 0xa2, 0x4, 0x100000000, 0x9, 0xdfa8}, 0x0, 0x10, r0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000240)=""/80) ioctl$TUNSETLINK(r0, 0x400454cd, 0x200) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="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") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) openat$cgroup_int(r2, &(0x7f0000000040)='io.weight\x00', 0x2, 0x0) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r3, &(0x7f0000000000), 0x17b) 22:58:56 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000280)='./file0\x00', 0x80000001, 0x1, &(0x7f00000002c0)=[{&(0x7f00000000c0)="800000000002000019000000e60100006c000000070000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1014001, &(0x7f00000003c0)={[{@journal_checksum='journal_checksum'}]}) 22:58:56 executing program 5: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)) r1 = socket$kcm(0x2, 0x5, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x890b, &(0x7f0000000000)) 22:58:56 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000140)='/dev/bus/usb/00#/00#\x00', 0x9, 0xfffff7fffffffffe) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x0, 0x7}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4, 0xfa00, {r1}}, 0xc) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0xc0) 22:58:56 executing program 2: openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) r0 = socket$kcm(0x2, 0x5, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x890b, &(0x7f0000000000)) 22:58:56 executing program 4: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r6 = gettid() sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x139f605562ecba0b, 0x70, 0x9, 0x6, 0x7fff, 0x4, 0x0, 0x5, 0x400, 0x2, 0x0, 0x4, 0x7, 0x9, 0x1, 0x5, 0x80, 0x5, 0x9, 0x4, 0x9, 0xb61c, 0x7f, 0xffff, 0x7fff, 0xfff, 0x6, 0xfffffffffffffffb, 0x8, 0x6, 0x6, 0xfffffffffffffffd, 0x8, 0x80000001, 0x1ff, 0x1000, 0x4dfc, 0x80, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000500), 0x4}, 0x10020, 0x3f, 0x3, 0x4, 0x8000, 0x7fffffff, 0x5}, r6, 0x6, r1, 0x8) [ 1361.497132] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1361.527763] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! 22:58:56 executing program 2: r0 = socket$kcm(0x2, 0x5, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x890b, &(0x7f0000000000)) [ 1361.549978] netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. [ 1361.557367] EXT4-fs (loop1): group descriptors corrupted! [ 1361.611527] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1361.640005] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! 22:58:56 executing program 5: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x5, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x890b, &(0x7f0000000000)) 22:58:56 executing program 4: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r6 = gettid() sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x139f605562ecba0b, 0x70, 0x9, 0x6, 0x7fff, 0x4, 0x0, 0x5, 0x400, 0x2, 0x0, 0x4, 0x7, 0x9, 0x1, 0x5, 0x80, 0x5, 0x9, 0x4, 0x9, 0xb61c, 0x7f, 0xffff, 0x7fff, 0xfff, 0x6, 0xfffffffffffffffb, 0x8, 0x6, 0x6, 0xfffffffffffffffd, 0x8, 0x80000001, 0x1ff, 0x1000, 0x4dfc, 0x80, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000500), 0x4}, 0x10020, 0x3f, 0x3, 0x4, 0x8000, 0x7fffffff, 0x5}, r6, 0x6, r1, 0x8) 22:58:56 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x2000000, 0x1010, r0, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517}) setsockopt$inet_buf(r0, 0x0, 0x9, &(0x7f0000000200)="3e353b459442df4fb34145232e6cfaf6a60969f8a1172133bd54ae08ddfe252fd5feac74feb7332c41119438dbab42758c69ba2c08851eba3a2474cc38564406316eb7c8cdbe71b1ab8a1364322ed0b9525fbd01c205aac2e9f40d2b5ff1513e5fc4947f9844a7c8b5eb8dac2a407e68a26d1f676fb98b480ca91b99e26ef3a34c58e436b926dd3b4e95990e4d3201e77d9b59d4fc17cc577f6e690fc8a4e67e41c0072f3a2d0e87fc8da1ec3148a687ef941c63c578ec6e0408b0b3b9477ac4b7d1987c880c6335a563d0ff2ea6073f", 0xd0) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) [ 1361.675086] EXT4-fs (loop1): group descriptors corrupted! 22:58:56 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000280)='./file0\x00', 0x80000001, 0x1, &(0x7f00000002c0)=[{&(0x7f00000000c0)="800000000002000019000000e60100006c000000000000001200000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1014001, &(0x7f00000003c0)={[{@journal_checksum='journal_checksum'}]}) [ 1361.829605] device nr0 entered promiscuous mode 22:58:56 executing program 2: r0 = socket$kcm(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x890b, &(0x7f0000000000)) [ 1361.851560] netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. [ 1361.906333] EXT4-fs (loop1): Unsupported filesystem blocksize 268435456 (18 log_block_size) [ 1362.006078] EXT4-fs (loop1): Unsupported filesystem blocksize 268435456 (18 log_block_size) 22:58:57 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x40, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1001, 0x4, 0x7ff, 0x2, 0x0, 0x10000, 0x0, 0xc776, 0x9, 0x1, 0x3, 0xa76, 0x3, 0x3, 0x401, 0x7, 0x200, 0x384, 0x0, 0x200, 0x7f, 0x2, 0x9, 0x7f, 0x4, 0x7ff, 0x2, 0x99a, 0xd, 0x0, 0x0, 0x85e, 0x0, @perf_config_ext={0x0, 0xb6}, 0x10000, 0x79, 0xa2, 0x4, 0x100000000, 0x9, 0xdfa8}, 0x0, 0x10, r0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000240)=""/80) ioctl$TUNSETLINK(r0, 0x400454cd, 0x200) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3dad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88bc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e57e43a3e36bd48d2a85bf4fd4a804e83f2f3cf378a435af5e287d4e27337b4ada11b26219832ec6b2b38446b3b95fe3771e9f42ca30fb21e12f0a3d8bc2d85454af9fcc0232d8fd909448b01f46c593d31ea1c926465e35a4199079c3ca41128b17cb01fbf5b522be0fd02022ada37fecc14b6c8c8831883b85a1106f2f867020d529f17a350f20dd3bf51a98cfda70c2e3638a483fd3f87940bb478b07c4c110394c0093d17955089f2ca97bbe075124c9b1ff6500d536a95d96f03d48596e008bf0a028b539cec796cec9bf585eb80fe3e0d26") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) openat$cgroup_int(r2, &(0x7f0000000040)='io.weight\x00', 0x2, 0x0) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r3, &(0x7f0000000000), 0x17b) 22:58:57 executing program 3: r0 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x1, 0x0) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f00000000c0), 0x4) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000140)={{&(0x7f0000ffa000/0x1000)=nil, 0x1000}, 0x2}) r1 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517}) ioctl$UFFDIO_WAKE(r1, 0x8010aa02, &(0x7f0000000040)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) 22:58:57 executing program 5: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) r1 = socket$kcm(0x2, 0x5, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x890b, &(0x7f0000000000)) 22:58:57 executing program 4: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r6 = gettid() sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x139f605562ecba0b, 0x70, 0x9, 0x6, 0x7fff, 0x4, 0x0, 0x5, 0x400, 0x2, 0x0, 0x4, 0x7, 0x9, 0x1, 0x5, 0x80, 0x5, 0x9, 0x4, 0x9, 0xb61c, 0x7f, 0xffff, 0x7fff, 0xfff, 0x6, 0xfffffffffffffffb, 0x8, 0x6, 0x6, 0xfffffffffffffffd, 0x8, 0x80000001, 0x1ff, 0x1000, 0x4dfc, 0x80, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000500), 0x4}, 0x10020, 0x3f, 0x3, 0x4, 0x8000, 0x7fffffff, 0x5}, r6, 0x6, r1, 0x8) 22:58:57 executing program 2: r0 = socket$kcm(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x890b, &(0x7f0000000000)) 22:58:57 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000280)='./file0\x00', 0x80000001, 0x1, &(0x7f00000002c0)=[{&(0x7f00000000c0)="800000000002000019000000e60100006c000000000000000200000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1014001, &(0x7f00000003c0)={[{@journal_checksum='journal_checksum'}]}) [ 1362.442031] netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. [ 1362.457034] EXT4-fs (loop1): fragment/cluster size (2048) != block size (4096) 22:58:57 executing program 5: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) r1 = socket$kcm(0x2, 0x5, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x890b, &(0x7f0000000000)) 22:58:57 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000080)=0x293ee260) sendfile(r0, r0, &(0x7f0000000040), 0x2) 22:58:57 executing program 2: r0 = socket$kcm(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x890b, &(0x7f0000000000)) 22:58:57 executing program 4: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r6 = gettid() sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x139f605562ecba0b, 0x70, 0x9, 0x6, 0x7fff, 0x4, 0x0, 0x5, 0x400, 0x2, 0x0, 0x4, 0x7, 0x9, 0x1, 0x5, 0x80, 0x5, 0x9, 0x4, 0x9, 0xb61c, 0x7f, 0xffff, 0x7fff, 0xfff, 0x6, 0xfffffffffffffffb, 0x8, 0x6, 0x6, 0xfffffffffffffffd, 0x8, 0x80000001, 0x1ff, 0x1000, 0x4dfc, 0x80, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000500), 0x4}, 0x10020, 0x3f, 0x3, 0x4, 0x8000, 0x7fffffff, 0x5}, r6, 0x6, r1, 0x8) [ 1362.551874] EXT4-fs (loop1): fragment/cluster size (2048) != block size (4096) 22:58:57 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000280)='./file0\x00', 0x80000001, 0x1, &(0x7f00000002c0)=[{&(0x7f00000000c0)="800000000002000019000000e60100006c7a0000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1014001, &(0x7f00000003c0)={[{@journal_checksum='journal_checksum'}]}) [ 1362.779239] device nr0 entered promiscuous mode 22:58:57 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x80800, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000140)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x2) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0105512, &(0x7f0000000000)={0xffff, 0x5517, 0xfffffffffffffffe, 0x0, 0x9}) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r0) ioctl$FIGETBSZ(r1, 0x2, &(0x7f0000000040)) [ 1362.821446] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1362.844463] netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. [ 1362.879466] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 1362.937955] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1362.972011] EXT4-fs (loop1): can't mount with journal_checksum, fs mounted w/o