008ff0)={0x2, 0x0, @multicast2}, 0x10) listen(r0, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r2, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r2, 0x0) close(r2) 10:07:39 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0xfdef, 0x400}], 0x4801, 0x0) 10:07:39 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f00000002c0)='systemem0md5sum$\x00', 0x0) ioctl$SIOCGIFHWADDR(r1, 0x8927, &(0x7f0000000100)) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r2, 0x0) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ubi_ctrl\x00', 0x708200, 0x0) ioctl$SNDCTL_DSP_SYNC(r3, 0x5001, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, {0x4000001}, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000040)='coredump_filter\x00*\x0e\xc3=.\x13\xcbx\x95*\xeeX\x9fcy\xa49\xf6\x8f\x82^\x19\xa9\xcd+\b\x9f\xc6,\xa0\xf0\xff\x9dO\x06\xc9\x15\xda\xa4\x7fh\xd4\xe8C\xdeKUrR\xf4\x9c\x87\xee\xd2\xfb\xdfs\xd0G\x91\x02\x15Z\xa8\x1ad\xadY\x13\x14mg\xc9\x00\x16\xa4\xc48\x06u\x1e:\xd4Y?\xd8P\xe8reP\xffv\xd6\x12\x85N1\n\f\xb0\x1e\xe7\xffD\x1aS\xbf0\x80\xff\xff7V\xcc5\x96W\x14J\xe2\x93\xe3\xc6A7\xd8\xec\xb2m\xf5\x16-\x1b\xbd\x11\x1aYg\xe0\xa7\xd19\a') prctl$PR_SET_DUMPABLE(0x4, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r4, &(0x7f0000000140)=ANY=[@ANYBLOB="3a78dc32c4c654a8cd22b2284272371822f97a400a96ad8d73e328c3c734b9542a400684a3"], 0x1) sendfile(r4, 0xffffffffffffffff, &(0x7f0000000240), 0x6d38) accept$alg(r4, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 10:07:39 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000400e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:07:39 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60b00006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:07:39 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r0, &(0x7f0000008ff0)={0x2, 0x0, @multicast2}, 0x10) listen(r0, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r2, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r2, 0x0) close(r2) 10:07:39 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f00000002c0)='systemem0md5sum$\x00', 0x0) ioctl$SIOCGIFHWADDR(r1, 0x8927, &(0x7f0000000100)) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r2, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000140)={0x6, 0x6, 0xa2, 0x3af7, 0x1b, 0x7, 0x6, 0x4, 0x16, 0x8, 0xfffffff9, 0x8}) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, {0x4000001}, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000040)='coredump_filter\x00*\x0e\xc3=.\x13\xcbx\x95*\xeeX\x9fcy\xa49\xf6\x8f\x82^\x19\xa9\xcd+\b\x9f\xc6,\xa0\xf0\xff\x9dO\x06\xc9\x15\xda\xa4\x7fh\xd4\xe8C\xdeKUrR\xf4\x9c\x87\xee\xd2\xfb\xdfs\xd0G\x91\x02\x15Z\xa8\x1ad\xadY\x13\x14mg\xc9\x00\x16\xa4\xc48\x06u\x1e:\xd4Y?\xd8P\xe8reP\xffv\xd6\x12\x85N1\n\f\xb0\x1e\xe7\xffD\x1aS\xbf0\x80\xff\xff7V\xcc5\x96W\x14J\xe2\x93\xe3\xc6A7\xd8\xec\xb2m\xf5\x16-\x1b\xbd\x11\x1aYg\xe0\xa7\xd19\a') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') [ 1550.872809][T29627] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1550.899247][T29639] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1550.912500][T29627] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1550.943867][T29639] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1550.972721][T29627] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock 10:07:40 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r2, r2, &(0x7f0000000000), 0x0) connect$nfc_raw(r2, &(0x7f0000000140)={0x27, 0x1, 0x1, 0x5}, 0x10) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = memfd_create(&(0x7f00000002c0)='systemem0md5sum$\x00', 0x0) ioctl$SIOCGIFHWADDR(r1, 0x8927, &(0x7f0000000100)) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r3, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, {0x4000001}, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000040)='coredump_filter\x00*\x0e\xc3=.\x13\xcbx\x95*\xeeX\x9fcy\xa49\xf6\x8f\x82^\x19\xa9\xcd+\b\x9f\xc6,\xa0\xf0\xff\x9dO\x06\xc9\x15\xda\xa4\x7fh\xd4\xe8C\xdeKUrR\xf4\x9c\x87\xee\xd2\xfb\xdfs\xd0G\x91\x02\x15Z\xa8\x1ad\xadY\x13\x14mg\xc9\x00\x16\xa4\xc48\x06u\x1e:\xd4Y?\xd8P\xe8reP\xffv\xd6\x12\x85N1\n\f\xb0\x1e\xe7\xffD\x1aS\xbf0\x80\xff\xff7V\xcc5\x96W\x14J\xe2\x93\xe3\xc6A7\xd8\xec\xb2m\xf5\x16-\x1b\xbd\x11\x1aYg\xe0\xa7\xd19\a') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 10:07:40 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r0, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r2, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r2, 0x0) close(r2) [ 1551.115377][T29639] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock 10:07:40 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x2000059b, 0x400}], 0x4801, 0x0) [ 1551.159859][T29627] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 1551.191670][T29639] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 10:07:40 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r0, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r2, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r2, 0x0) close(r2) 10:07:46 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000880)=ANY=[@ANYBLOB="8f"], 0x1) sendfile(r2, r2, &(0x7f0000000000), 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000100)={r3, 0x0, 0x1}, 0x8) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000340)=ANY=[@ANYRES32=r3, @ANYBLOB="02000000"], &(0x7f0000000300)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000400)={r4, @in={{0x2, 0x4e22, @loopback}}, [0x8, 0x81, 0x3, 0x0, 0x81, 0x8001, 0x0, 0x6, 0x7fff, 0x49c8, 0x1, 0x9, 0xfc3, 0xffff, 0x9]}, &(0x7f0000000140)=0x100) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f00000001c0)={0x0, 0x3ff, 0x7, 0x6, 0xa6, 0x9, 0x6, 0x4, {r5, @in6={{0xa, 0x4e22, 0x5, @mcast1, 0x1}}, 0x2, 0x4, 0x401, 0x2, 0x6}}, &(0x7f0000000280)=0xb0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = memfd_create(&(0x7f00000002c0)='systemem0md5sum$\x00', 0x0) ioctl$SIOCGIFHWADDR(r1, 0x8927, &(0x7f0000000100)) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r6, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='coredump_filter\x00*\x0e\xc3=.\x13\xcbx\x95*\xeeX\x9fcy\xa49\xf6\x8f\x82^\x19\xa9\xcd+\b\x9f\xc6,\xa0\xf0\xff\x9dO\x06\xc9\x15\xda\xa4\x7fh\xd4\xe8C\xdeKUrR\xf4\x9c\x87\xee\xd2\xfb\xdfs\xd0G\x91\x02\x15Z\xa8\x1ad\xadY\x13\x14mg\xc9\x00\x16\xa4\xc48\x06u\x1e:\xd4Y?\xd8P\xe8reP\xffv\xd6\x12\x85N1\n\f\xb0\x1e\xe7\xffD\x1aS\xbf0\x80\xff\xff7V\xcc5\x96W\x14J\xe2\x93\xe3\xc6A7\xd8\xec\xb2m\xf5\x16-\x1b\xbd\x11\x1aYg\xe0\xa7\xd19\a') prctl$PR_SET_DUMPABLE(0x4, 0x0) r7 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r7, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r7, r7, &(0x7f0000000000), 0x0) ioctl$VIDIOC_G_SLICED_VBI_CAP(r7, 0xc0745645, &(0x7f0000000380)={0x1, [0xda8e, 0x9, 0x401, 0x1, 0x5, 0x4, 0x1f, 0xfffc, 0x9, 0x3, 0x6, 0x1, 0x81, 0x4, 0x6, 0x3, 0x636, 0x9, 0x469, 0x7fff, 0x5, 0x1, 0x200, 0x1, 0x46, 0xfd04, 0x400, 0xfff, 0x9dd2, 0x8, 0x1, 0x401, 0x101, 0x8dd, 0x9, 0xff81, 0x8, 0x8db, 0x0, 0x3f, 0x0, 0x479a, 0x4, 0x374, 0x1f, 0xa70, 0x100, 0xf800], 0x3}) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 10:07:46 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60f00006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:07:46 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000500e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:07:46 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r0, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r2, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r2, 0x0) close(r2) 10:07:46 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = socket(0x10, 0x1, 0x3) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000000c0)=@v1={0x0, @aes128, 0x4, "182f69da974455ff"}) getdents64(r0, &(0x7f00000005c0)=""/153, 0x99) fstat(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = socket$packet(0x11, 0x2, 0x300) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0xc) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000002380)={{0x0, 0x0, r4, 0xffffffffffffffff}}) getgroups(0x1, &(0x7f0000000180)=[r4]) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(r2, r5, r6) getdents64(r0, &(0x7f0000000000)=""/186, 0xba) 10:07:46 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0xfffffdef, 0x400}], 0x4801, 0x0) 10:07:46 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r2, r2, &(0x7f0000000000), 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000140)=0x4) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = memfd_create(&(0x7f00000002c0)='systemem0md5sum$\x00', 0x0) ioctl$SIOCGIFHWADDR(r1, 0x8927, &(0x7f0000000100)) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r3, 0x0) rt_sigaction(0x1c, &(0x7f0000b4a000)={0xfffffffffffffffd, {0x8}, 0xe60a2914f75ca72a, 0x0}, 0x0, 0x7, &(0x7f00000001c0)) syz_open_procfs(0x0, &(0x7f0000000040)='coredump_filter\x00*\x0e\xc3=.\x13\xcbx\x95*\xeeX\x9fcy\xa49\xf6\x8f\x82^\x19\xa9\xcd+\b\x9f\xc6,\xa0\xf0\xff\x9dO\x06\xc9\x15\xda\xa4\x7fh\xd4\xe8C\xdeKUrR\xf4\x9c\x87\xee\xd2\xfb\xdfs\xd0G\x91\x02\x15Z\xa8\x1ad\xadY\x13\x14mg\xc9\x00\x16\xa4\xc48\x06u\x1e:\xd4Y?\xd8P\xe8reP\xffv\xd6\x12\x85N1\n\f\xb0\x1e\xe7\xffD\x1aS\xbf0\x80\xff\xff7V\xcc5\x96W\x14J\xe2\x93\xe3\xc6A7\xd8\xec\xb2m\xf5\x16-\x1b\xbd\x11\x1aYg\xe0\xa7\xd19\a') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 10:07:46 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r0, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r0, 0x0) r1 = socket$inet6(0xa, 0x0, 0x6b) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r2, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r2, 0x0) close(r2) [ 1557.255297][T29799] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1557.284882][T29799] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1557.307054][T29801] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1557.337651][T29799] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1557.368397][T29801] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1557.403122][T29801] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock 10:07:46 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r2, r2, &(0x7f0000000000), 0x0) ioctl$EVIOCSCLOCKID(r2, 0x400445a0, &(0x7f0000000140)=0xc35) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = memfd_create(&(0x7f00000002c0)='systemem0md5sum$\x00', 0x0) ioctl$SIOCGIFHWADDR(r1, 0x8927, &(0x7f0000000100)) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r3, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, {0x4000001}, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000040)='coredump_filter\x00*\x0e\xc3=.\x13\xcbx\x95*\xeeX\x9fcy\xa49\xf6\x8f\x82^\x19\xa9\xcd+\b\x9f\xc6,\xa0\xf0\xff\x9dO\x06\xc9\x15\xda\xa4\x7fh\xd4\xe8C\xdeKUrR\xf4\x9c\x87\xee\xd2\xfb\xdfs\xd0G\x91\x02\x15Z\xa8\x1ad\xadY\x13\x14mg\xc9\x00\x16\xa4\xc48\x06u\x1e:\xd4Y?