journal [ 1363.039200] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1363.060787] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 1363.083929] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1363.104263] EXT4-fs (loop1): can't mount with journal_checksum, fs mounted w/o journal 22:58:58 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x40, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7ff, 0x2, 0x0, 0x10000, 0x0, 0xc776, 0x9, 0x1, 0x3, 0xa76, 0x3, 0x3, 0x401, 0x7, 0x200, 0x384, 0x0, 0x200, 0x7f, 0x2, 0x9, 0x7f, 0x4, 0x7ff, 0x2, 0x99a, 0xd, 0x0, 0x0, 0x85e, 0x0, @perf_config_ext={0x0, 0xb6}, 0x10000, 0x79, 0xa2, 0x4, 0x100000000, 0x9, 0xdfa8}, 0x0, 0x10, r0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000240)=""/80) ioctl$TUNSETLINK(r0, 0x400454cd, 0x200) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="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") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) openat$cgroup_int(r2, &(0x7f0000000040)='io.weight\x00', 0x2, 0x0) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r3, &(0x7f0000000000), 0x17b) 22:58:58 executing program 2: r0 = socket$kcm(0x2, 0x5, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x0, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x890b, &(0x7f0000000000)) 22:58:58 executing program 5: openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) r0 = socket$kcm(0x2, 0x5, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x890b, &(0x7f0000000000)) 22:58:58 executing program 4: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r6 = gettid() sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x139f605562ecba0b, 0x70, 0x9, 0x6, 0x7fff, 0x4, 0x0, 0x5, 0x400, 0x2, 0x0, 0x4, 0x7, 0x9, 0x1, 0x5, 0x80, 0x5, 0x9, 0x4, 0x9, 0xb61c, 0x7f, 0xffff, 0x7fff, 0xfff, 0x6, 0xfffffffffffffffb, 0x8, 0x6, 0x6, 0xfffffffffffffffd, 0x8, 0x80000001, 0x1ff, 0x1000, 0x4dfc, 0x80, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000500), 0x4}, 0x10020, 0x3f, 0x3, 0x4, 0x8000, 0x7fffffff, 0x5}, r6, 0x6, r1, 0x8) 22:58:58 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) 22:58:58 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000280)='./file0\x00', 0x80000001, 0x1, &(0x7f00000002c0)=[{&(0x7f00000000c0)="800000000002000019000000e60100006c090000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1014001, &(0x7f00000003c0)={[{@journal_checksum='journal_checksum'}]}) [ 1363.456753] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 22:58:58 executing program 5: r0 = socket$kcm(0x2, 0x5, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x890b, &(0x7f0000000000)) 22:58:58 executing program 2: r0 = socket$kcm(0x2, 0x5, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x0, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x890b, &(0x7f0000000000)) 22:58:58 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0xffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) [ 1363.505958] netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. [ 1363.511618] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 22:58:58 executing program 4: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r6 = gettid() sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x139f605562ecba0b, 0x70, 0x9, 0x6, 0x7fff, 0x4, 0x0, 0x5, 0x400, 0x2, 0x0, 0x4, 0x7, 0x9, 0x1, 0x5, 0x80, 0x5, 0x9, 0x4, 0x9, 0xb61c, 0x7f, 0xffff, 0x7fff, 0xfff, 0x6, 0xfffffffffffffffb, 0x8, 0x6, 0x6, 0xfffffffffffffffd, 0x8, 0x80000001, 0x1ff, 0x1000, 0x4dfc, 0x80, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000500), 0x4}, 0x10020, 0x3f, 0x3, 0x4, 0x8000, 0x7fffffff, 0x5}, r6, 0x6, r1, 0x8) [ 1363.572347] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1363.607876] EXT4-fs (loop1): can't mount with journal_checksum, fs mounted w/o journal [ 1363.685023] device nr0 entered promiscuous mode 22:58:58 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000040)) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) 22:58:58 executing program 2: r0 = socket$kcm(0x2, 0x5, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x0, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x890b, &(0x7f0000000000)) [ 1363.721084] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1363.756246] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 1363.791699] netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. [ 1363.795670] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1363.834871] EXT4-fs (loop1): can't mount with journal_checksum, fs mounted w/o journal 22:58:59 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x40, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x2, 0x0, 0x10000, 0x0, 0xc776, 0x9, 0x1, 0x3, 0xa76, 0x3, 0x3, 0x401, 0x7, 0x200, 0x384, 0x0, 0x200, 0x7f, 0x2, 0x9, 0x7f, 0x4, 0x7ff, 0x2, 0x99a, 0xd, 0x0, 0x0, 0x85e, 0x0, @perf_config_ext={0x0, 0xb6}, 0x10000, 0x79, 0xa2, 0x4, 0x100000000, 0x9, 0xdfa8}, 0x0, 0x10, r0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000240)=""/80) ioctl$TUNSETLINK(r0, 0x400454cd, 0x200) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="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") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) openat$cgroup_int(r2, &(0x7f0000000040)='io.weight\x00', 0x2, 0x0) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r3, &(0x7f0000000000), 0x17b) 22:58:59 executing program 5: r0 = socket$kcm(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x890b, &(0x7f0000000000)) 22:58:59 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x80000000044, 0xffffffffffffffff) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x1c00000, 0x5517}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) 22:58:59 executing program 4: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r6 = gettid() sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x139f605562ecba0b, 0x70, 0x9, 0x6, 0x7fff, 0x4, 0x0, 0x5, 0x400, 0x2, 0x0, 0x4, 0x7, 0x9, 0x1, 0x5, 0x80, 0x5, 0x9, 0x4, 0x9, 0xb61c, 0x7f, 0xffff, 0x7fff, 0xfff, 0x6, 0xfffffffffffffffb, 0x8, 0x6, 0x6, 0xfffffffffffffffd, 0x8, 0x80000001, 0x1ff, 0x1000, 0x4dfc, 0x80, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000500), 0x4}, 0x10020, 0x3f, 0x3, 0x4, 0x8000, 0x7fffffff, 0x5}, r6, 0x6, r1, 0x8) 22:58:59 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000280)='./file0\x00', 0x80000001, 0x1, &(0x7f00000002c0)=[{&(0x7f00000000c0)="800000000002000019000000e60100006c000000040000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1014001, &(0x7f00000003c0)={[{@journal_checksum='journal_checksum'}]}) 22:58:59 executing program 2: r0 = socket$kcm(0x2, 0x5, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x890b, &(0x7f0000000000)) [ 1364.520855] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1364.560187] netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. 22:58:59 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000009, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) openat$cgroup_ro(r0, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) 22:58:59 executing program 2: r0 = socket$kcm(0x2, 0x5, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x890b, &(0x7f0000000000)) [ 1364.568035] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1364.601085] EXT4-fs (loop1): group descriptors corrupted! 22:58:59 executing program 5: r0 = socket$kcm(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x890b, &(0x7f0000000000)) 22:58:59 executing program 4: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r6 = gettid() sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x139f605562ecba0b, 0x70, 0x9, 0x6, 0x7fff, 0x4, 0x0, 0x5, 0x400, 0x2, 0x0, 0x4, 0x7, 0x9, 0x1, 0x5, 0x80, 0x5, 0x9, 0x4, 0x9, 0xb61c, 0x7f, 0xffff, 0x7fff, 0xfff, 0x6, 0xfffffffffffffffb, 0x8, 0x6, 0x6, 0xfffffffffffffffd, 0x8, 0x80000001, 0x1ff, 0x1000, 0x4dfc, 0x80, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000500), 0x4}, 0x10020, 0x3f, 0x3, 0x4, 0x8000, 0x7fffffff, 0x5}, r6, 0x6, r1, 0x8) [ 1364.688602] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1364.728163] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! 22:58:59 executing program 3: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x8fe, 0x2000) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0xc04, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)) [ 1364.787638] EXT4-fs (loop1): group descriptors corrupted! [ 1364.822252] device nr0 entered promiscuous mode 22:58:59 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000280)='./file0\x00', 0x80000001, 0x1, &(0x7f00000002c0)=[{&(0x7f00000000c0)="800000000002000019000000e60100006c000000000000000400000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1014001, &(0x7f00000003c0)={[{@journal_checksum='journal_checksum'}]}) [ 1364.872396] netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. [ 1365.028010] EXT4-fs (loop1): bad block size 16384 [ 1365.079645] EXT4-fs (loop1): bad block size 16384 22:59:00 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x40, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x10000, 0x0, 0xc776, 0x9, 0x1, 0x3, 0xa76, 0x3, 0x3, 0x401, 0x7, 0x200, 0x384, 0x0, 0x200, 0x7f, 0x2, 0x9, 0x7f, 0x4, 0x7ff, 0x2, 0x99a, 0xd, 0x0, 0x0, 0x85e, 0x0, @perf_config_ext={0x0, 0xb6}, 0x10000, 0x79, 0xa2, 0x4, 0x100000000, 0x9, 0xdfa8}, 0x0, 0x10, r0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000240)=""/80) ioctl$TUNSETLINK(r0, 0x400454cd, 0x200) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3dad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88bc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e57e43a3e36bd48d2a85bf4fd4a804e83f2f3cf378a435af5e287d4e27337b4ada11b26219832ec6b2b38446b3b95fe3771e9f42ca30fb21e12f0a3d8bc2d85454af9fcc0232d8fd909448b01f46c593d31ea1c926465e35a4199079c3ca41128b17cb01fbf5b522be0fd02022ada37fecc14b6c8c8831883b85a1106f2f867020d529f17a350f20dd3bf51a98cfda70c2e3638a483fd3f87940bb478b07c4c110394c0093d17955089f2ca97bbe075124c9b1ff6500d536a95d96f03d48596e008bf0a028b539cec796cec9bf585eb80fe3e0d26") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) openat$cgroup_int(r2, &(0x7f0000000040)='io.weight\x00', 0x2, 0x0) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r3, &(0x7f0000000000), 0x17b) 22:59:00 executing program 2: r0 = socket$kcm(0x2, 0x5, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x890b, &(0x7f0000000000)) 22:59:00 executing program 5: r0 = socket$kcm(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x890b, &(0x7f0000000000)) 22:59:00 executing program 4: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r6 = gettid() sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x139f605562ecba0b, 0x70, 0x9, 0x6, 0x7fff, 0x4, 0x0, 0x5, 0x400, 0x2, 0x0, 0x4, 0x7, 0x9, 0x1, 0x5, 0x80, 0x5, 0x9, 0x4, 0x9, 0xb61c, 0x7f, 0xffff, 0x7fff, 0xfff, 0x6, 0xfffffffffffffffb, 0x8, 0x6, 0x6, 0xfffffffffffffffd, 0x8, 0x80000001, 0x1ff, 0x1000, 0x4dfc, 0x80, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000500), 0x4}, 0x10020, 0x3f, 0x3, 0x4, 0x8000, 0x7fffffff, 0x5}, r6, 0x6, r1, 0x8) 22:59:00 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)=0x0) r2 = gettid() kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000080)={r0, r0, 0x40}) 22:59:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000280)='./file0\x00', 0x80000001, 0x1, &(0x7f00000002c0)=[{&(0x7f00000000c0)="800000000002000019000000e60100006c000000000000038a00000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1014001, &(0x7f00000003c0)={[{@journal_checksum='journal_checksum'}]}) 22:59:00 executing program 2: r0 = socket$kcm(0x2, 0x5, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x890b, &(0x7f0000000000)) [ 1365.637081] EXT4-fs (loop1): Unsupported filesystem blocksize 1048576 (138 log_block_size) 22:59:00 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000040)=@sack_info={0x0, 0x7, 0x3ea}, &(0x7f0000000080)=0xc) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000000c0)={r1, 0x10000}, 0x8) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) [ 1365.687102] netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. [ 1365.737381] EXT4-fs (loop1): Unsupported filesystem blocksize 1048576 (138 log_block_size) 22:59:00 executing program 4: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r6 = gettid() sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x139f605562ecba0b, 0x70, 0x9, 0x6, 0x7fff, 0x4, 0x0, 0x5, 0x400, 0x2, 0x0, 0x4, 0x7, 0x9, 0x1, 0x5, 0x80, 0x5, 0x9, 0x4, 0x9, 0xb61c, 0x7f, 0xffff, 0x7fff, 0xfff, 0x6, 0xfffffffffffffffb, 0x8, 0x6, 0x6, 0xfffffffffffffffd, 0x8, 0x80000001, 0x1ff, 0x1000, 0x4dfc, 0x80, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000500), 0x4}, 0x10020, 0x3f, 0x3, 0x4, 0x8000, 0x7fffffff, 0x5}, r6, 0x6, r1, 0x8) 22:59:00 executing program 5: r0 = socket$kcm(0x2, 0x5, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x0, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x890b, &(0x7f0000000000)) 22:59:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000280)='./file0\x00', 0x80000001, 0x1, &(0x7f00000002c0)=[{&(0x7f00000000c0)="800000000002000019000000e60100006c000000680000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1014001, &(0x7f00000003c0)={[{@journal_checksum='journal_checksum'}]}) 22:59:00 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517}) ioctl$KVM_GET_MSRS(r0, 0xc008ae88, &(0x7f0000000040)={0xa, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) [ 1365.918354] device nr0 entered promiscuous mode [ 1365.986005] netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. [ 1366.027148] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1366.077705] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1366.087139] EXT4-fs (loop1): group descriptors corrupted! [ 1366.144222] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1366.177726] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1366.198048] EXT4-fs (loop1): group descriptors corrupted! 22:59:01 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x40, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7ff, 0x0, 0x0, 0x10000, 0x0, 0xc776, 0x9, 0x1, 0x3, 0xa76, 0x3, 0x3, 0x401, 0x7, 0x200, 0x384, 0x0, 0x200, 0x7f, 0x2, 0x9, 0x7f, 0x4, 0x7ff, 0x2, 0x99a, 0xd, 0x0, 0x0, 0x85e, 0x0, @perf_config_ext={0x0, 0xb6}, 0x10000, 0x79, 0xa2, 0x4, 0x100000000, 0x9, 0xdfa8}, 0x0, 0x10, r0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000240)=""/80) ioctl$TUNSETLINK(r0, 0x400454cd, 0x200) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="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") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) openat$cgroup_int(r2, &(0x7f0000000040)='io.weight\x00', 0x2, 0x0) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r3, &(0x7f0000000000), 0x17b) 22:59:01 executing program 5: r0 = socket$kcm(0x2, 0x5, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x0, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x890b, &(0x7f0000000000)) 22:59:01 executing program 2: socket$kcm(0x2, 0x5, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) 22:59:01 executing program 4: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r6 = gettid() sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x139f605562ecba0b, 0x70, 0x9, 0x6, 0x7fff, 0x4, 0x0, 0x5, 0x400, 0x2, 0x0, 0x4, 0x7, 0x9, 0x1, 0x5, 0x80, 0x5, 0x9, 0x4, 0x9, 0xb61c, 0x7f, 0xffff, 0x7fff, 0xfff, 0x6, 0xfffffffffffffffb, 0x8, 0x6, 0x6, 0xfffffffffffffffd, 0x8, 0x80000001, 0x1ff, 0x1000, 0x4dfc, 0x80, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000500), 0x4}, 0x10020, 0x3f, 0x3, 0x4, 0x8000, 0x7fffffff, 0x5}, r6, 0x6, r1, 0x8) 22:59:01 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x2, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r0, 0x111, 0x1, 0x97, 0x4) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) 22:59:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000280)='./file0\x00', 0x80000001, 0x1, &(0x7f00000002c0)=[{&(0x7f00000000c0)="800000000002000019000000e60100006c000010200000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1014001, &(0x7f00000003c0)={[{@journal_checksum='journal_checksum'}]}) [ 1366.668945] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1366.691991] netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. 22:59:01 executing program 2: socket$kcm(0x2, 0x5, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) [ 1366.715431] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! 22:59:01 executing program 5: r0 = socket$kcm(0x2, 0x5, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x0, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x890b, &(0x7f0000000000)) 22:59:01 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000040)=[@in6={0xa, 0x4e20, 0x7ff, @loopback, 0x3}, @in={0x2, 0x4e23, @rand_addr=0x8}, @in6={0xa, 0x4e23, 0x6, @empty, 0xc0}], 0x48) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) [ 1366.766635] EXT4-fs (loop1): group descriptors corrupted! 22:59:01 executing program 4: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r6 = gettid() sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x139f605562ecba0b, 0x70, 0x9, 0x6, 0x7fff, 0x4, 0x0, 0x5, 0x400, 0x2, 0x0, 0x4, 0x7, 0x9, 0x1, 0x5, 0x80, 0x5, 0x9, 0x4, 0x9, 0xb61c, 0x7f, 0xffff, 0x7fff, 0xfff, 0x6, 0xfffffffffffffffb, 0x8, 0x6, 0x6, 0xfffffffffffffffd, 0x8, 0x80000001, 0x1ff, 0x1000, 0x4dfc, 0x80, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000500), 0x4}, 0x10020, 0x3f, 0x3, 0x4, 0x8000, 0x7fffffff, 0x5}, r6, 0x6, r1, 0x8) 22:59:01 executing program 2: socket$kcm(0x2, 0x5, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) [ 1366.908951] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 22:59:02 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517}) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000040)) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) [ 1366.951697] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1366.967631] device nr0 entered promiscuous mode [ 1366.983325] EXT4-fs (loop1): group descriptors corrupted! [ 1367.034751] netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. 22:59:02 executing program 5: r0 = socket$kcm(0x2, 0x5, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x890b, &(0x7f0000000000)) 22:59:02 executing program 2: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r6 = gettid() sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x139f605562ecba0b, 0x70, 0x9, 0x6, 0x7fff, 0x4, 0x0, 0x5, 0x400, 0x2, 0x0, 0x4, 0x7, 0x9, 0x1, 0x5, 0x80, 0x5, 0x9, 0x4, 0x9, 0xb61c, 0x7f, 0xffff, 0x7fff, 0xfff, 0x6, 0xfffffffffffffffb, 0x8, 0x6, 0x6, 0xfffffffffffffffd, 0x8, 0x80000001, 0x1ff, 0x1000, 0x4dfc, 0x80, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000500), 0x4}, 0x10020, 0x3f, 0x3, 0x4, 0x8000, 0x7fffffff, 0x5}, r6, 0x6, r1, 0x8) 22:59:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000280)='./file0\x00', 0x80000001, 0x1, &(0x7f00000002c0)=[{&(0x7f00000000c0)="800000000002000019000000e60100006c000000400000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1014001, &(0x7f00000003c0)={[{@journal_checksum='journal_checksum'}]}) 22:59:02 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x40, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7ff, 0x2, 0x0, 0x0, 0x0, 0xc776, 0x9, 0x1, 0x3, 0xa76, 0x3, 0x3, 0x401, 0x7, 0x200, 0x384, 0x0, 0x200, 0x7f, 0x2, 0x9, 0x7f, 0x4, 0x7ff, 0x2, 0x99a, 0xd, 0x0, 0x0, 0x85e, 0x0, @perf_config_ext={0x0, 0xb6}, 0x10000, 0x79, 0xa2, 0x4, 0x100000000, 0x9, 0xdfa8}, 0x0, 0x10, r0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000240)=""/80) ioctl$TUNSETLINK(r0, 0x400454cd, 0x200) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="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") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) openat$cgroup_int(r2, &(0x7f0000000040)='io.weight\x00', 0x2, 0x0) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r3, &(0x7f0000000000), 0x17b) 22:59:02 executing program 4: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r6 = gettid() sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x139f605562ecba0b, 0x70, 0x9, 0x6, 0x7fff, 0x4, 0x0, 0x5, 0x400, 0x2, 0x0, 0x4, 0x7, 0x9, 0x1, 0x5, 0x80, 0x5, 0x9, 0x4, 0x9, 0xb61c, 0x7f, 0xffff, 0x7fff, 0xfff, 0x6, 0xfffffffffffffffb, 