\xd8P\xe8reP\xffv\xd6\x12\x85N1\n\f\xb0\x1e\xe7\xffD\x1aS\xbf0\x80\xff\xff7V\xcc5\x96W\x14J\xe2\x93\xe3\xc6A7\xd8\xec\xb2m\xf5\x16-\x1b\xbd\x11\x1aYg\xe0\xa7\xd19\a') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') [ 1557.438077][T29799] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 1557.465149][T29801] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 10:07:46 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r0, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r0, 0x0) r1 = socket$inet6(0xa, 0x0, 0x6b) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r2, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r2, 0x0) close(r2) 10:07:46 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000600e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:07:46 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e61000006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:07:46 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r0, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r0, 0x0) r1 = socket$inet6(0xa, 0x0, 0x6b) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r2, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r2, 0x0) close(r2) 10:07:47 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) memfd_create(&(0x7f00000002c0)='systemem0md5sum$\x00', 0x0) ioctl$SIOCGIFHWADDR(r1, 0x8927, &(0x7f0000000100)) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, {0x4000001}, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) r2 = getpgrp(0xffffffffffffffff) prlimit64(r2, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) syz_open_procfs(r2, &(0x7f00000000c0)='net/mcfilter\x00') syz_open_procfs(r2, &(0x7f0000000040)='coredump_filter\x00*\x0e\xc3=.\x13\xcbx\x95*\xeeX\x9fcy\xa49\xf6\x8f\x82^\x19\xa9\xcd+\b\x9f\xc6,\xa0\xf0\xff\x9dO\x06\xc9\x15\xda\xa4\x7fh\xd4\xe8C\xdeKUrR\xf4\x9c\x87\xee\xd2\xfb\xdfs\xd0G\x91\x02\x15Z\xa8\x1ad\xadY\x13\x14mg\xc9\x00\x16\xa4\xc48\x06u\x1e:\xd4Y?\xd8P\xe8reP\xffv\xd6\x12\x85N1\n\f\xb0\x1e\xe7\xffD\x1aS\xbf0\x80\xff\xff7V\xcc5\x96W\x14J\xe2\x93\xe3\xc6A7\xd8\xec\xb2m\xf5\x16-\x1b\xbd\x11\x1aYg\xe0\xa7\xd19\a') prctl$PR_SET_DUMPABLE(0x4, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) prctl$PR_SET_ENDIAN(0x14, 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r4, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="55ff000000000000001a0d000000"], 0x14}}, 0x0) sendmsg$TIPC_NL_NET_SET(r3, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000300)={0x240, r5, 0x0, 0x70bd25, 0x25dfdbfd, {}, [@TIPC_NLA_MON={0x3c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3ff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffff696c}]}, @TIPC_NLA_BEARER={0xe0, 0x1, [@TIPC_NLA_BEARER_PROP={0xfffffffffffffdc4, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x101}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xd016}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'ip_vti0\x00'}}, @TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'eth', 0x3a, 'veth0_to_team\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x7fffffff, @rand_addr="da1cb12164c0949190214f7bf14a3e67", 0x5}}, {0x14, 0x2, @in={0x2, 0x4e24, @multicast1}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffff801}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}]}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8001}]}, @TIPC_NLA_NET={0x44, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x80000000}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xc02}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x6be}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x5}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xaeba}]}, @TIPC_NLA_NET={0x2c, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0xfdd}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x9}, @TIPC_NLA_NET_NODEID={0xc}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x3f}]}, @TIPC_NLA_LINK={0x4c, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}]}]}, @TIPC_NLA_LINK={0x24, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}]}]}, @TIPC_NLA_NODE={0x24, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x9}]}]}, 0x240}}, 0x4040085) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 10:07:47 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r0, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r0, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r2, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r2, 0x0) close(r2) [ 1558.195968][T30169] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 10:07:47 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0xfffffffffffffdef, 0x400}], 0x4801, 0x0) [ 1558.283358][T30169] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1558.342408][T30180] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1558.404971][T30169] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1558.445617][T30180] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1558.461038][T30169] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 1558.461406][T30180] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1558.497683][T30180] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 10:07:53 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') getdents64(r0, &(0x7f00000005c0)=""/153, 0x99) getdents64(r0, &(0x7f0000000000)=""/186, 0xba) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r1, r1, &(0x7f0000000000), 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000180)={0x3, [0x0, 0x0, 0x0]}, &(0x7f0000000200)=0x10) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000240)={r2, 0x1c, "6006ab0aa5d8583577d5946f39e119a3f1c41d41148e0c2d92271d7f"}, &(0x7f0000000280)=0x24) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x0) sendfile(r1, r3, &(0x7f0000000300)=0xffff, 0x800) ioctl$sock_inet_SIOCDELRT(r3, 0x890c, &(0x7f0000000100)={0x0, {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e22, @multicast2}, {0x2, 0x4e20, @loopback}, 0x2d, 0x0, 0x0, 0x0, 0x200, &(0x7f00000000c0)='bridge_slave_0\x00', 0x5, 0x0, 0x8d}) 10:07:53 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r0, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r0, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r2, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r2, 0x0) close(r2) 10:07:53 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$unix(r0, &(0x7f0000000200)=@abs, &(0x7f0000000280)=0x6e) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = memfd_create(&(0x7f00000002c0)='systemem0md5sum$\x00', 0x0) ioctl$SIOCGIFHWADDR(r2, 0x8927, &(0x7f0000000100)) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r3, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, {0x4000001}, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000040)='coredump_filter\x00*\x0e\xc3=.\x13\xcbx\x95*\xeeX\x9fcy\xa49\xf6\x8f\x82^\x19\xa9\xcd+\b\x9f\xc6,\xa0\xf0\xff\x9dO\x06\xc9\x15\xda\xa4\x7fh\xd4\xe8C\xdeKUrR\xf4\x9c\x87\xee\xd2\xfb\xdfs\xd0G\x91\x02\x15Z\xa8\x1ad\xadY\x13\x14mg\xc9\x00\x16\xa4\xc48\x06u\x1e:\xd4Y?\xd8P\xe8reP\xffv\xd6\x12\x85N1\n\f\xb0\x1e\xe7\xffD\x1aS\xbf0\x80\xff\xff7V\xcc5\x96W\x14J\xe2\x93\xe3\xc6A7\xd8\xec\xb2m\xf5\x16-\x1b\xbd\x11\x1aYg\xe0\xa7\xd19\a') r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r4, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000100)={r5, 0x0, 0x1}, 0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000300)={r5, 0x1000, "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"}, &(0x7f0000000140)=0x1008) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 10:07:53 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000700e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:07:53 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e61400006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:07:53 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x300}], 0x4801, 0x0) 10:07:53 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r0, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r0, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r2, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r2, 0x0) close(r2) 10:07:53 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f00000002c0)='systemem0md5sum$\x00', 0x0) ioctl$SIOCGIFHWADDR(r1, 0x8927, &(0x7f0000000100)) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r2, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, {0x4000001}, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000040)='coredump_filter\x00*\x0e\xc3=.\x13\xcbx\x95*\xeeX\x9fcy\xa49\xf6\x8f\x82^\x19\xa9\xcd+\b\x9f\xc6,\xa0\xf0\xff\x9dO\x06\xc9\x15\xda\xa4\x7fh\xd4\xe8C\xdeKUrR\xf4\x9c\x87\xee\xd2\xfb\xdfs\xd0G\x91\x02\x15Z\xa8\x1ad\xadY\x13\x14mg\xc9\x00\x16\xa4\xc48\x06u\x1e:\xd4Y?\xd8P\xe8reP\xffv\xd6\x12\x85N1\n\f\xb0\x1e\xe7\xffD\x1aS\xbf0\x80\xff\xff7V\xcc5\x96W\x14J\xe2\x93\xe3\xc6A7\xd8\xec\xb2m\xf5\x16-\x1b\xbd\x11\x1aYg\xe0\xa7\xd19\a') prctl$PR_SET_DUMPABLE(0x4, 0x0) r3 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x8, 0x2) setsockopt$netlink_NETLINK_NO_ENOBUFS(r3, 0x10e, 0x5, &(0x7f00000001c0)=0xffffffff, 0x4) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') [ 1564.490309][T30326] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 10:07:53 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r0, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r0, 0x0) socket$inet6(0xa, 0x80003, 0x6b) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r1, 0x0) close(r1) [ 1564.554531][T30325] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1564.567900][T30326] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1564.614840][T30325] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1564.634862][T30326] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1564.655295][T30325] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1564.711152][T30326] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 10:07:53 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x402}], 0x4801, 0x0) [ 1564.836772][T30325] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 10:07:53 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r0, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r0, 0x0) socket$inet6(0xa, 0x80003, 0x6b) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r1, 0x0) close(r1) 10:07:54 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = syz_open_dev$vcsu(&(0x7f0000000140)='/dev/vcsu#\x00', 0x800000000000, 0x80) ioctl(r2, 0x2, &(0x7f00000001c0)="864a10f8eac34daf507779929ad9cf7e4219c17b12a5816c6605fdb922088764c75e93010fedd117b4f48094a00d7316938af2ccfbc751bfdb500be90c111b80cca6a663cb54a03a1ae666315d71f77157679108dcf505b1cdfaa4d276878d3de5c6129f53") r3 = memfd_create(&(0x7f00000002c0)='systemem0md5sum$\x00', 0x0) ioctl$SIOCGIFHWADDR(r1, 0x8927, &(0x7f0000000100)) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r3, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, {0x4000001}, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000040)='coredump_filter\x00*\x0e\xc3=.\x13\xcbx\x95*\xeeX\x9fcy\xa49\xf6\x8f\x82^\x19\xa9\xcd+\b\x9f\xc6,\xa0\xf0\xff\x9dO\x06\xc9\x15\xda\xa4\x7fh\xd4\xe8C\xdeKUrR\xf4\x9c\x87\xee\xd2\xfb\xdfs\xd0G\x91\x02\x15Z\xa8\x1ad\xadY\x13\x14mg\xc9\x00\x16\xa4\xc48\x06u\x1e:\xd4Y?\xd8P\xe8reP\xffv\xd6\x12\x85N1\n\f\xb0\x1e\xe7\xffD\x1aS\xbf0\x80\xff\xff7V\xcc5\x96W\x14J\xe2\x93\xe3\xc6A7\xd8\xec\xb2m\xf5\x16-\x1b\xbd\x11\x1aYg\xe0\xa7\xd19\a') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 10:08:02 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') getdents64(r0, &(0x7f00000005c0)=""/153, 0x99) getdents64(r0, &(0x7f0000000000)=""/186, 0xba) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="5cccb4afa80e1fb2f283f85061dc209036b65b3fb15885060644fdf638524cd5d0fbec8573f66ce085a1665ea24deec880249e90997b04e57f0fd0c168c1587fafd6f3748a57775f4a12996b5279d144e1175778ff51a49fb9b38e11ad4c138f62d434cf453cd38ad5feb6c55deb653799cdc7904c8df662eea0519b5991d733d02c2e8869ce70b6ebd0aacdb222e665342d72d394"], 0x1) sendfile(r1, r1, &(0x7f0000000000), 0x0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$HCIINQUIRY(r0, 0x800448f0, &(0x7f0000000140)={r2, 0x2, 0x81, 0x3f, 0x1, 0x0, 0xad}) 10:08:02 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e63c00006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:08:02 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000200)=""/176, &(0x7f0000000300)=0xb0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x200, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x2) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f00000002c0)='systemem0md5sum$\x00', 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpu.stat\x00', 0x0, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x0) ioctl$SIOCGIFHWADDR(r3, 0x8927, &(0x7f0000000100)) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r2, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, {0x4000001}, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000040)='coredump_filter\x00*\x0e\xc3=.