0x8, 0x6, 0x6, 0xfffffffffffffffd, 0x8, 0x80000001, 0x1ff, 0x1000, 0x4dfc, 0x80, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000500), 0x4}, 0x10020, 0x3f, 0x3, 0x4, 0x8000, 0x7fffffff, 0x5}, r6, 0x6, r1, 0x8) 22:59:02 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000280)='/dev/bus/usb/00#/00#\x00', 0x80000000003, 0x80000080802) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(r0, 0xc0845658, &(0x7f0000000040)={0x0, @reserved}) fgetxattr(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='securkty./dev/b\x00\x00\x00@sb/00#/00#\x00'], &(0x7f0000000200)=""/88, 0x58) getdents(r0, &(0x7f00000002c0)=""/33, 0x21) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000300)={0x0, 0xb8, "e8b21a9e38b15dc9ed45511904f70fc1fb666781b1f036fe0878e54c1e54218d80839ffb878b4836901a10c6b6c9170fca4b48c6c22d46735f634b64ff373667aa1aeade3aeef4852c9cf0723fa56e8905e1a0cba3e723fa2349ac577c17e9aed4ea582e8f0972219b460bfef599c5060b7c052150ee806ced7254b1a27de6880eb87e948de5580e67e9a0a7b11e7b6a23535bbedc722b589d565bf3321e89ef0c1bdb3739db1bc5ecebe552af84a0ea91d4a64e6edaad10"}, &(0x7f0000000100)=0xc0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f00000003c0)=r1, 0x4) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517, 0x0, 0x0, 0x8000}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) ioctl$PPPIOCGL2TPSTATS(r0, 0x80487436, &(0x7f0000000180)="8253b3ffc8505f2f927f41717da363f5ada0139d70fa4d88297de58cc1a0a3a58e6a6cc5b4") 22:59:02 executing program 5: r0 = socket$kcm(0x2, 0x5, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x890b, &(0x7f0000000000)) [ 1367.761834] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1367.787009] netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. [ 1367.801529] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! 22:59:02 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x0, 0x42081) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, &(0x7f0000000080)={0x1, 0x0, 0x1, 0x4, {0x3, 0xfffffffffffffffa, 0x6, 0xffffffff}}) r1 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517}) ioctl$FIGETBSZ(r1, 0x2, &(0x7f0000000000)) 22:59:02 executing program 4: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r6 = gettid() sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x139f605562ecba0b, 0x70, 0x9, 0x6, 0x7fff, 0x4, 0x0, 0x5, 0x400, 0x2, 0x0, 0x4, 0x7, 0x9, 0x1, 0x5, 0x80, 0x5, 0x9, 0x4, 0x9, 0xb61c, 0x7f, 0xffff, 0x7fff, 0xfff, 0x6, 0xfffffffffffffffb, 0x8, 0x6, 0x6, 0xfffffffffffffffd, 0x8, 0x80000001, 0x1ff, 0x1000, 0x4dfc, 0x80, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000500), 0x4}, 0x10020, 0x3f, 0x3, 0x4, 0x8000, 0x7fffffff, 0x5}, r6, 0x6, r1, 0x8) [ 1367.819474] netlink: 3 bytes leftover after parsing attributes in process `syz-executor2'. [ 1367.845047] EXT4-fs (loop1): group descriptors corrupted! [ 1367.944112] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1367.966869] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! 22:59:03 executing program 2: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r6 = gettid() sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x139f605562ecba0b, 0x70, 0x9, 0x6, 0x7fff, 0x4, 0x0, 0x5, 0x400, 0x2, 0x0, 0x4, 0x7, 0x9, 0x1, 0x5, 0x80, 0x5, 0x9, 0x4, 0x9, 0xb61c, 0x7f, 0xffff, 0x7fff, 0xfff, 0x6, 0xfffffffffffffffb, 0x8, 0x6, 0x6, 0xfffffffffffffffd, 0x8, 0x80000001, 0x1ff, 0x1000, 0x4dfc, 0x80, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000500), 0x4}, 0x10020, 0x3f, 0x3, 0x4, 0x8000, 0x7fffffff, 0x5}, r6, 0x6, r1, 0x8) [ 1367.993579] EXT4-fs (loop1): group descriptors corrupted! 22:59:03 executing program 5: r0 = socket$kcm(0x2, 0x5, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x890b, &(0x7f0000000000)) 22:59:03 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x2000080000000005, 0x80) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, &(0x7f0000000080)={'HL\x00'}, &(0x7f00000000c0)=0x1e) [ 1368.114855] device nr0 entered promiscuous mode 22:59:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000280)='./file0\x00', 0x80000001, 0x1, &(0x7f00000002c0)=[{&(0x7f00000000c0)="800000000002000019000000e60100006c000500000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1014001, &(0x7f00000003c0)={[{@journal_checksum='journal_checksum'}]}) [ 1368.169247] netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. 22:59:03 executing program 5: r0 = socket$kcm(0x2, 0x5, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x890b, &(0x7f0000000000)) 22:59:03 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517}) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={0x0, 0x6}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000001480)={0x0, 0x56e, 0x4, 0x7fff, 0x4f39, 0x0, 0x6, 0x8, {0x0, @in6={{0xa, 0x4e21, 0x3ff, @loopback, 0x800000000000000}}, 0x10001, 0xffffffffffffff26, 0xfffffffffffffffc, 0x80000001, 0xff}}, &(0x7f0000001540)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000001580)={0x0, 0x1c, "f6820305ffdb9ba3497d25ca1b5fee9ef180c065bd9981abbfc791f3"}, &(0x7f00000015c0)=0x24) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000001b00)={0x0, 0xcc, &(0x7f0000001a00)=[@in6={0xa, 0x4e21, 0xd2c0, @loopback, 0x8}, @in={0x2, 0x4e23, @multicast2}, @in6={0xa, 0x4e23, 0x6, @remote, 0x1}, @in={0x2, 0x4e22, @broadcast}, @in={0x2, 0x4e21, @loopback}, @in6={0xa, 0x4e22, 0x401, @remote, 0xff}, @in6={0xa, 0x4e23, 0x3a, @local}, @in6={0xa, 0x4e24, 0x9, @mcast2, 0x3}, @in={0x2, 0x4e21, @rand_addr=0x7}]}, &(0x7f0000001b40)=0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000001e40)={0x0, 0x88, &(0x7f0000001d80)=[@in6={0xa, 0x4e23, 0x5, @empty, 0x7ff}, @in={0x2, 0x4e20, @remote}, @in6={0xa, 0x4e24, 0x6, @remote, 0x8}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1e}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x5, @remote}, @in={0x2, 0x4e22, @multicast1}]}, &(0x7f0000001e80)=0x10) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000001ec0)={0x0, 0x4, 0x0, 0x5, 0x8ef5}, &(0x7f0000001f00)=0x18) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000001f40)={0x0, 0x8000}, &(0x7f0000001f80)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000001fc0)={0x0, 0x7}, &(0x7f0000002000)=0x8) sendmmsg$inet_sctp(r0, &(0x7f0000002180)=[{&(0x7f0000000080)=@in={0x2, 0x4e23}, 0x10, &(0x7f00000000c0)=[{&(0x7f0000000200)="3200b249d86c42483a655c5eb240a970e22670d11a01b61910b4beba3aee18633b13b8fc2143894318a323a65faa375c16b24b935ac28d3124daac9ab7aa8c759eef084f846d1d184907795a03627f759edeea878235b64c1d70de28c505bb78fa959cfb899a14fefb09bff0e5c481970b5a6a8f67740f815fb6646da6648666b0fe32446db8ed939dbd6c2da08410d34540033ebbdd632fdc45bf96209b7096e1a72b3378cb0f9cede1732b57f6b77956c5bcc87ce780ef5889a8c94f770081c54d7e33dd2f621989e0d90073b73c99db28e263f2e1b1e7ffedcba1e1c4d883b442757bc149198aeecfe1", 0xeb}], 0x1, &(0x7f0000000300)=[@sndinfo={0x20, 0x84, 0x2, {0x5, 0x8, 0x7, 0x1ff, r1}}, @dstaddrv4={0x18}, @dstaddrv6={0x20, 0x84, 0x8, @remote}, @dstaddrv6={0x20}, @dstaddrv6={0x20, 0x84, 0x8, @ipv4}, @prinfo={0x18, 0x84, 0x5, {0x30}}, @dstaddrv6={0x20}], 0xd0, 0x4000000}, {&(0x7f0000000400)=@in={0x2, 0x4e21, @local}, 0x10, &(0x7f0000001440)=[{&(0x7f0000000440)="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", 0x1000}], 0x1, &(0x7f0000001600)=[@authinfo={0x18, 0x84, 0x6, {0x90fa}}, @dstaddrv6={0x20, 0x84, 0x8, @mcast1}, @dstaddrv6={0x20, 0x84, 0x8, @mcast2}, @sndinfo={0x20, 0x84, 0x2, {0x7, 0x8, 0x9, 0x7fffffff, r2}}, @dstaddrv6={0x20, 0x84, 0x8, @mcast2}, @sndrcv={0x30, 0x84, 0x1, {0x100, 0x3f, 0x209, 0x5, 0x1, 0x3, 0xef79, 0xfffffffffffffff7, r3}}, @authinfo={0x18, 0x84, 0x6, {0x7ff}}, @dstaddrv4={0x18, 0x84, 0x7, @local}], 0xf8, 0x8000}, {&(0x7f0000001700)=@in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10, &(0x7f0000001980)=[{&(0x7f0000001740)="ef7a7fda662fca19ae6600254434ac9b4fda5a18fc4a58c31da731840c746dbdfbdfd4f35fef28f79946e835bc3f44", 0x2f}, {&(0x7f0000001780)="a50cdd6ab40ee79eaae4455499ae550c99774a5de44c7b2102cda8f6a7095e16", 0x20}, {&(0x7f00000017c0)="26d13f0a83da2ca2e90b7f39f0cce2d60f9da3e281d1a4d01349884b9423210af17b", 0x22}, {&(0x7f0000001800)="677e931e3b3f994699df69e4bd00c0f78078c7889ed4f068306a161ac3502c5a28a43a401e2fc570fd050aef0306eb3f5bd0a65c8ec745383799e1a027", 0x3d}, {&(0x7f0000001840)="8c1ea3a9b4df83b86bf1eba7230d9fe3863181ee85cbc42f1c94b510c65eb0f68a5b22d59fe9ba94aaed43bd63284ed33f014e44726ccd9a8293f33a41505e7865bdc6812d8903d0c1b0857582da606784535f2a0609fd52cd4c4856075dcf649af8c6af44ce75de48329dde195917d087cdd15796e1e342193fc4ae1b2b57f91b6af6223bdcdbe1ee375e9674e4935e881c235c094c947da2c46ef9bbe54889112bd33f02dccad7e0f4cdd596a1beed83f831b88bc40e78e9530624fd", 0xbd}, {&(0x7f0000001900)="9217c5fed1a7935b70b6a33f7c8d3eec8451169ecdfe62b2b9729ef0ad97bacde6eaa75f08fe661ba0ac4d6dcb98de66ba69692e044d7e446c42cb04b201d140f3232bfd0c43355b233019", 0x4b}], 0x6, &(0x7f0000001b80)=[@init={0x18, 0x84, 0x0, {0x9dbb, 0x7ff, 0x400}}, @sndinfo={0x20, 0x84, 0x2, {0xfffffffffffffff7, 0x200, 0xe5e, 0x4, r4}}, @authinfo={0x18, 0x84, 0x6, {0x800}}, @authinfo={0x18, 0x84, 0x6, {0x4}}, @dstaddrv6={0x20}], 0x88, 0x20048000}, {&(0x7f0000001c40)=@in={0x2, 0x4e21}, 0x10, &(0x7f0000001d40)=[{&(0x7f0000001c80)="d61bb9925c5275ad3e3e4b26435168a89582a3e4c337758658d8597d2d2294039a82ed1aa4da9e4e1aeae9c63610c85d55cc19f6ddc3d66112c0f84dde8d4f4879082980facfa899e3dcd741d9cf3634783ebfd43b44862ffb6403963eb59c4d69aa1df33238c59ea84a87e59089e7ebf7fe5169b4e86647e5b8299707b9ae4a4f7b0df6a2cf864d5b5939c8dfa01771ecb5290d4d0baee6fd859df6675b7412fb00d723381aca9f2fd604b1", 0xac}], 0x1, &(0x7f0000002040)=[@authinfo={0x18, 0x84, 0x6, {0x7}}, @sndrcv={0x30, 0x84, 0x1, {0x9, 0x3, 0x207, 0x800, 0x800, 0x100000001, 0x4, 0x9, r5}}, @sndrcv={0x30, 0x84, 0x1, {0xa161, 0x3f, 0x3, 0x80, 0x5, 0x8, 0x5, 0x6, r6}}, @dstaddrv4={0x18}, @dstaddrv6={0x20, 0x84, 0x8, @dev={0xfe, 0x80, [], 0xd}}, @sndrcv={0x30, 0x84, 0x1, {0x7fff, 0xc6bd, 0x0, 0x6, 0x7, 0x6, 0x6, 0x6, r7}}, @init={0x18, 0x84, 0x0, {0xbaf5, 0x20, 0x773, 0x68ab}}, @sndinfo={0x20, 0x84, 0x2, {0x0, 0x8000, 0x6, 0x0, r8}}], 0x118, 0x4}], 0x4, 0x8000) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) bind$bt_l2cap(r0, &(0x7f0000000040)={0x1f, 0x9f, {0x4, 0x100, 0x6, 0x40000, 0x7, 0x706}, 0x94, 0x5}, 0xe) [ 1368.289161] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1368.343261] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 1368.357688] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1368.400097] EXT4-fs (loop1): can't mount with journal_checksum, fs mounted w/o journal [ 1368.500626] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1368.527748] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 1368.542329] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1368.562256] EXT4-fs (loop1): can't mount with journal_checksum, fs mounted w/o journal [ 1368.851390] netlink: 3 bytes leftover after parsing attributes in process `syz-executor2'. 