\x13\xcbx\x95*\xeeX\x9fcy\xa49\xf6\x8f\x82^\x19\xa9\xcd+\b\x9f\xc6,\xa0\xf0\xff\x9dO\x06\xc9\x15\xda\xa4\x7fh\xd4\xe8C\xdeKUrR\xf4\x9c\x87\xee\xd2\xfb\xdfs\xd0G\x91\x02\x15Z\xa8\x1ad\xadY\x13\x14mg\xc9\x00\x16\xa4\xc48\x06u\x1e:\xd4Y?\xd8P\xe8reP\xffv\xd6\x12\x85N1\n\f\xb0\x1e\xe7\xffD\x1aS\xbf0\x80\xff\xff7V\xcc5\x96W\x14J\xe2\x93\xe3\xc6A7\xd8\xec\xb2m\xf5\x16-\x1b\xbd\x11\x1aYg\xe0\xa7\xd19\a') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 10:08:02 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r0, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r0, 0x0) socket$inet6(0xa, 0x80003, 0x6b) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r1, 0x0) close(r1) 10:08:02 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000a00e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:08:02 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x403}], 0x4801, 0x0) 10:08:02 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r0, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r0, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x0, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r2, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r2, 0x0) close(r2) 10:08:02 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f00000002c0)='systemem0md5sum$\x00', 0x0) ioctl$SIOCGIFHWADDR(r1, 0x8927, &(0x7f0000000100)) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r2, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, {0x4000001}, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r4, &(0x7f0000000380)=ANY=[@ANYBLOB="2a3c9fd07d3b4618521f529b23881c1e88a99fc0b76ae9c95e783e5525a33432b1c7e42cf3ca8e1100c198e33a0c15c3c2843105e77e8bae2b5dabe0903533bd73ecdd6c3bac20110722e4d8ea82392f542d9b5dd8e0"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x0) r5 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r5, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r5, r5, &(0x7f0000000000), 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r6, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)={0x14, r7, 0x9e06a2c5f40bff55, 0x0, 0x0, {0xd}}, 0x14}}, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(r5, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x60000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x2c, r7, 0x581, 0x70bd27, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0x18, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000010}, 0x80) r8 = openat$cgroup_ro(r4, &(0x7f0000000240)='cpuacct.usage_all\x00', 0x0, 0x0) write$P9_RREADLINK(r8, &(0x7f0000000200)=ANY=[], 0x0) sendfile(r3, r3, &(0x7f0000000000), 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f00000001c0)=0xc) syz_open_procfs(r9, &(0x7f0000000040)='coredump_filter\x00*\x0e\xc3=.\x13\xcbx\x95*\xeeX\x9fcy\xa49\xf6\x8f\x82^\x19\xa9\xcd+\b\x9f\xc6,\xa0\xf0\xff\x9dO\x06\xc9\x15\xda\xa4\x7fh\xd4\xe8C\xdeKUrR\xf4\x9c\x87\xee\xd2\xfb\xdfs\xd0G\x91\x02\x15Z\xa8\x1ad\xadY\x13\x14mg\xc9\x00\x16\xa4\xc48\x06u\x1e:\xd4Y?\xd8P\xe8reP\xffv\xd6\x12\x85N1\n\f\xb0\x1e\xe7\xffD\x1aS\xbf0\x80\xff\xff7V\xcc5\x96W\x14J\xe2\x93\xe3\xc6A7\xd8\xec\xb2m\xf5\x16-\x1b\xbd\x11\x1aYg\xe0\xa7\xd19\a') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') [ 1573.929155][T30486] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1573.954738][T30486] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1573.971145][T30492] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1574.003744][T30492] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1574.022766][T30492] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock 10:08:03 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x404}], 0x4801, 0x0) 10:08:03 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r0, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r0, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x0, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r2, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r2, 0x0) close(r2) [ 1574.053558][T30486] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1574.070345][T30492] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 1574.137253][T30486] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 10:08:03 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e66300006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:08:03 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000140)='systemem0md5sum$\x00', 0x0) ioctl$SIOCGIFHWADDR(r1, 0x8927, &(0x7f0000000100)) prctl$PR_SET_TSC(0x1a, 0x1) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r2, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, {0x4000001}, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) socket$packet(0x11, 0x2, 0x300) syz_open_procfs(0x0, &(0x7f0000000040)='coredump_filter\x00*\x0e\xc3=.\x13\xcbx\x95*\xeeX\x9fcy\xa49\xf6\x8f\x82^\x19\xa9\xcd+\b\x9f\xc6,\xa0\xf0\xff\x9dO\x06\xc9\x15\xda\xa4\x7fh\xd4\xe8C\xdeKUrR\xf4\x9c\x87\xee\xd2\xfb\xdfs\xd0G\x91\x02\x15Z\xa8\x1ad\xadY\x13\x14mg\xc9\x00\x16\xa4\xc48\x06u\x1e:\xd4Y?\xd8P\xe8reP\xffv\xd6\x12\x85N1\n\f\xb0\x1e\xe7\xffD\x1aS\xbf0\x80\xff\xff7V\xcc5\x96W\x14J\xe2\x93\xe3\xc6A7\xd8\xec\xb2m\xf5\x16-\x1b\xbd\x11\x1aYg\xe0\xa7\xd19\a') stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') [ 1574.624726][T30736] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1574.646509][T30736] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1574.657434][T30736] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1574.689659][T30736] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 10:08:11 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r1, r1, &(0x7f0000000000), 0x0) getdents64(r1, &(0x7f0000000300)=""/139, 0x17a) getdents64(r0, &(0x7f0000000000)=""/186, 0xba) 10:08:11 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019001000e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:08:12 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f00000002c0)='systemem0md5sum$\x00', 0x0) ioctl$SIOCGIFHWADDR(r1, 0x8927, &(0x7f0000000100)) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r2, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, {0x4000001}, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000040)='coredump_filter\x00*\x0e\xc3=.\x13\xcbx\x95*\xeeX\x9fcy\xa49\xf6\x8f\x82^\x19\xa9\xcd+\b\x9f\xc6,\xa0\xf0\xff\x9dO\x06\xc9\x15\xda\xa4\x7fh\xd4\xe8C\xdeKUrR\xf4\x9c\x87\xee\xd2\xfb\xdfs\xd0G\x91\x02\x15Z\xa8\x1ad\xadY\x13\x14mg\xc9\x00\x16\xa4\xc48\x06u\x1e:\xd4Y?\xd8P\xe8reP\xffv\xd6\x12\x85N1\n\f\xb0\x1e\xe7\xffD\x1aS\xbf0\x80\xff\xff7V\xcc5\x96W\x14J\xe2\x93\xe3\xc6A7\xd8\xec\xb2m\xf5\x16-\x1b\xbd\x11\x1aYg\xe0\xa7\xd19\a') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x28) write$P9_RREADLINK(r3, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x800) ioctl$SNDRV_PCM_IOCTL_STATUS_EXT32(r3, 0xc06c4124, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}) 10:08:12 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x405}], 0x4801, 0x0) 10:08:12 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r0, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r0, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x0, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r2, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r2, 0x0) close(r2) 10:08:12 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e66d00006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:08:12 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r0, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r0, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r2, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r2, 0x0) close(r2) 10:08:12 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r2, r2, &(0x7f0000000000), 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0xf64) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = memfd_create(&(0x7f00000002c0)='systemem0md5sum$\x00', 0x0) ioctl$SIOCGIFHWADDR(r1, 0x8927, &(0x7f0000000100)) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r3, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, {0x4000001}, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000040)='coredump_filter\x00*\x0e\xc3=.\x13\xcbx\x95*\xeeX\x9fcy\xa49\xf6\x8f\x82^\x19\xa9\xcd+\b\x9f\xc6,\xa0\xf0\xff\x9dO\x06\xc9\x15\xda\xa4\x7fh\xd4\xe8C\xdeKUrR\xf4\x9c\x87\xee\xd2\xfb\xdfs\xd0G\x91\x02\x15Z\xa8\x1ad\xadY\x13\x14mg\xc9\x00\x16\xa4\xc48\x06u\x1e:\xd4Y?\xd8P\xe8reP\xffv\xd6\x12\x85N1\n\f\xb0\x1e\xe7\xffD\x1aS\xbf0\x80\xff\xff7V\xcc5\x96W\x14J\xe2\x93\xe3\xc6A7\xd8\xec\xb2m\xf5\x16-\x1b\xbd\x11\x1aYg\xe0\xa7\xd19\a') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') [ 1583.239372][T30773] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1583.249331][T30775] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1583.275406][T30773] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors 10:08:12 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r0, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r0, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r2, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r2, 0x0) close(r2) [ 1583.295426][T30775] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1583.308192][T30773] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1583.328887][T30773] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 10:08:12 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r0, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r0, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r2, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r2, 0x0) close(r2) [ 1583.390483][T30775] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1583.443400][T30775] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 10:08:12 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x406}], 0x4801, 0x0) 10:08:12 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r0, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r0, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f00000001c0)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r2, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r2, 0x0) close(r2) 10:08:18 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') getdents64(r0, &(0x7f00000005c0)=""/153, 0x99) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r1, r1, &(0x7f0000000000), 0x0) setsockopt(r1, 0x81, 0x1, &(0x7f00000000c0)="1923e391ae57780f20f13129bf0ea9225d0aa11d8a42", 0x16) r2 = getpgrp(0xffffffffffffffff) prlimit64(r2, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) syz_open_procfs(r2, &(0x7f00000000c0)='net/mcfilter\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0x0) lstat(&(0x7f0000000100)='./bus\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={r2, r3, r4}, 0xc) getdents64(r0, &(0x7f0000000000)=""/186, 0xba) 10:08:18 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x440100, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0xb4d6) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = memfd_create(&(0x7f00000002c0)='systemem0md5sum$\x00', 0x0) ioctl$SIOCGIFHWADDR(r1, 0x8927, &(0x7f0000000100)) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r3, 0x0) rt_sigaction(0xa, &(0x7f0000b4a000)={0xfffffffffffffffd, {0x4000001}, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r4, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x0) ioctl$USBDEVFS_REAPURBNDELAY(r4, 0x4008550d, &(0x7f0000000140)) syz_open_procfs(0x0, &(0x7f0000000040)='coredump_filter\x00*\x0e\xc3=.\x13\xcbx\x95*\xeeX\x9fcy\xa49\xf6\x8f\x82^\x19\xa9\xcd+\b\x9f\xc6,\xa0\xf0\xff\x9dO\x06\xc9\x15\xda\xa4\x7fh\xd4\xe8C\xdeKUrR\xf4\x9c\x87\xee\xd2\xfb\xdfs\xd0G\x91\x02\x15Z\xa8\x1ad\xadY\x13\x14mg\xc9\x00\x16\xa4\xc48\x06u\x1e:\xd4Y?\xd8P\xe8reP\xffv\xd6\x12\x85N1\n\f\xb0\x1e\xe7\xffD\x1aS\xbf0\x80\xff\xff7V\xcc5\x96W\x14J\xe2\x93\xe3\xc6A7\xd8\xec\xb2m\xf5\x16-\x1b\xbd\x11\x1aYg\xe0\xa7\xd19\a') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 10:08:18 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e64001006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:08:18 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r0, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r0, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f00000001c0)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r2, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r2, 0x0) close(r2) 10:08:18 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019001400e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1589.176520][ T26] audit: type=1800 audit(1576836498.256:77): pid=30914 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.4" name="bus" dev="sda1" ino=16731 res=0 10:08:18 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x407}], 0x4801, 0x0) 10:08:18 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r0, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r0, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f00000001c0)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r2, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r2, 0x0) close(r2) 10:08:18 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x80000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$vhci(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhci\x00', 0x240) memfd_create(&(0x7f0000000340)='eth0\x00', 0x0) ioctl$SIOCGIFHWADDR(r1, 0x8927, &(0x7f0000000100)) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r2, r2, &(0x7f0000000000), 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x8, 0x11, r2, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, {0x4000001}, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0xa083000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r3, 0x2, 0x70bd25, 0x25dfdbff, {}, ["", ""]}, 0x1c}}, 0x800) syz_open_procfs(0x0, &(0x7f0000000040)='coredump_filter\x00*\x0e\xc3=.\x13\xcbx\x95*\xeeX\x9fcy\xa49\xf6\x8f\x82^\x19\xa9\xcd+\b\x9f\xc6,\xa0\xf0\xff\x9dO\x06\xc9\x15\xda\xa4\x7fh\xd4\xe8C\xdeKUrR\xf4\x9c\x87\xee\xd2\xfb\xdfs\xd0G\x91\x02\x15Z\xa8\x1ad\xadY\x13\x14mg\xc9\x00\x16\xa4\xc48\x06u\x1e:\xd4Y?\xd8P\xe8reP\xffv\xd6\x12\x85N1\n\f\xb0\x1e\xe7\xffD\x1aS\xbf0\x80\xff\xff7V\xcc5\x96W\x14J\xe2\x93\xe3\xc6A7\xd8\xec\xb2m\xf5\x16-\x1b\xbd\x11\x1aYg\xe0\xa7\xd19\a') bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000002c0)={0xc0, 0x2}, 0xc) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 10:08:18 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r0, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r0, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0b") r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r2, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r2, 0x0) close(r2) [ 1589.457385][T31038] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1589.481706][T31039] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1589.495398][T31039] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1589.545475][T31038] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1589.556730][T31039] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1589.626349][T31039] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 1589.640097][T31038] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock 10:08:18 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x500}], 0x4801, 0x0) 10:08:18 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r0, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r0, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0b") r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r2, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r2, 0x0) close(r2) [ 1589.740252][T31038] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 10:08:18 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r0, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r0, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0b") r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r2, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r2, 0x0) close(r2) 10:08:25 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') getdents64(r0, &(0x7f00000005c0)=""/153, 0x99) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r1, r1, &(0x7f0000000000), 0x0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r2, r2, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f00000010c0)={{{@in6=@mcast2, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@remote}}, &(0x7f00000011c0)=0xe8) sendmmsg$inet(r1, &(0x7f0000001300)=[{{&(0x7f0000000040)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10, &(0x7f00000008c0)=[{&(0x7f0000000080)="1b64ff111a2a49", 0x7}, {&(0x7f0000000200)="1c227830cf73c7e19a83dd40b14a9f174f1819b817912ce442121f44230c635c23c3206f7a5555b7ea3ea8c03a6badff2a33983585aa108bc50e604066621f71db2c35024ab67122730812c6fb940d9a8419623734a17855f2c80326115e3d2f5adb4ea81d39b8ef8be7aa11dbd176945c142c8ca3ce2ba00555513a6dc25904cfcfd5a0bd35665c5312266c31284d232d0a0da7526978d5ea5a2b2dcecee7e18ce7b2b968182fd9a51e85f922b476f1bdff49389f1cf4420516dc1ae3d95e6d", 0xc0}, {&(0x7f00000002c0)="5dc9429764ef4673b581272107d7074fd5f970ca4d0dd24498ffa69691813f260a1789f623bc864b232bc3b4ec3d7b14994618d54cff5b99fd8e60f3953003ccf4c9f7b474b1d5947013474fe2149661630ccd40a1860f63bbd78ab73b9dfb7dcdc340688ea08beae4dce08a3c1af513885220a717f58f18ca232d29092b5e01d202480b", 0x84}, {&(0x7f0000000380)="6234ea18ed6c74a543", 0x9}, {&(0x7f0000000440)="ab56286505095e63921aa4b11eec62c211fea76a1f535e885ce7b8d0427771545f38b76aded4d9e9156fbe07cfb7b82e50d2dbab3d2d06d525014c20e37dd5936cd71a68dcf41284943d4e1af0d32e35033b36862dbf9e7ee367926bbb18b8", 0x5f}, {&(0x7f00000004c0)="8e9e101a72d1fd55953314717fc9d1eb6a7b7a98d86bc5b8767a48252b9bb31aa7f36461aecc12f789a260d80bd71ffc03687e20a5f900c75fef878968e8d645d5303101f73bab3cb5e4ee65ae99b767d35c9dbadb057c1780d2c01eb42a471b8572dfbb03872066c9450f91a63d2ae7a44be8729eb0dcc0a95107ce487b38c8809928c1bbc11d", 0x87}, {&(0x7f0000000580)="476dae1f5c07303dfd34ec973f67cc352377", 0x12}, {&(0x7f0000000680)="0bef0d34ab3290d80a8eecd612d7434046d905a6b754fe7be132bd69367e8fa75410c7af425fc1e580aad83fbccdc60b4a77602b193f86e93fa3573c5561c9b916e03beca3902547012e81222d3447b6e0df2c2fd7881f1e1957b1512474a68af5033aad3e1edcad3d42e113d95271b2b76e39afecece8665a6ac2bfb83faa6ad740bbb6e75b316f95884c1b065a92f7072dce5f9689fbf03f01964ab34183ad0a562e964cee8ddb8cae12a8f0", 0xad}, {&(0x7f0000000740)="7b645b2953b66d2c683bfe1d8d81a3dbbc7daf7780933a72ad7e042f8a614b8e3762f92861e2248ff86e191b0802708a38b9e9e4e81935415effd05b1f573f9ff44fcbbc53846fad5b5425ab8d86836c5b63c93a8c94df2c706a982aec6f8e925ee0837d48f38172eda1f050e3df17e5c7553dc17d410b3a18dcb08b2c76e61e47dffbab8b23eafd0075bd6192dd75de01d98f2b4f46698f149ea4293f9e6ca7ac1f4370d7bc7e92bba671e59e8ddf9dde45e5368d3b1a39c3ca759db4e785a531", 0xc1}], 0x9, &(0x7f0000000840)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x2}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x31}}], 0x30}}, {{&(0x7f0000000980)={0x2, 0x4e21, @empty}, 0x10, &(0x7f0000000bc0)=[{&(0x7f00000009c0)="e9bcbd8033bcb56bcaf099c769126f0ac3711a1e393f59f26978e844bee49184ee34cad2f46ef76a2a61b2ce1f501974769b25b3c3c29c506f9c57538e4637f8484fec59f2e928c6295b261466362ac75ad62df41c189bcff126e0216d8ea1370989e219fca14d875ac4072d85752480cdb48e2fab633f428a5a273deb3f", 0x7e}, {&(0x7f0000000a40)="169211f6ac422bb7de17b6aa17d0c03f80cf14e83c32b081f6200aff8a133eaf5f2e1ecce369e47ed4a8aeaf9ee108bc664c41c30e12bd2b10b2397c0e3ed7c317e686d15c4ac21c035d4b7796b954efa267958821a87c83bce2ce2677e4ec9c8a8bb7fc6b8134ab1c448edab6f80f66edccadfb6d3f4e41264b39fc21cb4d664d0fbf41", 0x84}, {&(0x7f0000000b00)="8eda41a1a65d806f2279e20481613ed899fe374fa7483e9ee14b91393790f0ab16dd1f723ac21e3ec20c10780f374f0b437dd365858e8ac86162848b0e2d855c09af47c22acf01eee0a3815bee7a3643cc84ed1e1c93058a5de4d21e341eafe58232a98d2cc4bc3784f816bda6abb3f677fb5cc8a8e9d04ed38322bb98e7625dd00bfd03fa68ef2f81175005be75b172b6182aa6ed0c11f92221a55e0c56", 0x9e}], 0x3, &(0x7f0000000c00)=[@ip_tos_int={{0x14, 0x0, 0x1, 0xdb1}}], 0x18}}, {{&(0x7f0000000c40)={0x2, 0x4e20, @local}, 0x10, &(0x7f0000001040)=[{&(0x7f0000000c80)="41d5f99c1733be4bb2941f94e0d8796458f612f73cf474af8b92efa9581a379ce224d9822911f95f63d3c8967bb4a569de96c5cfd91c0c61220262d6bab1a39a89d7caad712ba0e01e9b293bd6b1f69cadb79fd4e0a0a6dd2c46e9", 0x5b}, {&(0x7f0000000d00)="f046def775c027d3237727ded52eed2e742c1d66cafc02068e5ffd63c4a499e5ab498a87d3df1ebba990712f7dcfa7db98513764ddb16f67fed4f03fc407ae4eeaab9d23b417a4e60033664c56308c9dc8fc77030b5d8d10195e6a776871bd48aa6b4eca0b2c9e15de582ac97b19c25e47eaf937e57e3538d1f9285f8c493260377e6d7042efe63cdbcddc2d91dc18d36bd04f16c176a725477499a5d43ae3f0", 0xa0}, {&(0x7f0000000dc0)="e39111cb530e890a03", 0x9}, {&(0x7f0000000e00)="7e3752ea70815cdc5abe1872ef7f5e4ce15c8ff669edbf3967ac53c7423c077a1859b76bf70c15b5da93ef806dd352a9ba640598fd62a938bd9ae109d1b200b7c26d0ae7cb9ad9c02e57b09357183779ae750d833388fb1ea3bcaa3b78bd7f071a8f93ae73809668a457df59f6044c12d9caffb8d463367d36b2aaa38b3e7a9ca94b98153783411e6cfdcfdbab2c9f9af542e660f6a5d82d0ef6d81692e621881d70638da2a516557c80ff6bb6f49e6e2b7f148db03b9c4d3926f77dddb12a8ffb0bb77bc7da427c", 0xc8}, {&(0x7f0000000f00)="2b904f0aa38bc0a96f8545130391418141ea8a5b4a2041db00c95fbd25290960bafa4a24e1a33050a26e4be0268da87a1e27d299f61a747498c78a3cc4c1cb0ae5d3ab838e1652ba74a60969bf392aca1575eae74d7c6273dffc27", 0x5b}, {&(0x7f0000000f80)="1dc47e6d304818733a7b5dc904636b039317572cb08cc5a1e02d9a087a2f5efec070f55274b06a551eaedfe167b20d7e790944b2ecf810f312cd03952ac4f09352483c2b2116993eb672b787f6aaa86203bab3228c7f00b843a8957ea43c528a97d4ad0562f82c4043d570e0e5f46cbe4c1b6a05e603509092ef9dffca8679d3ec221fffe0acc178644f5b0363cdea78f3a7dd40e4e1cce3579d7b58ad3da2db98245a42814b0f3b45953f4f", 0xac}], 0x6, &(0x7f0000001200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @dev={0xac, 0x14, 0x14, 0x17}, @loopback}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x81}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x2}}, @ip_ttl={{0x14, 0x0, 0x2, 0x3}}, @ip_retopts={{0x68, 0x0, 0x7, {[@end, @timestamp={0x44, 0xc, 0x8, 0x1, 0xe, [{[], 0x7}, {[], 0x1ff}]}, @end, @ra={0x94, 0x6, 0x8}, @noop, @noop, @end, @cipso={0x86, 0x1c, 0x3, [{0x7, 0xb, "b8eb0e79e9ca5107d0"}, {0x0, 0xb, "5d098f7b8b9992a791"}]}, @timestamp={0x44, 0x24, 0x4, 0x3, 0x3, [{[@rand_addr=0xa499], 0x5196}, {[], 0x8}, {[@dev={0xac, 0x14, 0x14, 0x25}], 0xef4}, {[], 0x2}, {[@multicast1], 0x5}]}, @end]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}], 0xe8}}], 0x3, 0x40010) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/bsg\x00', 0x800, 0x0) getdents64(r4, &(0x7f0000000100)=""/185, 0xffffffffffffff67) 10:08:25 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x600}], 0x4801, 0x0) 10:08:25 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e67903006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:08:25 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r0, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r0, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe847") r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r2, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r2, 0x0) close(r2) 10:08:25 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SMI(r0, 0xaeb7) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000140)=r2) r3 = memfd_create(&(0x7f00000002c0)='systemem0md5sum$\x00', 0x0) ioctl$SIOCGIFHWADDR(r2, 0x8927, &(0x7f0000000100)) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r3, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, {0x4000001}, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000040)='coredump_filter\x00*\x0e\xc3=.