22:59:03 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x40, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7ff, 0x2, 0x0, 0x10000, 0x0, 0x0, 0x9, 0x1, 0x3, 0xa76, 0x3, 0x3, 0x401, 0x7, 0x200, 0x384, 0x0, 0x200, 0x7f, 0x2, 0x9, 0x7f, 0x4, 0x7ff, 0x2, 0x99a, 0xd, 0x0, 0x0, 0x85e, 0x0, @perf_config_ext={0x0, 0xb6}, 0x10000, 0x79, 0xa2, 0x4, 0x100000000, 0x9, 0xdfa8}, 0x0, 0x10, r0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000240)=""/80) ioctl$TUNSETLINK(r0, 0x400454cd, 0x200) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="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") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) openat$cgroup_int(r2, &(0x7f0000000040)='io.weight\x00', 0x2, 0x0) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r3, &(0x7f0000000000), 0x17b) 22:59:03 executing program 4: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r6 = gettid() sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x139f605562ecba0b, 0x70, 0x9, 0x6, 0x7fff, 0x4, 0x0, 0x5, 0x400, 0x2, 0x0, 0x4, 0x7, 0x9, 0x1, 0x5, 0x80, 0x5, 0x9, 0x4, 0x9, 0xb61c, 0x7f, 0xffff, 0x7fff, 0xfff, 0x6, 0xfffffffffffffffb, 0x8, 0x6, 0x6, 0xfffffffffffffffd, 0x8, 0x80000001, 0x1ff, 0x1000, 0x4dfc, 0x80, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000500), 0x4}, 0x10020, 0x3f, 0x3, 0x4, 0x8000, 0x7fffffff, 0x5}, r6, 0x6, r1, 0x8) 22:59:03 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f0000000080)={0x2, 0x6, 0x1}, 0xc) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000140)=""/95, 0x5f}, {&(0x7f0000000040)=""/52, 0x34}, {&(0x7f0000000200)=""/140, 0x8c}, {&(0x7f00000002c0)=""/135, 0x87}, {&(0x7f0000000380)=""/169, 0xa9}], 0x5, 0x0) 22:59:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000280)='./file0\x00', 0x80000001, 0x1, &(0x7f00000002c0)=[{&(0x7f00000000c0)="800000000002000019000000e60100006c006c00000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1014001, &(0x7f00000003c0)={[{@journal_checksum='journal_checksum'}]}) 22:59:03 executing program 5: socket$kcm(0x2, 0x5, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) 22:59:03 executing program 2: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r6 = gettid() sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x139f605562ecba0b, 0x70, 0x9, 0x6, 0x7fff, 0x4, 0x0, 0x5, 0x400, 0x2, 0x0, 0x4, 0x7, 0x9, 0x1, 0x5, 0x80, 0x5, 0x9, 0x4, 0x9, 0xb61c, 0x7f, 0xffff, 0x7fff, 0xfff, 0x6, 0xfffffffffffffffb, 0x8, 0x6, 0x6, 0xfffffffffffffffd, 0x8, 0x80000001, 0x1ff, 0x1000, 0x4dfc, 0x80, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000500), 0x4}, 0x10020, 0x3f, 0x3, 0x4, 0x8000, 0x7fffffff, 0x5}, r6, 0x6, r1, 0x8) 22:59:04 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517}) ioctl$VIDIOC_G_SLICED_VBI_CAP(r0, 0xc0745645, &(0x7f0000001700)={0x7f, [0x0, 0x7fff, 0x1, 0x3, 0x0, 0x7fffffff, 0x3b3, 0xfffffffffffffffb, 0x2, 0xfffffffffffffffd, 0x5, 0x5b, 0x4, 0x0, 0x7, 0x8, 0xb4, 0xfffffffffffffffb, 0x1, 0x5, 0x6, 0x0, 0x9, 0x8, 0xa8, 0x8, 0x6, 0x14000000, 0x4, 0x8, 0x6, 0x6, 0x87, 0xfffffffffffff000, 0x0, 0x0, 0x8, 0x81, 0xc8, 0x77, 0x6, 0x7fff, 0x9, 0x8, 0x2000000000, 0xdafc, 0x0, 0x5a6], 0x22a758a69d6648c}) sendmsg$inet_sctp(r0, &(0x7f00000016c0)={&(0x7f0000000040)=@in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10, &(0x7f0000001600)=[{&(0x7f0000000200)="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", 0x1000}, {&(0x7f0000000080)="a439bd9afeb5bd8d7c13981bad4b48cfb4208f498cc5b81b9714edbce977dc538e98bcb0dc2f4724b56393ab463442346d85380241492f0a8a19f6dfebed582f9ad2b1da5362268d9d8f8fad51c980463b", 0x51}, {&(0x7f0000001200)="46c128750b6a02e6d77c6b6c8740292953ad25689e3ab8bc360af5b21a5feeb3d8137a35c9515122f506a23aa1319a5312e0ccf380506ae9577611a1b365e9b0bb9d3835474f75cc3a5c3dcf1f0c63a7c6e88fbd2754e722d9a3893ea0f033cf5c8154a9ea981746f7dcfd517a43c44bb66540a54342d8593fe02fef0895973bb569667ec8d41d4b9f24424996260db1ae2a0ba7dca5bd55ef6f24a84bc847429ae5abe67c", 0xa5}, {&(0x7f0000000140)="5c0874b8997ce464596c256d3f3433189a638c", 0x13}, {&(0x7f00000012c0)="47e2cb40d5a7ecfeb03d1b3af68ca78d2f5b7240c6eda384235bd3545cc210da09e27ce91a933c8aa8ce1817f8f647c51edbabb5407b3b54b8bf3f824a67b2c901767fdb5b4c6d8960c1b54ebe67b2c2", 0x50}, {&(0x7f0000001340)="0acdb9a20a3503129f44e80feec02e47153b21a4a0af701b1919037018c3b1166b80a9624abbd8de0d9862c3d9d661fd11ce45500793eec94221b46bc815a2c91ea2c280d6c97bb002f4fd2e0578ba630d8ce66f28f25b3369d0382ee1d2b72bb02752b7c1a4ae4f338633893da4341de9daa0df98b2253639b1842808b0b740f3a43004bddcd8b47074b182639fd8b0c69d4f3f26", 0x95}, {&(0x7f0000001400)="c5e3e8eb778b75d8670299bff4bf7aaffe43c143fb705afa5903a4b5d9fce4033deca5aaf7bf90516b32aa6a986578317c49a14445812e7aa13c96db9e46869a9a047afac79499f7c7033dd2911534bd0b3710456891d5", 0x57}, {&(0x7f0000000180)="d430c3e9b89cf1d4", 0x8}, {&(0x7f0000001480)="63ff2c3c68d76005a40d0dfe1e7287410b5fba4d2565ce90c61e7aeff2d381cc9f9d5d8e39f084374bf5a55d4e8789a91b05fb45760bc2582aa7c5363d323475b42ac3249e6bd5e0b5e4b74a885d92ed6d5b64f293ad2c83bca1f81b6f7b3e572ecc6889752a2027e42866291ceb981d", 0x70}, {&(0x7f0000001500)="a5e5f1a408e39ab4f26d28652490b714e9dd5bf14981099b47db65ea11b96c547928eb7f7a8a1634f14093bde60a65c14084c5a42649c24ae00383d91e46e8f62d10ed32d63ab657ad50bd05084726c03bfe46e68d333cc5332df43a423275fab8eafa7f87e4049d74c6dfc852f630598648183c99f436f6bf42504241092f7ea3ae808e75a4723c31c3d08d29cdea41862f480863db841b29903d3fe7522e4001e355d51043c048038bc600b79c7d9f803bc8e9f1eb9a73d7b103ad8bae1b867822767b2c06640d9d54", 0xca}], 0xa, 0x0, 0x0, 0x4}, 0x10) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) sendto$llc(r0, &(0x7f0000001780)="88c310f1744933b35bff003f605f36186f6ef6d1119943ae6952e7397c2ac49c508a967ac67e8001be3310864b0a9ce3051a942e5116c43d5d9106b6361f60caf08b5611a06606a7f8e48089a6b66549b2674e040e1969ef95d41a8e349b5a18751da4682c7eebef5688a42dc6c80209f7e878461bd2bee8a64905b14ff956a1187e0f24d192713a7c560646fe8b61514deef7cd2860a34eb152dba266b6574dec908967694272948ab5a5e32f4dccebe77bbc79ae89e7892cff5c814c0eb6ad0fa76e6e45ae044802c13df80f13234402428b117255410d12eefd097d6774725d856c2bd5", 0xe5, 0x80, &(0x7f0000001880)={0x1a, 0x301, 0x9, 0x80, 0x1, 0x542, @broadcast}, 0x10) [ 1369.017775] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1369.050319] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 1369.078569] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1369.114786] EXT4-fs (loop1): can't mount with journal_checksum, fs mounted w/o journal 22:59:04 executing program 5: socket$kcm(0x2, 0x5, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) [ 1369.123868] netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. 22:59:04 executing program 4: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bde"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r6 = gettid() sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x139f605562ecba0b, 0x70, 0x9, 0x6, 0x7fff, 0x4, 0x0, 0x5, 0x400, 0x2, 0x0, 0x4, 0x7, 0x9, 0x1, 0x5, 0x80, 0x5, 0x9, 0x4, 0x9, 0xb61c, 0x7f, 0xffff, 0x7fff, 0xfff, 0x6, 0xfffffffffffffffb, 0x8, 0x6, 0x6, 0xfffffffffffffffd, 0x8, 0x80000001, 0x1ff, 0x1000, 0x4dfc, 0x80, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000500), 0x4}, 0x10020, 0x3f, 0x3, 0x4, 0x8000, 0x7fffffff, 0x5}, r6, 0x6, r1, 0x8) [ 1369.241225] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 22:59:04 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000080)=0x0) ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(r0, 0xc0845657, &(0x7f00000001c0)={0x0, @bt={0x80000000, 0x1, 0x0, 0x1, 0x100000000, 0x100000001, 0x5, 0x6, 0x6, 0xfffffffffffffe01, 0x20, 0xfffffffffffffffb, 0x7f, 0x6, 0xc, 0x5}}) r2 = syz_open_procfs(r1, &(0x7f00000000c0)='attr/current\x00') ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) ioctl$UI_SET_MSCBIT(r0, 0x40045568, 0x2c) r3 = getpgid(0xffffffffffffffff) sched_getattr(r3, &(0x7f0000000040), 0x30, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000140)={0x384, 0x5, 0x1000, {0x77359400}, 0x5, 0x7}) [ 1369.290299] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 1369.327756] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock 22:59:04 executing program 5: socket$kcm(0x2, 0x5, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) 22:59:04 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000280)='./file0\x00', 0x80000001, 0x1, &(0x7f00000002c0)=[{&(0x7f00000000c0)="800000000002000019000000e60100006c000000000000003f00000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1014001, &(0x7f00000003c0)={[{@journal_checksum='journal_checksum'}]}) [ 1369.453767] device nr0 entered promiscuous mode [ 1369.483113] netlink: 3 bytes leftover after parsing attributes in process `syz-executor2'. [ 1369.519932] netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. [ 1369.565371] EXT4-fs (loop1): Unsupported filesystem blocksize 0 (63 log_block_size) [ 1369.690270] EXT4-fs (loop1): Unsupported filesystem blocksize 0 (63 log_block_size) 22:59:05 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x40, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7ff, 0x2, 0x0, 0x10000, 0x0, 0xc776, 0x0, 0x1, 0x3, 0xa76, 0x3, 0x3, 0x401, 0x7, 0x200, 0x384, 0x0, 0x200, 0x7f, 0x2, 0x9, 0x7f, 0x4, 0x7ff, 0x2, 0x99a, 0xd, 0x0, 0x0, 0x85e, 0x0, @perf_config_ext={0x0, 0xb6}, 0x10000, 0x79, 0xa2, 0x4, 0x100000000, 0x9, 0xdfa8}, 0x0, 0x10, r0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000240)=""/80) ioctl$TUNSETLINK(r0, 