\x13\xcbx\x95*\xeeX\x9fcy\xa49\xf6\x8f\x82^\x19\xa9\xcd+\b\x9f\xc6,\xa0\xf0\xff\x9dO\x06\xc9\x15\xda\xa4\x7fh\xd4\xe8C\xdeKUrR\xf4\x9c\x87\xee\xd2\xfb\xdfs\xd0G\x91\x02\x15Z\xa8\x1ad\xadY\x13\x14mg\xc9\x00\x16\xa4\xc48\x06u\x1e:\xd4Y?\xd8P\xe8reP\xffv\xd6\x12\x85N1\n\f\xb0\x1e\xe7\xffD\x1aS\xbf0\x80\xff\xff7V\xcc5\x96W\x14J\xe2\x93\xe3\xc6A7\xd8\xec\xb2m\xf5\x16-\x1b\xbd\x11\x1aYg\xe0\xa7\xd19\a') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 10:08:25 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019002d00e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:08:25 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r0, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r0, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe847") r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r2, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r2, 0x0) close(r2) 10:08:25 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) memfd_create(&(0x7f00000002c0)='systemem0md5sum$\x00', 0x0) ioctl$SIOCGIFHWADDR(r1, 0x8927, &(0x7f0000000100)) accept4$alg(r1, 0x0, 0x0, 0x80000) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x800008, 0x100010, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, {0x4000001}, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000040)='coredump_filter\x00*\x0e\xc3=.\x13\xcbx\x95*\xeeX\x9fcy\xa49\xf6\x8f\x82^\x19\xa9\xcd+\b\x9f\xc6,\xa0\xf0\xff\x9dO\x06\xc9\x15\xda\xa4\x7fh\xd4\xe8C\xdeKUrR\xf4\x9c\x87\xee\xd2\xfb\xdfs\xd0G\x91\x02\x15Z\xa8\x1ad\xadY\x13\x14mg\xc9\x00\x16\xa4\xc48\x06u\x1e:\xd4Y?\xd8P\xe8reP\xffv\xd6\x12\x85N1\n\f\xb0\x1e\xe7\xffD\x1aS\xbf0\x80\xff\xff7V\xcc5\x96W\x14J\xe2\x93\xe3\xc6A7\xd8\xec\xb2m\xf5\x16-\x1b\xbd\x11\x1aYg\xe0\xa7\xd19\a') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 10:08:25 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f00000002c0)='systemem0md5sum$\x00', 0x0) ioctl$SIOCGIFHWADDR(r1, 0x8927, &(0x7f0000000100)) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x0) r4 = add_key(&(0x7f0000000140)='logon\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f0000000300)="a864ae9f6aeda5f70dcc957d825d54c202879291de819ea3b550aa34cf2ab1c0193d5cbce0a6631c55db87ee82c0d756963c44c3fb3c1200103a0000e4304c7692c28055083b18e7fe4e1963c3dfba0b47e588caff6f19f522dcf096eaac608b5b46667b12b77994510a73f4643a2f49f39a3abc583d8cbaf797f561f852bcf6553fd781bc28a17f9489e2b8ec5ed013618cae44ec42d9cf5aeb5908ca15dc240668a71cbe766ddbcb0ba34a105b9c772ef8e6802ac085eadf7f089441133245e22028fc40a3abfe9ec792a59ba51055083a0de51c68f880d63dc505b21f0c29a7a39a8979", 0xe5, 0xfffffffffffffffd) keyctl$assume_authority(0x10, r4) ioctl$KVM_PPC_GET_PVINFO(r3, 0x4080aea1, &(0x7f0000000440)=""/144) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r2, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, {0x4000001}, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000040)='coredump_filter\x00*\x0e\xc3=.\x13\xcbx\x95*\xeeX\x9fcy\xa49\xf6\x8f\x82^\x19\xa9\xcd+\b\x9f\xc6,\xa0\xf0\xff\x9dO\x06\xc9\x15\xda\xa4\x7fh\xd4\xe8C\xdeKUrR\xf4\x9c\x87\xee\xd2\xfb\xdfs\xd0G\x91\x02\x15Z\xa8\x1ad\xadY\x13\x14mg\xc9\x00\x16\xa4\xc48\x06u\x1e:\xd4Y?\xd8P\xe8reP\xffv\xd6\x12\x85N1\n\f\xb0\x1e\xe7\xffD\x1aS\xbf0\x80\xff\xff7V\xcc5\x96W\x14J\xe2\x93\xe3\xc6A7\xd8\xec\xb2m\xf5\x16-\x1b\xbd\x11\x1aYg\xe0\xa7\xd19\a') prctl$PR_SET_DUMPABLE(0x4, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400)=0x0) syz_open_procfs(r5, &(0x7f0000000180)='ch\x01\x00\x00\x00en\x00') [ 1596.827572][T31188] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1596.837560][T31188] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1596.853136][T31188] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1596.884997][T31188] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 10:08:26 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r0, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r0, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe847") r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r2, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r2, 0x0) close(r2) 10:08:26 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r0, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r0, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe84740") r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r2, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r2, 0x0) close(r2) [ 1597.038160][T31295] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 10:08:26 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r0, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r0, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe84740") r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r2, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r2, 0x0) close(r2) [ 1597.114984][T31295] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1597.185441][T31295] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1597.239178][T31295] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 10:08:34 executing program 4: setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0), 0x1) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r1, r1, &(0x7f0000000000), 0x0) r2 = accept4$bt_l2cap(r1, &(0x7f0000000180), &(0x7f0000000200)=0xe, 0x100000) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f0000000240)=0x7ff) getdents64(r0, &(0x7f00000005c0)=""/153, 0x99) getdents64(r0, &(0x7f0000000000)=""/186, 0xba) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) ioctl$KVM_DEASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae75, &(0x7f0000000280)={0x8000, 0x0, 0x100, 0x4}) sendfile(r3, r3, &(0x7f0000000000), 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000100)={0x2, [0x0, 0x0]}, &(0x7f0000000140)=0xc) 10:08:34 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x700}], 0x4801, 0x0) 10:08:34 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f00000002c0)='systemem0md5sum$\x00', 0x0) ioctl$SIOCGIFHWADDR(r1, 0x8927, &(0x7f0000000100)) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, {0x4000001}, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000040)='coredump_filter\x00*\x0e\xc3=.\x13\xcbx\x95*\xeeX\x9fcy\xa49\xf6\x8f\x82^\x19\xa9\xcd+\b\x9f\xc6,\xa0\xf0\xff\x9dO\x06\xc9\x15\xda\xa4\x7fh\xd4\xe8C\xdeKUrR\xf4\x9c\x87\xee\xd2\xfb\xdfs\xd0G\x91\x02\x15Z\xa8\x1ad\xadY\x13\x14mg\xc9\x00\x16\xa4\xc48\x06u\x1e:\xd4Y?\xd8P\xe8reP\xffv\xd6\x12\x85N1\n\f\xb0\x1e\xe7\xffD\x1aS\xbf0\x80\xff\xff7V\xcc5\x96W\x14J\xe2\x93\xe3\xc6A7\xd8\xec\xb2m\xf5\x16-\x1b\xbd\x11\x1aYg\xe0\xa7\xd19\a') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 10:08:34 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e62804006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:08:34 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r0, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r0, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe84740") r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r2, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r2, 0x0) close(r2) 10:08:34 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019003c00e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:08:35 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000200)={@multicast1, @multicast2}, &(0x7f0000000240)=0x8) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="f881df3e85ff37d704"], 0x1) sendfile(r2, r2, &(0x7f0000000000), 0x0) getsockopt$CAN_RAW_JOIN_FILTERS(r2, 0x65, 0x6, &(0x7f0000000140), &(0x7f00000001c0)=0x4) r3 = memfd_create(&(0x7f00000002c0)='systemem0md5sum$\x00', 0x0) ioctl$SIOCGIFHWADDR(r1, 0x8927, &(0x7f0000000100)) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r3, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, {0x4000001}, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000040)='coredump_filter\x00*\x0e\xc3=.\x13\xcbx\x95*\xeeX\x9fcy\xa49\xf6\x8f\x82^\x19\xa9\xcd+\b\x9f\xc6,\xa0\xf0\xff\x9dO\x06\xc9\x15\xda\xa4\x7fh\xd4\xe8C\xdeKUrR\xf4\x9c\x87\xee\xd2\xfb\xdfs\xd0G\x91\x02\x15Z\xa8\x1ad\xadY\x13\x14mg\xc9\x00\x16\xa4\xc48\x06u\x1e:\xd4Y?\xd8P\xe8reP\xffv\xd6\x12\x85N1\n\f\xb0\x1e\xe7\xffD\x1aS\xbf0\x80\xff\xff7V\xcc5\x96W\x14J\xe2\x93\xe3\xc6A7\xd8\xec\xb2m\xf5\x16-\x1b\xbd\x11\x1aYg\xe0\xa7\xd19\a') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 10:08:35 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r0, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r0, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r2, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r2, 0x0) close(r2) [ 1606.125229][T31563] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1606.165444][T31563] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors 10:08:35 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x2000}], 0x4801, 0x0) [ 1606.315466][T31563] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1606.330551][T31555] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1606.343771][T31563] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 1606.370948][T31555] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1606.433266][T31555] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1606.472703][T31555] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 10:08:35 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r0, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r0, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r2, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r2, 0x0) close(r2) 10:08:35 executing program 5: prctl$PR_SVE_SET_VL(0x32, 0x7c74) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r1, r1, &(0x7f0000000000), 0x0) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000000140)={0x7fffffff, 0x0, &(0x7f0000000300)="6e1b9c78f1e20f9275fa0dec3223be1e20e6c412ab2dc1fed5c0662195f352aa918d3bd40a13680491c224e5d8fd57ed6bcc0e473417d4d5530aa2664871536e991af1cce64179239891f0d17637ee550e98cd7acd1cc05676d588ac22b39c0a5944ba1fefc4d4b99283e51554690bbc32da449f46bf5226eac1db8e956758e92e69b2023559432d193e207705e38976fb7eae98d245370c1e27914a21964fd03424c0801bad2195c1493d83a6a6ef029d9e742bcdd848b99717b97f9b3464b0174e6f7c692b89606fef312c186cede792b399ceddd09ff6feabbfb37432ce26ef1433253d30ba2b0de7d7d2b9b5c9ab6025a4ccfb", &(0x7f0000000200)="427d01de61fec749589cd6505ec29ff2912de4c64d446f4c7f143d234a3274946fe4df380d214ea67690cff8168009d6aefe7f047700535d5cd5ad1c760abb3de4", 0xf5, 0x41}) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = memfd_create(&(0x7f00000002c0)='systemem0md5sum$\x00', 0x0) ioctl$SIOCGIFHWADDR(r2, 0x8927, &(0x7f0000000100)) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r4, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x0) r5 = semget$private(0x0, 0x2000000010a, 0x0) semctl$SETALL(r5, 0x0, 0x10, 0x0) semctl$IPC_RMID(r5, 0x0, 0x0) fsmount(r4, 0x1, 0x4) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x4000010, r3, 0x4000) rt_sigaction(0x3, &(0x7f0000b4a000)={0xfffffffffffffffd, {0x4000000}, 0x0, 0x0}, 0x0, 0x6e, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000040)='coredump_filter\x00*\x0e\xc3=.