0x400454cd, 0x200) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="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") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) openat$cgroup_int(r2, &(0x7f0000000040)='io.weight\x00', 0x2, 0x0) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r3, &(0x7f0000000000), 0x17b) 22:59:05 executing program 5: r0 = socket$kcm(0x2, 0x5, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x890b, &(0x7f0000000000)) 22:59:05 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) ioctl$SIOCGIFHWADDR(r0, 0x8927, &(0x7f0000000040)) r1 = shmget(0x0, 0x2000, 0x20, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_STAT(r1, 0x2, &(0x7f0000000200)=""/180) 22:59:05 executing program 4: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa9"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r6 = gettid() sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x139f605562ecba0b, 0x70, 0x9, 0x6, 0x7fff, 0x4, 0x0, 0x5, 0x400, 0x2, 0x0, 0x4, 0x7, 0x9, 0x1, 0x5, 0x80, 0x5, 0x9, 0x4, 0x9, 0xb61c, 0x7f, 0xffff, 0x7fff, 0xfff, 0x6, 0xfffffffffffffffb, 0x8, 0x6, 0x6, 0xfffffffffffffffd, 0x8, 0x80000001, 0x1ff, 0x1000, 0x4dfc, 0x80, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000500), 0x4}, 0x10020, 0x3f, 0x3, 0x4, 0x8000, 0x7fffffff, 0x5}, r6, 0x6, r1, 0x8) 22:59:05 executing program 2: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bde"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r6 = gettid() sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x139f605562ecba0b, 0x70, 0x9, 0x6, 0x7fff, 0x4, 0x0, 0x5, 0x400, 0x2, 0x0, 0x4, 0x7, 0x9, 0x1, 0x5, 0x80, 0x5, 0x9, 0x4, 0x9, 0xb61c, 0x7f, 0xffff, 0x7fff, 0xfff, 0x6, 0xfffffffffffffffb, 0x8, 0x6, 0x6, 0xfffffffffffffffd, 0x8, 0x80000001, 0x1ff, 0x1000, 0x4dfc, 0x80, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000500), 0x4}, 0x10020, 0x3f, 0x3, 0x4, 0x8000, 0x7fffffff, 0x5}, r6, 0x6, r1, 0x8) 22:59:05 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000280)='./file0\x00', 0x80000001, 0x1, &(0x7f00000002c0)=[{&(0x7f00000000c0)="800000000002000019000000e60100006c040000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1014001, &(0x7f00000003c0)={[{@journal_checksum='journal_checksum'}]}) [ 1370.179302] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 22:59:05 executing program 5: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bde"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r6 = gettid() sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x139f605562ecba0b, 0x70, 0x9, 0x6, 0x7fff, 0x4, 0x0, 0x5, 0x400, 0x2, 0x0, 0x4, 0x7, 0x9, 0x1, 0x5, 0x80, 0x5, 0x9, 0x4, 0x9, 0xb61c, 0x7f, 0xffff, 0x7fff, 0xfff, 0x6, 0xfffffffffffffffb, 0x8, 0x6, 0x6, 0xfffffffffffffffd, 0x8, 0x80000001, 0x1ff, 0x1000, 0x4dfc, 0x80, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000500), 0x4}, 0x10020, 0x3f, 0x3, 0x4, 0x8000, 0x7fffffff, 0x5}, r6, 0x6, r1, 0x8) 22:59:05 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f0000000080)={0xffffffffffffffff, 0x4, 0x99f, 0x2, 0xffffffffffffffff}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000140)={0x5, {{0xa, 0x4e23, 0x3f, @remote, 0x2}}, {{0xa, 0x4e21, 0xff, @mcast1}}}, 0x108) ioctl$NBD_DO_IT(r0, 0xab03) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000040)={0x0, 0x10001, 0x3, 0x4, 0x7}) [ 1370.222930] netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. [ 1370.235790] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 1370.263632] netlink: 3 bytes leftover after parsing attributes in process `syz-executor2'. [ 1370.297704] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1370.306792] EXT4-fs (loop1): can't mount with journal_checksum, fs mounted w/o journal 22:59:05 executing program 4: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r6 = gettid() sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x139f605562ecba0b, 0x70, 0x9, 0x6, 0x7fff, 0x4, 0x0, 0x5, 0x400, 0x2, 0x0, 0x4, 0x7, 0x9, 0x1, 0x5, 0x80, 0x5, 0x9, 0x4, 0x9, 0xb61c, 0x7f, 0xffff, 0x7fff, 0xfff, 0x6, 0xfffffffffffffffb, 0x8, 0x6, 0x6, 0xfffffffffffffffd, 0x8, 0x80000001, 0x1ff, 0x1000, 0x4dfc, 0x80, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000500), 0x4}, 0x10020, 0x3f, 0x3, 0x4, 0x8000, 0x7fffffff, 0x5}, r6, 0x6, r1, 0x8) [ 1370.429307] device nr0 entered promiscuous mode 22:59:05 executing program 2: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa9"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r6 = gettid() sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x139f605562ecba0b, 0x70, 0x9, 0x6, 0x7fff, 0x4, 0x0, 0x5, 0x400, 0x2, 0x0, 0x4, 0x7, 0x9, 0x1, 0x5, 0x80, 0x5, 0x9, 0x4, 0x9, 0xb61c, 0x7f, 0xffff, 0x7fff, 0xfff, 0x6, 0xfffffffffffffffb, 0x8, 0x6, 0x6, 0xfffffffffffffffd, 0x8, 0x80000001, 0x1ff, 0x1000, 0x4dfc, 0x80, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000500), 0x4}, 0x10020, 0x3f, 0x3, 0x4, 0x8000, 0x7fffffff, 0x5}, r6, 0x6, r1, 0x8) [ 1370.458593] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 22:59:05 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x20800, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x8001, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) [ 1370.507992] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 1370.518465] netlink: 3 bytes leftover after parsing attributes in process `syz-executor5'. [ 1370.533616] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock 22:59:05 executing program 5: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r6 = gettid() sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x139f605562ecba0b, 0x70, 0x9, 0x6, 0x7fff, 0x4, 0x0, 0x5, 0x400, 0x2, 0x0, 0x4, 0x7, 0x9, 0x1, 0x5, 0x80, 0x5, 0x9, 0x4, 0x9, 0xb61c, 0x7f, 0xffff, 0x7fff, 0xfff, 0x6, 0xfffffffffffffffb, 0x8, 0x6, 0x6, 0xfffffffffffffffd, 0x8, 0x80000001, 0x1ff, 0x1000, 0x4dfc, 0x80, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000500), 0x4}, 0x10020, 0x3f, 0x3, 0x4, 0x8000, 0x7fffffff, 0x5}, r6, 0x6, r1, 0x8) [ 1370.586457] EXT4-fs (loop1): can't mount with journal_checksum, fs mounted w/o journal 22:59:06 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x40, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7ff, 0x2, 0x0, 0x10000, 0x0, 0xc776, 0x0, 0x1, 0x3, 0xa76, 0x3, 0x3, 0x401, 0x7, 0x200, 0x384, 0x0, 0x200, 0x7f, 0x2, 0x9, 0x7f, 0x4, 0x7ff, 0x2, 0x99a, 0xd, 0x0, 0x0, 0x85e, 0x0, @perf_config_ext={0x0, 0xb6}, 0x10000, 0x79, 0xa2, 0x4, 0x100000000, 0x9, 0xdfa8}, 0x0, 0x10, r0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000240)=""/80) ioctl$TUNSETLINK(r0, 0x400454cd, 0x200) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="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") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) openat$cgroup_int(r2, &(0x7f0000000040)='io.weight\x00', 0x2, 0x0) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r3, &(0x7f0000000000), 0x17b) 22:59:06 executing program 4: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r6 = gettid() sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x139f605562ecba0b, 0x70, 0x9, 0x6, 0x7fff, 0x4, 0x0, 0x5, 0x400, 0x2, 0x0, 0x4, 0x7, 0x9, 0x1, 0x5, 0x80, 0x5, 0x9, 0x4, 0x9, 0xb61c, 0x7f, 0xffff, 0x7fff, 0xfff, 0x6, 0xfffffffffffffffb, 0x8, 0x6, 0x6, 0xfffffffffffffffd, 0x8, 0x80000001, 0x1ff, 0x1000, 0x4dfc, 0x80, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000500), 0x4}, 0x10020, 0x3f, 0x3, 0x4, 0x8000, 0x7fffffff, 0x5}, r6, 0x6, r1, 0x8) 22:59:06 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000280)='./file0\x00', 0x80000001, 0x1, &(0x7f00000002c0)=[{&(0x7f00000000c0)="800000000002000019000000e60100006c080000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1014001, &(0x7f00000003c0)={[{@journal_checksum='journal_checksum'}]}) 22:59:06 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x40000) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f0000000180)={0x10000000002, 0x107, 0xfffffffffffffffe, 0xfffffffffffffffe, 0x3}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000040)) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r0, 0xc08c5336, &(0x7f0000000200)={0xff, 0xffffffffffff0001, 0x0, 'queue0\x00', 0x3}) lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.evm\x00', &(0x7f00000006c0)=ANY=[], 0x0, 0x2) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x0, 0x0, 0x0, 0x4}, 0x2c) ioctl$SCSI_IOCTL_START_UNIT(r0, 0x5) ioctl$BLKTRACESTOP(r0, 0x1275, 0x0) write$eventfd(r0, &(0x7f0000000080)=0x6c7c2fa5, 0x8) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000002c0)=0x0) perf_event_open(&(0x7f0000000400)={0x6, 0x70, 0xba8e, 0x10000, 0x9, 0x2, 0x0, 0x10001, 0x2, 0x3, 0x1, 0xd08, 0x9, 0x9fc, 0x8, 0x5db4, 0x3b7, 0x1, 0x7, 0x6, 0x7, 0x1, 0x7, 0x1f, 0x80e1, 0x183, 0x200, 0x5, 0x4, 0xff, 0x6, 0x6e, 0x54, 0xff, 0xe0d1, 0x0, 0x7, 0x3, 0x0, 0x400, 0x4, @perf_bp={&(0x7f0000000140)}, 0x0, 0x8, 0x10001, 0xf, 0xffff, 0x40, 0x3}, r1, 0xe, r0, 0x2) open(&(0x7f0000000300)='./file0\x00', 0x20001, 0x80) 22:59:06 executing program 2: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r6 = gettid() sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x139f605562ecba0b, 0x70, 0x9, 0x6, 0x7fff, 0x4, 0x0, 0x5, 0x400, 0x2, 0x0, 0x4, 0x7, 0x9, 0x1, 0x5, 0x80, 0x5, 0x9, 0x4, 0x9, 0xb61c, 0x7f, 0xffff, 0x7fff, 0xfff, 0x6, 0xfffffffffffffffb, 0x8, 0x6, 0x6, 0xfffffffffffffffd, 0x8, 0x80000001, 0x1ff, 0x1000, 0x4dfc, 0x80, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000500), 0x4}, 0x10020, 0x3f, 0x3, 0x4, 0x8000, 0x7fffffff, 0x5}, r6, 0x6, r1, 0x8) 22:59:06 executing program 5: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r6 = gettid() sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x139f605562ecba0b, 0x70, 0x9, 0x6, 0x7fff, 0x4, 0x0, 0x5, 0x400, 0x2, 0x0, 0x4, 0x7, 0x9, 0x1, 0x5, 0x80, 0x5, 0x9, 0x4, 0x9, 0xb61c, 0x7f, 0xffff, 0x7fff, 0xfff, 0x6, 0xfffffffffffffffb, 0x8, 0x6, 0x6, 0xfffffffffffffffd, 0x8, 0x80000001, 0x1ff, 0x1000, 0x4dfc, 0x80, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000500), 0x4}, 0x10020, 0x3f, 0x3, 0x4, 0x8000, 0x7fffffff, 0x5}, r6, 0x6, r1, 0x8) [ 