\x13\xcbx\x95*\xeeX\x9fcy\xa49\xf6\x8f\x82^\x19\xa9\xcd+\b\x9f\xc6,\xa0\xf0\xff\x9dO\x06\xc9\x15\xda\xa4\x7fh\xd4\xe8C\xdeKUrR\xf4\x9c\x87\xee\xd2\xfb\xdfs\xd0G\x91\x02\x15Z\xa8\x1ad\xadY\x13\x14mg\xc9\x00\x16\xa4\xc48\x06u\x1e:\xd4Y?\xd8P\xe8reP\xffv\xd6\x12\x85N1\n\f\xb0\x1e\xe7\xffD\x1aS\xbf0\x80\xff\xff7V\xcc5\x96W\x14J\xe2\x93\xe3\xc6A7\xd8\xec\xb2m\xf5\x16-\x1b\xbd\x11\x1aYg\xe0\xa7\xd19\a') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') r6 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r6, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r6, r6, &(0x7f0000000000), 0x0) writev(r6, &(0x7f0000000280), 0x0) 10:08:35 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e62a04006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1606.937607][T31808] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1606.947915][T31808] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1606.959180][T31808] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1606.980916][T31808] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 10:08:42 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') getdents64(r0, &(0x7f00000005c0)=""/153, 0x99) getdents64(r0, &(0x7f0000000000)=""/186, 0xba) r1 = socket$tipc(0x1e, 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r1, 0x8983, &(0x7f0000000240)) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) socket(0x9, 0x5, 0x81) ioctl$sock_rose_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000bc0)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x400, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bpq0='bpq0\x00', 0x6, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}) sendfile(r2, r2, &(0x7f0000000000), 0x0) io_setup(0x4, &(0x7f0000000100)=0x0) io_cancel(r3, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x2, 0x1000, 0xffffffffffffffff, &(0x7f0000000c40)="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", 0x1000, 0x2, 0x0, 0x2}, &(0x7f0000000180)) lseek(r2, 0x7ff, 0x4) ioctl$BLKPBSZGET(r0, 0x127b, &(0x7f00000000c0)) 10:08:42 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019006d00e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:08:42 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x4000}], 0x4801, 0x0) 10:08:42 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r0, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r0, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r2, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r2, 0x0) close(r2) 10:08:42 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f00000002c0)='systemem0md5sum$\x00', 0x0) ioctl$SIOCGIFHWADDR(r1, 0x8927, &(0x7f0000000100)) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r2, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, {0x4000001}, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000001c0), 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='coredump_filter\x00*\x0e\xc3=.\x13\xcbx\x95*\xeeX\x9fcy\xa49\xf6\x8f\x82^\x19\xa9\xcd+\b\x9f\xc6,\xa0\xf0\xff\x9dO\x06\xc9\x15\xda\xa4\x7fh\xd4\xe8C\xdeKUrR\xf4\x9c\x87\xee\xd2\xfb\xdfs\xd0G\x91\x02\x15Z\xa8\x1ad\xadY\x13\x14mg\xc9\x00\x16\xa4\xc48\x06u\x1e:\xd4Y?\xd8P\xe8reP\xffv\xd6\x12\x85N1\n\f\xb0\x1e\xe7\xffD\x1aS\xbf0\x80\xff\xff7V\xcc5\x96W\x14J\xe2\x93\xe3\xc6A7\xd8\xec\xb2m\xf5\x16-\x1b\xbd\x11\x1aYg\xe0\xa7\xd19\a') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='\x00\x00\x00\x00\x00') 10:08:42 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e62b04006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:08:42 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r0, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r0, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x0, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r2, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r2, 0x0) close(r2) 10:08:42 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x10000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f00000002c0)='systemem0md5sum$\x00', 0x0) ioctl$SIOCGIFHWADDR(r1, 0x8927, &(0x7f0000000100)) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r2, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, {0x4000001}, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000040)='coredump_filter\x00*\x0e\xc3=.\x13\xcbx\x95*\xeeX\x9fcy\xa49\xf6\x8f\x82^\x19\xa9\xcd+\b\x9f\xc6,\xa0\xf0\xff\x9dO\x06\xc9\x15\xda\xa4\x7fh\xd4\xe8C\xdeKUrR\xf4\x9c\x87\xee\xd2\xfb\xdfs\xd0G\x91\x02\x15Z\xa8\x1ad\xadY\x13\x14mg\xc9\x00\x16\xa4\xc48\x06u\x1e:\xd4Y?\xd8P\xe8reP\xffv\xd6\x12\x85N1\n\f\xb0\x1e\xe7\xffD\x1aS\xbf0\x80\xff\xff7V\xcc5\x96W\x14J\xe2\x93\xe3\xc6A7\xd8\xec\xb2m\xf5\x16-\x1b\xbd\x11\x1aYg\xe0\xa7\xd19\a') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 10:08:42 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r0, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r0, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x0, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r2, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r2, 0x0) close(r2) 10:08:42 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r0, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r0, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x0, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r2, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r2, 0x0) close(r2) [ 1613.555162][T31944] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1613.608661][T31828] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1613.667635][T31828] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1613.678710][T31944] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors 10:08:42 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r0, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r0, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, 0x0, 0x0) bind$inet(r2, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r2, 0x0) close(r2) 10:08:42 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x8800000}], 0x4801, 0x0) [ 1613.741969][T31944] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1613.751627][T31828] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1613.795931][T31828] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 1613.846824][T31944] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 10:08:51 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') getdents64(r0, &(0x7f00000005c0)=""/153, 0x99) getdents64(r0, &(0x7f0000000000)=""/186, 0xba) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r1, r1, &(0x7f0000000000), 0x0) setsockopt$netlink_NETLINK_RX_RING(r1, 0x10e, 0x6, &(0x7f00000000c0)={0x6, 0xffff, 0xff, 0xc50}, 0x10) 10:08:51 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000200)='coredump_filter\x00*\x0e\xc3=.\x13\xcbx\x95*\xeeX\x9fcy\xa49\xf6\x8f\x82^\x19\xa9\xcd+\b\x9f\xc6,\xa0\xf0\xff\x9dO\x06\xc9\x15\xda\xa4\x7fh\xd4\xe8C\xdeKZ\xa8\x1ad\xadY\x13\x14mg\xc9\x00\x16\xa4\xc48\x06u\x1e:\xd4Y?\xd8P\xe8reP\xffv\xd6\x12\x85N1\n\f\xb0\x1e\xe7\xffD\x1aS\xbf0\x80\xff\xff7V\xcc5\x96W\x14J\xe2\x93\xe3\xc6A7\xd8\xec\xb2m\xf5\x16-\x1b\xbd\x11\x1aYg\xe0\xa7\xd19\a\x00'/160, 0x1) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000880)=ANY=[@ANYBLOB='*'], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r4, &(0x7f0000000100)=ANY=[@ANYBLOB="ab6dd7138f942260801eb0a662d47ac555a09679cb20045a4175c1357157755d195b147fb096f51702d19e438ad5b1a8fda8d9842756"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x0) r5 = dup(r4) ioctl$SIOCGIFHWADDR(r5, 0x8927, &(0x7f00000002c0)) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r2, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, {0x4000001}, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000040)='coredump_filter\x00*\x0e\xc3=.\x13\xcbx\x95*\xeeX\x9fcy\xa49\xf6\x8f\x82^\x19\xa9\xcd+\b\x9f\xc6,\xa0\xf0\xff\x9dO\x06\xc9\x15\xda\xa4\x7fh\xd4\xe8C\xdeKUrR\xf4\x9c\x87\xee\xd2\xfb\xdfs\xd0G\x91\x02\x15Z\xa8\x1ad\xadY\x13\x14mg\xc9\x00\x16\xa4\xc48\x06u\x1e:\xd4Y?\xd8P\xe8reP\xffv\xd6\x12\x85N1\n\f\xb0\x1e\xe7\xffD\x1aS\xbf0\x80\xff\xff7V\xcc5\x96W\x14J\xe2\x93\xe3\xc6A7\xd8\xec\xb2m\xf5\x16-\x1b\xbd\x11\x1aYg\xe0\xa7\xd19\a') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 10:08:51 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r0, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r0, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, 0x0, 0x0) bind$inet(r2, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r2, 0x0) close(r2) 10:08:51 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x7fffffffffffffff}], 0x4801, 0x0) 10:08:51 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e62c04006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:08:51 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="80000000380400001900c003e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:08:51 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r0, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r0, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, 0x0, 0x0) bind$inet(r2, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r2, 0x0) close(r2) 10:08:52 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4802, 0x0) [ 1622.937127][T32105] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1622.974875][T32104] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1623.005379][T32105] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors 10:08:52 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r0, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r0, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000016ffc), 0x4) bind$inet(r2, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r2, 0x0) close(r2) [ 1623.075420][T32104] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1623.105161][T32105] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1623.117470][T32104] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1623.161879][T32104] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 10:08:52 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4803, 0x0) [ 1623.214604][T32105] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 10:08:52 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r0, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r0, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000016ffc), 0x4) bind$inet(r2, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r2, 0x0) close(r2) 10:08:52 