1371.204021] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1371.257699] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 22:59:06 executing program 4: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c493"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r6 = gettid() sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x139f605562ecba0b, 0x70, 0x9, 0x6, 0x7fff, 0x4, 0x0, 0x5, 0x400, 0x2, 0x0, 0x4, 0x7, 0x9, 0x1, 0x5, 0x80, 0x5, 0x9, 0x4, 0x9, 0xb61c, 0x7f, 0xffff, 0x7fff, 0xfff, 0x6, 0xfffffffffffffffb, 0x8, 0x6, 0x6, 0xfffffffffffffffd, 0x8, 0x80000001, 0x1ff, 0x1000, 0x4dfc, 0x80, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000500), 0x4}, 0x10020, 0x3f, 0x3, 0x4, 0x8000, 0x7fffffff, 0x5}, r6, 0x6, r1, 0x8) 22:59:06 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0xdffffffffffffffc) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517}) getsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x8) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) 22:59:06 executing program 5: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x5, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x890b, &(0x7f0000000000)) 22:59:06 executing program 2: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r6 = gettid() sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x139f605562ecba0b, 0x70, 0x9, 0x6, 0x7fff, 0x4, 0x0, 0x5, 0x400, 0x2, 0x0, 0x4, 0x7, 0x9, 0x1, 0x5, 0x80, 0x5, 0x9, 0x4, 0x9, 0xb61c, 0x7f, 0xffff, 0x7fff, 0xfff, 0x6, 0xfffffffffffffffb, 0x8, 0x6, 0x6, 0xfffffffffffffffd, 0x8, 0x80000001, 0x1ff, 0x1000, 0x4dfc, 0x80, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000500), 0x4}, 0x10020, 0x3f, 0x3, 0x4, 0x8000, 0x7fffffff, 0x5}, r6, 0x6, r1, 0x8) [ 1371.307900] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1371.330433] EXT4-fs (loop1): can't mount with journal_checksum, fs mounted w/o journal [ 1371.455715] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1371.495872] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 22:59:06 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000000040)={{0x417, 0x4, 0x7fff, 0x6470, 0x3ff, 0x3}, 0x5}) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) getsockopt$packet_buf(r0, 0x107, 0xb, &(0x7f0000000200)=""/4096, &(0x7f0000000140)=0x750) [ 1371.532952] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1371.567758] EXT4-fs (loop1): can't mount with journal_checksum, fs mounted w/o journal [ 1371.642491] device nr0 entered promiscuous mode 22:59:06 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000280)='./file0\x00', 0x80000001, 0x1, &(0x7f00000002c0)=[{&(0x7f00000000c0)="800000000002000019000000e60100006c000000480000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1014001, &(0x7f00000003c0)={[{@journal_checksum='journal_checksum'}]}) [ 1371.848888] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1371.867708] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1371.887725] EXT4-fs (loop1): group descriptors corrupted! [ 1371.953320] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1371.977791] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1371.992957] EXT4-fs (loop1): group descriptors corrupted! 22:59:07 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x40, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7ff, 0x2, 0x0, 0x10000, 0x0, 0xc776, 0x9, 0x0, 0x3, 0xa76, 0x3, 0x3, 0x401, 0x7, 0x200, 0x384, 0x0, 0x200, 0x7f, 0x2, 0x9, 0x7f, 0x4, 0x7ff, 0x2, 0x99a, 0xd, 0x0, 0x0, 0x85e, 0x0, @perf_config_ext={0x0, 0xb6}, 0x10000, 0x79, 0xa2, 0x4, 0x100000000, 0x9, 0xdfa8}, 0x0, 0x10, r0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000240)=""/80) ioctl$TUNSETLINK(r0, 0x400454cd, 0x200) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="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") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) openat$cgroup_int(r2, &(0x7f0000000040)='io.weight\x00', 0x2, 0x0) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r3, &(0x7f0000000000), 0x17b) 22:59:07 executing program 5: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r6 = gettid() sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x139f605562ecba0b, 0x70, 0x9, 0x6, 0x7fff, 0x4, 0x0, 0x5, 0x400, 0x2, 0x0, 0x4, 0x7, 0x9, 0x1, 0x5, 0x80, 0x5, 0x9, 0x4, 0x9, 0xb61c, 0x7f, 0xffff, 0x7fff, 0xfff, 0x6, 0xfffffffffffffffb, 0x8, 0x6, 0x6, 0xfffffffffffffffd, 0x8, 0x80000001, 0x1ff, 0x1000, 0x4dfc, 0x80, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000500), 0x4}, 0x10020, 0x3f, 0x3, 0x4, 0x8000, 0x7fffffff, 0x5}, r6, 0x6, r1, 0x8) 22:59:07 executing program 2: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r6 = gettid() sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x139f605562ecba0b, 0x70, 0x9, 0x6, 0x7fff, 0x4, 0x0, 0x5, 0x400, 0x2, 0x0, 0x4, 0x7, 0x9, 0x1, 0x5, 0x80, 0x5, 0x9, 0x4, 0x9, 0xb61c, 0x7f, 0xffff, 0x7fff, 0xfff, 0x6, 0xfffffffffffffffb, 0x8, 0x6, 0x6, 0xfffffffffffffffd, 0x8, 0x80000001, 0x1ff, 0x1000, 0x4dfc, 0x80, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000500), 0x4}, 0x10020, 0x3f, 0x3, 0x4, 0x8000, 0x7fffffff, 0x5}, r6, 0x6, r1, 0x8) 22:59:07 executing program 4: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r6 = gettid() sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x139f605562ecba0b, 0x70, 0x9, 0x6, 0x7fff, 0x4, 0x0, 0x5, 0x400, 0x2, 0x0, 0x4, 0x7, 0x9, 0x1, 0x5, 0x80, 0x5, 0x9, 0x4, 0x9, 0xb61c, 0x7f, 0xffff, 0x7fff, 0xfff, 0x6, 0xfffffffffffffffb, 0x8, 0x6, 0x6, 0xfffffffffffffffd, 0x8, 0x80000001, 0x1ff, 0x1000, 0x4dfc, 0x80, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000500), 0x4}, 0x10020, 0x3f, 0x3, 0x4, 0x8000, 0x7fffffff, 0x5}, r6, 0x6, r1, 0x8) 22:59:07 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) r1 = eventfd(0x3) fcntl$dupfd(r0, 0x406, r1) 22:59:07 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000280)='./file0\x00', 0x80000001, 0x1, &(0x7f00000002c0)=[{&(0x7f00000000c0)="800000000002000019000000e60100006c000700000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1014001, &(0x7f00000003c0)={[{@journal_checksum='journal_checksum'}]}) [ 1372.457337] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1372.478141] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 22:59:07 executing program 4: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace2"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r6 = gettid() sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x139f605562ecba0b, 0x70, 0x9, 0x6, 0x7fff, 0x4, 0x0, 0x5, 0x400, 0x2, 0x0, 0x4, 0x7, 0x9, 0x1, 0x5, 0x80, 0x5, 0x9, 0x4, 0x9, 0xb61c, 0x7f, 0xffff, 0x7fff, 0xfff, 0x6, 0xfffffffffffffffb, 0x8, 0x6, 0x6, 0xfffffffffffffffd, 0x8, 0x80000001, 0x1ff, 0x1000, 0x4dfc, 0x80, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000500), 0x4}, 0x10020, 0x3f, 0x3, 0x4, 0x8000, 0x7fffffff, 0x5}, r6, 0x6, r1, 0x8) 22:59:07 executing program 3: r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x1016, 0x0) ioctl$PPPIOCSMRU(r0, 0x40047452, &(0x7f0000000200)=0x8) getsockopt$inet6_dccp_buf(r0, 0x21, 0xcd, &(0x7f0000000080)=""/87, &(0x7f0000000140)=0x57) r1 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x200000) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517}) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000180)={0x6fe1, 0x9, 0x47d1a8bb, 0x4, 0x5}) ioctl$FIGETBSZ(r1, 0x2, &(0x7f0000000000)) 22:59:07 executing program 5: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r6 = gettid() sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x139f605562ecba0b, 0x70, 0x9, 0x6, 0x7fff, 0x4, 0x0, 0x5, 0x400, 0x2, 0x0, 0x4, 0x7, 0x9, 0x1, 0x5, 0x80, 0x5, 0x9, 0x4, 0x9, 0xb61c, 0x7f, 0xffff, 0x7fff, 0xfff, 0x6, 0xfffffffffffffffb, 0x8, 0x6, 0x6, 0xfffffffffffffffd, 0x8, 0x80000001, 0x1ff, 0x1000, 0x4dfc, 0x80, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000500), 0x4}, 0x10020, 0x3f, 0x3, 0x4, 0x8000, 0x7fffffff, 0x5}, r6, 0x6, r1, 0x8) [ 1372.511210] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1372.544242] EXT4-fs (loop1): can't mount with journal_checksum, fs mounted w/o journal 22:59:07 executing program 2: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r6 = gettid() sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x139f605562ecba0b, 0x70, 0x9, 0x6, 0x7fff, 0x4, 0x0, 0x5, 0x400, 0x2, 0x0, 0x4, 0x7, 0x9, 0x1, 0x5, 0x80, 0x5, 0x9, 0x4, 0x9, 0xb61c, 0x7f, 0xffff, 0x7fff, 0xfff, 0x6, 0xfffffffffffffffb, 0x8, 0x6, 0x6, 0xfffffffffffffffd, 0x8, 0x80000001, 0x1ff, 0x1000, 0x4dfc, 0x80, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000500), 0x4}, 0x10020, 0x3f, 0x3, 0x4, 0x8000, 0x7fffffff, 0x5}, r6, 0x6, r1, 0x8) [ 1372.647743] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1372.682657] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 1372.724230] device nr0 entered promiscuous mode [ 1372.733041] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock 22:59:07 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517, 0x1000000800000000, 0x200000000000, 0xfffffffffffffffd}) flock(r0, 0x6) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) [ 1372.789393] EXT4-fs (loop1): can't mount with journal_checksum, fs mounted w/o journal [ 1372.793973] __nla_parse: 11 callbacks suppressed [ 1372.793983] netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. [ 1372.857177] netlink: 3 bytes leftover after parsing attributes in process `syz-executor2'. [ 1372.870448] ================================================================== [ 1372.878079] BUG: KASAN: stack-out-of-bounds in locks_remove_flock+0x33c/0x350 [ 1372.885365] Read of size 8 at addr ffff88016834fa08 by task syz-executor3/28610 [ 1372.892814] [ 1372.894458] CPU: 0 PID: 28610 Comm: syz-executor3 Not tainted 4.20.0-rc1-next-20181107+ #107 [ 1372.903075] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1372.912436] Call Trace: [ 1372.915038] dump_stack+0x244/0x39d [ 1372.918693] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1372.923892] ? printk+0xa7/0xcf [ 1372.927195] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 1372.931982] print_address_description.cold.7+0x9/0x1ff [ 1372.937364] kasan_report.cold.8+0x242/0x309 [ 