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000302e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1623.724877][T32142] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1623.765590][T32142] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1623.785445][T32142] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1623.829649][T32142] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 10:09:00 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') getdents64(r0, &(0x7f00000005c0)=""/153, 0x99) getdents64(r0, &(0x7f0000000000)=""/186, 0xba) open(&(0x7f00000000c0)='./file0\x00', 0x40080, 0x4) 10:09:00 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r0, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r0, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000016ffc), 0x4) bind$inet(r2, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r2, 0x0) close(r2) 10:09:00 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e62d04006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:09:00 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4804, 0x0) 10:09:00 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x0) r4 = accept$unix(r3, &(0x7f0000001940)=@abs, &(0x7f00000019c0)=0x6e) r5 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r5, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r5, r5, &(0x7f0000000000), 0x0) r6 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r6, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r6, r6, &(0x7f0000000000), 0x0) pipe2(&(0x7f0000001b40)={0xffffffffffffffff, 0xffffffffffffffff}, 0xb4edff2104ce894f) r8 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x5) write$P9_RREADLINK(r8, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r8, r8, &(0x7f0000000000), 0x0) r9 = eventfd2(0xffffd94c, 0x80801) r10 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r10, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r10, r10, &(0x7f0000000000), 0x0) r11 = epoll_create1(0x40000) r12 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r12, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r12, r12, &(0x7f0000000000), 0x0) r13 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r13, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r13, r13, &(0x7f0000000000), 0x0) r14 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/dlm-monitor\x00', 0x400000, 0x0) r15 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r15, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r15, r15, &(0x7f0000000000), 0x0) r16 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r16, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r16, r16, &(0x7f0000000000), 0x0) r17 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r17, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r17, r17, &(0x7f0000000000), 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, &(0x7f0000001bc0)={0x1, 0x6, 0x0, 0x0, r17}) r19 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r19, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r19, r19, &(0x7f0000000000), 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001e80), &(0x7f0000001ec0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r20, 0x0) r21 = socket$packet(0x11, 0x2, 0x300) getsockopt$sock_cred(r21, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0xc) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000002380)={{0x0, 0x0, r22, 0xffffffffffffffff}}) r23 = getpid() rt_tgsigqueueinfo(r23, r23, 0x16, &(0x7f0000000100)) ptrace(0x10, r23) ptrace$pokeuser(0x6, r23, 0x388, 0xffffffffffffffff) lstat(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000001fc0)='./file0\x00', &(0x7f0000002000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r26 = fcntl$getown(0xffffffffffffffff, 0x9) io_setup(0x8, &(0x7f0000000280)=0x0) r28 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) io_submit(r27, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r28, 0x0, 0x0, 0x200, 0x0, 0x1}]) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) r30 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r30, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x3}, 0x4) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x8888, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRESHEX=r28, @ANYBLOB="2c726f6f746d6f64653f30303030303030303030303030303030fd0034303030202c65725f69643da0eeb119a266777b39b23b2c7e448c8bca65a257474332e95588ff4b0ae83d8e4a2489c1833dfb5ea28429ff7c39ca9f5b5bfb347faff1f6478a46b897ac3ac6b2cc1b7b600bf4a8dc853afe30541f32c8b485883165b5c46b982d13e11aeae6ddbda0e29c76630000cf7b4f7d8c1d25db1d3dbb3f730f952a8d13df7aa9842061fc1a4ba836cc286f813ac645acddee4fde3ab4f57c7b2799923684a5af7dd4c4d766d9392bc88a", @ANYRESDEC=r29, @ANYBLOB="2c5039cb51705f69643d", @ANYRESDEC=r30, @ANYBLOB="2c15616c6c6f775f6f746865722c66756e633d43524544535f434845434b2c"]) getresgid(&(0x7f0000002080), &(0x7f00000020c0)=0x0, &(0x7f0000002100)) r32 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r32, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r32, r32, &(0x7f0000000000), 0x0) r33 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000002140)='/proc/self/attr/exec\x00', 0x2, 0x0) r34 = inotify_init1(0x0) r35 = getpid() rt_tgsigqueueinfo(r35, r35, 0x16, &(0x7f0000000100)) ptrace(0x10, r35) ptrace$pokeuser(0x6, r35, 0x388, 0xffffffffffffffff) io_setup(0x8, &(0x7f0000000280)=0x0) r37 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) io_submit(r36, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r37, 0x0, 0x0, 0x200, 0x0, 0x1}]) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) r39 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r39, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x3}, 0x4) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x8888, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRESHEX=r37, @ANYBLOB="2c726f6f746d6f64653f30303030303030303030303030303030fd0034303030202c65725f69643da0eeb119a266777b39b23b2c7e448c8bca65a257474332e95588ff4b0ae83d8e4a2489c1833dfb5ea28429ff7c39ca9f5b5bfb347faff1f6478a46b897ac3ac6b2cc1b7b600bf4a8dc853afe30541f32c8b485883165b5c46b982d13e11aeae6ddbda0e29c76630000cf7b4f7d8c1d25db1d3dbb3f730f952a8d13df7aa9842061fc1a4ba836cc286f813ac645acddee4fde3ab4f57c7b2799923684a5af7dd4c4d766d9392bc88a", @ANYRESDEC=r38, @ANYBLOB="2c5039cb51705f69643d", @ANYRESDEC=r39, @ANYBLOB="2c15616c6c6f775f6f746865722c66756e633d43524544535f434845434b2c"]) r40 = socket$packet(0x11, 0x2, 0x300) getsockopt$sock_cred(r40, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0xc) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000002380)={{0x0, 0x0, r41, 0xffffffffffffffff}}) r42 = getpgrp(0xffffffffffffffff) prlimit64(r42, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) syz_open_procfs(r42, &(0x7f00000000c0)='net/mcfilter\x00') r43 = getpgrp(0xffffffffffffffff) prlimit64(r43, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) syz_open_procfs(r43, &(0x7f00000000c0)='net/mcfilter\x00') clone3(&(0x7f00000023c0)={0x20a40700, &(0x7f0000002180), &(0x7f00000021c0), &(0x7f0000002200)=0x0, {0x17}, &(0x7f0000002240)=""/225, 0xe1, &(0x7f0000002340)=""/41, &(0x7f0000002380)=[0x0, r42, 0x0, r43, 0x0, 0x0, 0x0], 0x7}, 0x50) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002440)={{{@in6=@local, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000002540)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000002580)={0x0, 0x0, 0x0}, &(0x7f00000025c0)=0xc) r47 = getpgrp(0xffffffffffffffff) prlimit64(r47, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) syz_open_procfs(r47, &(0x7f00000000c0)='net/mcfilter\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002600)={0x0, 0x0}, &(0x7f0000002640)=0xc) r49 = getgid() fcntl$getownex(r0, 0x10, &(0x7f0000002680)={0x0, 0x0}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000100)={0x0, 0x0}) sched_setaffinity(r51, 0x8, &(0x7f0000000500)=0xa000000000000005) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0}, 0x0) setreuid(0x0, r52) r53 = getpgrp(0x0) setpriority(0x0, r53, 0xffff) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000900)={r53}, 0xc) shmctl$IPC_SET(0x0, 0x1, &(0x7f00000001c0)={{0x6, r52, 0xee01, 0x0, 0xee01, 0x10, 0x319a}, 0x81, 0xe86b, 0x0, 0x10000020, r53, r51, 0x201}) r54 = socket$packet(0x11, 0x2, 0x300) getsockopt$sock_cred(r54, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0xc) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000002380)={{0x0, 0x0, r56, 0xffffffffffffffff}}) r57 = getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002b40)={{{@in=@remote, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@ipv4={[], [], @initdev}}}, &(0x7f0000002c40)=0xe8) r59 = getegid() r60 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r60, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r60, r60, &(0x7f0000000000), 0x0) r61 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r61, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r61, r61, &(0x7f0000000000), 0x0) r62 = syz_open_dev$usbmon(&(0x7f0000002c80)='/dev/usbmon#\x00', 0x6, 0x0) r63 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r63, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r63, r63, &(0x7f0000000000), 0x0) r64 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r64, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r64, r64, &(0x7f0000000000), 0x0) r65 = socket(0x1, 0x3, 0x2) r66 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r66, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r66, r66, &(0x7f0000000000), 0x0) r67 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000002cc0)='/proc/capi/capi20ncci\x00', 0xc1c2bf7429ae047e, 0x0) r68 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000002d00)='/dev/video1\x00', 0x2, 0x0) r69 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r69, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r69, r69, &(0x7f0000000000), 0x0) r70 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r71 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r71, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r71, r71, &(0x7f0000000000), 0x0) r72 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r72, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r72, r72, &(0x7f0000000000), 0x0) r73 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r73, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r73, r73, &(0x7f0000000000), 0x0) r74 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r74, &(0x7f0000000880)=ANY=[@ANYBLOB="85"], 0x1) sendfile(r74, r74, &(0x7f0000000000), 0x0) write$P9_RREADLINK(r70, &(0x7f0000003d80)=ANY=[@ANYPTR64=&(0x7f0000004000)=ANY=[@ANYRES32, @ANYRES16, @ANYPTR=&(0x7f00000026c0)=ANY=[@ANYRES32=r55, @ANYRESHEX=0x0, @ANYRESOCT=r71, @ANYBLOB="c683180735ca83bafa44011f05e57e64ebffe4c9e851eb9343c49ed88bc45642ed3610cb7649a67f186e9ed5b1da32780aa1ed899599b8b7e70b339085cc482d5c04584f7a95b53947d7d556f15204c7c4faef7cb8102c8397802550d25a228d7c296f946a8ccedbc10bf7d266f17a33d700e6ec88388dd099edc4d1a2f692fa468a7905b37f2a3f8f6355aef48c2760282a4bae5f9054b369232ff1a4c5d0632964471039777813fbc80b70cfe366b2d284bed5ce2dc50cf220e02baf93504e1d3b3e8ddaa12585e63943873998fcf9311e289b95d4266363593cb68346689166589b1fc5e139a4dca8b203", @ANYRESDEC=r72], @ANYRES16=0x0, @ANYBLOB="2fb406c493c929d19faf4f8b62d28f39e678416ab204d1a50f1e59133c8374cb62b784ba02c4b7b54f50d1c96079ddd41c6f2d996d4edde17112f0f2abbf1a1e717cbf3e439f7aff1a44f36cac67fbd94b773fc8be602c12041bf2b9c646", @ANYRES64, @ANYRES64=0x0, @ANYBLOB="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", @ANYRESHEX=r73, @ANYPTR64=&(0x7f0000003dc0)=ANY=[@ANYRES64=r74, @ANYRESHEX=r8, @ANYRESDEC=r44, @ANYRES64, @ANYRESOCT, @ANYBLOB="c47bf767204adcf6f1d0532b919af2ce71ce98a717753525ca12354c9100e8a1a3920f3c6c292ee2f456804e6c4ffd765ae3a0ab679245dd3f2c1f20957603840c75081b742fab0adb8abfc3bd2ed87a804777b9dc36bc47f80a83a524922ce3ae55760f0a34c9987a6a9dbb9a47263f95d3765a9c4e198868ab472a0c"]]], 