1372.941804] ? locks_remove_flock+0x33c/0x350 [ 1372.946324] __asan_report_load8_noabort+0x14/0x20 [ 1372.951268] locks_remove_flock+0x33c/0x350 22:59:08 executing program 2: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={r0, 0x3, 0x1, 0x8, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000340)) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000840)=ANY=[@ANYBLOB="2a14ad671823fa25807e280d3b0adc4e6d993490c6336a9b66845de6a3d40b9374520cb55348212a7baa263d267efbf8c87af5127340b621a1d05e54db28a59876053187a81d9f88fa740cb491447320287687db52daa3bbb010b4448118c8dbb2b4769f49e85c34fc295cc3c2538c9b4dc144a9dd4f3a3f4bdedefa8290f7263fd0b9c7138b4c61c027dd7cba2489bed60bcee388d5832dd8e3f693cdfe586b47d7ba53b61b0bdfe40ddeb40ee57cd4f779931bbb3fa969bc734b0519e8feb0bf367317997c7a4ee0b5b6fd5d99ecaf219ef1390a22ebdac292750f785c39b9ee38284a0f57467f4ea163c49382ec9a51ace253"]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x800000000000033, '-,mory'}]}, 0x8) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890c, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r1, &(0x7f0000000a00)="a2d0dde5562e9c132f8a49169af39dd70bfd7820c84a244295c98e385e4ca7cac3c9b8e034c981eda51b8ca8d23b64369f1624c006e0003560d5531bfd40169ad38d84742b64418a46a699046079ad9ea8d6313ca874f676c699c86af068474f24e912789c27f27f7e5f03f6ac39e72bdbf049c5d21e33db051ce772fec5872a199638217de0a99438123bec6b2efb0c1d018ab7e12a", &(0x7f0000000ac0)="3ccbf25dd4f0158658143a8cc7146016b36dd6dfb120c1b5df9ee3045d118b35ea97051032560146eec62f2bea1d718a8917"}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000680)=ANY=[@ANYBLOB="0180791b26aefc8df1c084104336db0a000000000300000000000000"]) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r6 = gettid() sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x421, &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe60, 0x4}, 0x8080) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="2e2f000200007a30000563622392a3df2738f3cf70af8cf5229d02e74b298d5d81d77545b64f46d8921641e9ded215582da8b0c89cd4eff8a4288cc1091691f5757ad4b7090b0068f3890935a9b7bee23db5c1ec875a2a5283efaa441ec57c94eda0eba596d0a9808eb11136262b5a96e16408560d2b9a466d740606ab0215bbc9bb81b1a4d1119876fc8813f84ffa95ec2f", 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x139f605562ecba0b, 0x70, 0x9, 0x6, 0x7fff, 0x4, 0x0, 0x5, 0x400, 0x2, 0x0, 0x4, 0x7, 0x9, 0x1, 0x5, 0x80, 0x5, 0x9, 0x4, 0x9, 0xb61c, 0x7f, 0xffff, 0x7fff, 0xfff, 0x6, 0xfffffffffffffffb, 0x8, 0x6, 0x6, 0xfffffffffffffffd, 0x8, 0x80000001, 0x1ff, 0x1000, 0x4dfc, 0x80, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000500), 0x4}, 0x10020, 0x3f, 0x3, 0x4, 0x8000, 0x7fffffff, 0x5}, r6, 0x6, r1, 0x8) [ 1372.955615] ? flock_lock_inode+0x11c0/0x11c0 [ 1372.960127] ? mark_held_locks+0x130/0x130 [ 1372.964383] ? debug_smp_processor_id+0x1c/0x20 [ 1372.969081] ? perf_trace_lock+0x14d/0x7a0 [ 1372.973343] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1372.978919] ? debug_smp_processor_id+0x1c/0x20 [ 1372.983605] ? perf_trace_lock+0x14d/0x7a0 [ 1372.987852] ? locks_remove_posix+0x486/0x850 [ 1372.992367] ? lock_is_held_type+0x210/0x210 [ 1372.996788] ? lock_is_held_type+0x210/0x210 [ 1373.001212] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1373.006771] locks_remove_file+0x148/0x5c0 [ 1373.011021] ? fcntl_setlk+0xfc0/0xfc0 [ 1373.014931] ? fsnotify_first_mark+0x350/0x350 [ 1373.019529] ? __fsnotify_parent+0xcc/0x420 [ 1373.023876] ? perf_trace_sched_process_exec+0x860/0x860 [ 1373.029350] ? fsnotify+0xf20/0xf20 [ 1373.033002] ? __might_sleep+0x95/0x190 [ 1373.036994] __fput+0x2f0/0xa70 [ 1373.040299] ? get_max_files+0x20/0x20 [ 1373.044250] ? trace_hardirqs_on+0xbd/0x310 [ 1373.048601] ? kasan_check_read+0x11/0x20 [ 1373.052763] ? task_work_run+0x1af/0x2a0 [ 1373.056838] ? trace_hardirqs_off_caller+0x300/0x300 [ 1373.061972] ? filp_close+0x1cd/0x250 [ 1373.065793] ____fput+0x15/0x20 [ 1373.069086] task_work_run+0x1e8/0x2a0 [ 1373.072991] ? task_work_cancel+0x240/0x240 [ 1373.077331] ? copy_fd_bitmaps+0x210/0x210 [ 1373.081581] ? do_syscall_64+0x9a/0x820 [ 1373.085573] exit_to_usermode_loop+0x318/0x380 [ 1373.090175] ? __bpf_trace_sys_exit+0x30/0x30 [ 1373.094706] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1373.100260] do_syscall_64+0x6be/0x820 [ 1373.104189] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1373.109566] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1373.114503] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1373.119359] ? trace_hardirqs_on_caller+0x310/0x310 [ 1373.124410] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1373.129466] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1373.134508] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1373.139372] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1373.144568] RIP: 0033:0x411021 [ 1373.147781] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 34 19 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1373.166692] RSP: 002b:00007ffd0e904590 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 1373.174415] RAX: 0000000000000000 RBX: 0000000000000004 RCX: 0000000000411021 [ 1373.181709] RDX: 0000000000000000 RSI: 00000000007302e0 RDI: 0000000000000003 [ 1373.188986] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1373.196275] R10: 00007ffd0e9044b0 R11: 0000000000000293 R12: 0000000000000000 [ 1373.203572] R13: 0000000000000001 R14: 00000000000009f3 R15: 0000000000000003 [ 1373.210877] [ 1373.212546] The buggy address belongs to the page: [ 1373.217485] page:ffffea0005a0d3c0 count:0 mapcount:0 mapping:0000000000000000 index:0x0 [ 1373.225633] flags: 0x2fffc0000000000() [ 1373.229549] raw: 02fffc0000000000 0000000000000000 ffffea0005a0d3c8 0000000000000000 [ 1373.237443] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 1373.245353] page dumped because: kasan: bad access detected [ 1373.251063] [ 1373.252694] Memory state around the buggy address: [ 1373.257656] ffff88016834f900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1373.265022] ffff88016834f980: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1373.272399] >ffff88016834fa00: f2 f2 f2 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1373.279760] ^ [ 1373.283405] ffff88016834fa80: 00 f1 f1 f1 f1 00 00 f2 f2 f2 f2 f2 f2 f8 f2 f2 [ 1373.290784] ffff88016834fb00: f2 f2 f2 f2 f2 00 f2 f2 f2 00 00 00 00 00 00 00 [ 1373.298155] ================================================================== [ 1373.305513] Disabling lock debugging due to kernel taint [ 1373.337957] Kernel panic - not syncing: panic_on_warn set ... [ 1373.343887] CPU: 1 PID: 28610 Comm: syz-executor3 Tainted: G B 4.20.0-rc1-next-20181107+ #107 [ 1373.353858] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1373.363218] Call Trace: [ 1373.365833] dump_stack+0x244/0x39d [ 1373.369471] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1373.374749] panic+0x2ad/0x55c [ 1373.377978] ? add_taint.cold.5+0x16/0x16 [ 1373.382138] ? preempt_schedule+0x4d/0x60 [ 1373.386300] ? ___preempt_schedule+0x16/0x18 [ 1373.390738] ? trace_hardirqs_on+0xb4/0x310 [ 1373.395077] kasan_end_report+0x47/0x4f [ 1373.399086] kasan_report.cold.8+0x76/0x309 [ 1373.403432] ? locks_remove_flock+0x33c/0x350 [ 1373.407944] __asan_report_load8_noabort+0x14/0x20 [ 1373.412881] locks_remove_flock+0x33c/0x350 [ 1373.417213] ? flock_lock_inode+0x11c0/0x11c0 [ 1373.421724] ? mark_held_locks+0x130/0x130 [ 1373.425968] ? debug_smp_processor_id+0x1c/0x20 [ 1373.430666] ? perf_trace_lock+0x14d/0x7a0 [ 1373.434913] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1373.440465] ? debug_smp_processor_id+0x1c/0x20 [ 1373.445139] ? perf_trace_lock+0x14d/0x7a0 [ 1373.449407] ? locks_remove_posix+0x486/0x850 [ 1373.453935] ? lock_is_held_type+0x210/0x210 [ 1373.458372] ? lock_is_held_type+0x210/0x210 [ 1373.462802] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1373.468376] locks_remove_file+0x148/0x5c0 [ 1373.472623] ? fcntl_setlk+0xfc0/0xfc0 [ 1373.476521] ? fsnotify_first_mark+0x350/0x350 [ 1373.481109] ? __fsnotify_parent+0xcc/0x420 [ 1373.485435] ? perf_trace_sched_process_exec+0x860/0x860 [ 1373.490896] ? fsnotify+0xf20/0xf20 [ 1373.494545] ? __might_sleep+0x95/0x190 [ 1373.498534] __fput+0x2f0/0xa70 [ 1373.501870] ? get_max_files+0x20/0x20 [ 1373.505775] ? trace_hardirqs_on+0xbd/0x310 [ 1373.510114] ? kasan_check_read+0x11/0x20 [ 1373.514274] ? task_work_run+0x1af/0x2a0 [ 1373.518367] ? trace_hardirqs_off_caller+0x300/0x300 [ 1373.523483] ? filp_close+0x1cd/0x250 [ 1373.527296] ____fput+0x15/0x20 [ 1373.530591] task_work_run+0x1e8/0x2a0 [ 1373.534491] ? task_work_cancel+0x240/0x240 [ 1373.538845] ? copy_fd_bitmaps+0x210/0x210 [ 1373.543097] ? do_syscall_64+0x9a/0x820 [ 1373.547106] exit_to_usermode_loop+0x318/0x380 [ 1373.551715] ? __bpf_trace_sys_exit+0x30/0x30 [ 1373.556233] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1373.561785] do_syscall_64+0x6be/0x820 [ 1373.565685] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1373.571056] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1373.575991] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1373.580861] ? trace_hardirqs_on_caller+0x310/0x310 [ 1373.585886] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1373.590921] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1373.595950] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1373.600826] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1373.606022] RIP: 0033:0x411021 [ 1373.609224] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 34 19 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1373.628132] RSP: 002b:00007ffd0e904590 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 1373.635846] RAX: 0000000000000000 RBX: 0000000000000004 RCX: 0000000000411021 [ 1373.643123] RDX: 0000000000000000 RSI: 00000000007302e0 RDI: 0000000000000003 [ 1373.650408] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1373.657702] R10: 00007ffd0e9044b0 R11: 0000000000000293 R12: 0000000000000000 [ 1373.664979] R13: 0000000000000001 R14: 00000000000009f3 R15: 0000000000000003 [ 1373.673263] Kernel Offset: disabled [ 1373.676890] Rebooting in 86400 seconds..