0x8) sendfile(r70, r70, &(0x7f0000000000), 0x0) r75 = socket$tipc(0x1e, 0x5, 0x0) r76 = getpid() rt_tgsigqueueinfo(r76, r76, 0x16, &(0x7f0000000100)) ptrace(0x10, r76) ptrace$pokeuser(0x6, r76, 0x388, 0xffffffffffffffff) io_setup(0x8, &(0x7f0000000280)=0x0) r78 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) io_submit(r77, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r78, 0x0, 0x0, 0x200, 0x0, 0x1}]) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) r80 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r80, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x3}, 0x4) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x8888, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRESHEX=r78, @ANYBLOB="2c726f6f746d6f64653f30303030303030303030303030303030fd0034303030202c65725f69643da0eeb119a266777b39b23b2c7e448c8bca65a257474332e95588ff4b0ae83d8e4a2489c1833dfb5ea28429ff7c39ca9f5b5bfb347faff1f6478a46b897ac3ac6b2cc1b7b600bf4a8dc853afe30541f32c8b485883165b5c46b982d13e11aeae6ddbda0e29c76630000cf7b4f7d8c1d25db1d3dbb3f730f952a8d13df7aa9842061fc1a4ba836cc286f813ac645acddee4fde3ab4f57c7b2799923684a5af7dd4c4d766d9392bc88a", @ANYRESDEC=r79, @ANYBLOB="2c5039cb51705f69643d", @ANYRESDEC=r80, @ANYBLOB="2c15616c6c6f775f6f746865722c66756e633d43524544535f434845434b2c"]) r81 = socket$packet(0x11, 0x2, 0x300) getsockopt$sock_cred(r81, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0xc) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000002380)={{0x0, 0x0, r82, 0xffffffffffffffff}}) r83 = getpgrp(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002d40)={{{@in6=@remote, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000002e40)=0xe8) r85 = socket$packet(0x11, 0x2, 0x300) getsockopt$sock_cred(r85, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0xc) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000002380)={{0x0, 0x0, r86, 0xffffffffffffffff}}) r87 = fanotify_init(0x2, 0x0) r88 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r88, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r88, r88, &(0x7f0000000000), 0x0) r89 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r89, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r89, r89, &(0x7f0000000000), 0x0) r90 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r90, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r90, r90, &(0x7f0000000000), 0x0) r91 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r91, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r91, r91, &(0x7f0000000000), 0x0) r92 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r92, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r92, r92, &(0x7f0000000000), 0x0) r93 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r93, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r93, r93, &(0x7f0000000000), 0x0) r94 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r94, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r94, r94, &(0x7f0000000000), 0x0) r95 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r95, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r95, r95, &(0x7f0000000000), 0x0) r96 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r96, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r96, r96, &(0x7f0000000000), 0x0) r97 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r97, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r97, r97, &(0x7f0000000000), 0x0) r98 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r98, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r98, r98, &(0x7f0000000000), 0x0) r99 = socket$kcm(0x29, 0x0, 0x0) r100 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r100, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r100, r100, &(0x7f0000000000), 0x0) r101 = getpid() rt_tgsigqueueinfo(r101, r101, 0x16, &(0x7f0000000100)) ptrace(0x10, r101) ptrace$pokeuser(0x6, r101, 0x388, 0xffffffffffffffff) r102 = getgid() r103 = fcntl$getown(0xffffffffffffffff, 0x9) r104 = getgid() r105 = socket$inet_smc(0x2b, 0x1, 0x0) r106 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r106, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r106, r106, &(0x7f0000000000), 0x0) r107 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r107, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r107, r107, &(0x7f0000000000), 0x0) r108 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r108, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r108, r108, &(0x7f0000000000), 0x0) r109 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r109, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r109, r109, &(0x7f0000000000), 0x0) r110 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r110, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r110, r110, &(0x7f0000000000), 0x0) r111 = clone3(&(0x7f0000003780)={0x4514eaaf271c36a1, &(0x7f00000035c0), &(0x7f0000003600), &(0x7f0000003640), {0x8}, &(0x7f0000003680)=""/115, 0x73, &(0x7f0000003700)=""/61, &(0x7f0000003740)=[0x0, 0xffffffffffffffff, 0x0], 0x3}, 0x50) getresuid(&(0x7f0000003800), &(0x7f0000003840), &(0x7f0000003880)=0x0) r113 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r113, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r113, r113, &(0x7f0000000000), 0x0) r114 = openat$null(0xffffffffffffff9c, &(0x7f00000038c0)='/dev/null\x00', 0x4000c1, 0x0) r115 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r115, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r115, r115, &(0x7f0000000000), 0x0) r116 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r116, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r116, r116, &(0x7f0000000000), 0x0) r117 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r117, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r117, r117, &(0x7f0000000000), 0x0) r118 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r118, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r118, r118, &(0x7f0000000000), 0x0) r119 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r119, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r119, r119, &(0x7f0000000000), 0x0) r120 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r120, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r120, r120, &(0x7f0000000000), 0x0) r121 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r121, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r121, r121, &(0x7f0000000000), 0x0) r122 = openat$cgroup_ro(r121, &(0x7f0000003900)='memory.stat\x00', 0x0, 0x0) r123 = fcntl$getown(r1, 0x9) r124 = getuid() lstat(&(0x7f0000003940)='./file0\x00', &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r126 = getpid() rt_tgsigqueueinfo(r126, r126, 0x16, &(0x7f0000000100)) ptrace(0x10, r126) ptrace$pokeuser(0x6, r126, 0x388, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000100)={0x0, 0x0}) sched_setaffinity(r127, 0x8, &(0x7f0000000500)=0xa000000000000005) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0}, 0x0) setreuid(0x0, r128) r129 = getpgrp(0x0) setpriority(0x0, r129, 0xffff) io_setup(0x8, &(0x7f0000000280)=0x0) r131 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) io_submit(r130, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r131, 0x0, 0x0, 0x200, 0x0, 0x1}]) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) r133 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r133, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x3}, 0x4) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x8888, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRESHEX=r131, @ANYBLOB="2c726f6f746d6f64653f30303030303030303030303030303030fd0034303030202c65725f69643da0eeb119a266777b39b23b2c7e448c8bca65a257474332e95588ff4b0ae83d8e4a2489c1833dfb5ea28429ff7c39ca9f5b5bfb347faff1f6478a46b897ac3ac6b2cc1b7b600bf4a8dc853afe30541f32c8b485883165b5c46b982d13e11aeae6ddbda0e29c76630000cf7b4f7d8c1d25db1d3dbb3f730f952a8d13df7aa9842061fc1a4ba836cc286f813ac645acddee4fde3ab4f57c7b2799923684a5af7dd4c4d766d9392bc88a", @ANYRESDEC=r132, @ANYBLOB="2c5039cb51705f69643d", @ANYRESDEC=r133, @ANYBLOB="2c15616c6c6f775f6f746865722c66756e633d43524544535f434845434b2c"]) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000900)={r129, r132}, 0xc) shmctl$IPC_SET(0x0, 0x1, &(0x7f00000001c0)={{0x6, r128, 0xee01, 0x0, 0xee01, 0x10, 0x319a}, 0x81, 0xe86b, 0x0, 0x10000020, r129, r127, 0x201}) r134 = socket$packet(0x11, 0x2, 0x300) getsockopt$sock_cred(r134, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0xc) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000002380)={{0x0, 0x0, r135, 0xffffffffffffffff}}) r136 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r136, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r136, r136, &(0x7f0000000000), 0x0) r137 = syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) r138 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r138, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r138, r138, &(0x7f0000000000), 0x0) r139 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r139, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r139, r139, &(0x7f0000000000), 0x0) r140 = syz_open_pts(0xffffffffffffffff, 0x401080) r141 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r141, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r141, r141, &(0x7f0000000000), 0x0) r142 = getpid() rt_tgsigqueueinfo(r142, r142, 0x16, &(0x7f0000000100)) ptrace(0x10, r142) ptrace$pokeuser(0x6, r142, 0x388, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000100)={0x0, 0x0}) sched_setaffinity(r143, 0x8, &(0x7f0000000500)=0xa000000000000005) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0}, 0x0) setreuid(0x0, r144) r145 = getpgrp(0x0) setpriority(0x0, r145, 0xffff) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000900)={r145}, 0xc) shmctl$IPC_SET(0x0, 0x1, &(0x7f00000001c0)={{0x6, r144, 0xee01, 0x0, 0xee01, 0x10, 0x319a}, 0x81, 0xe86b, 0x0, 0x10000020, r145, r143, 0x201}) r146 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r146, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r146, r146, &(0x7f0000000000), 0x0) fstat(r146, &(0x7f0000003a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r148 = openat$autofs(0xffffffffffffff9c, &(0x7f0000003a80)='/dev/autofs\x00', 0x2800, 0x0) r149 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r149, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r149, r149, &(0x7f0000000000), 0x0) r150 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r150, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r150, r150, &(0x7f0000000000), 0x0) r151 = socket$caif_seqpacket(0x25, 0x5, 0x5) r152 = getpid() rt_tgsigqueueinfo(r152, r152, 0x16, &(0x7f0000000100)) ptrace(0x10, r152) ptrace$pokeuser(0x6, r152, 0x388, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000100)={0x0, 0x0}) sched_setaffinity(r153, 0x8, &(0x7f0000000500)=0xa000000000000005) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0}, 0x0) setreuid(0x0, r154) r155 = getpgrp(0x0) setpriority(0x0, r155, 0xffff) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000900)={r155}, 0xc) shmctl$IPC_SET(0x0, 0x1, &(0x7f00000001c0)={{0x6, r154, 0xee01, 0x0, 0xee01, 0x10, 0x319a}, 0x81, 0xe86b, 0x0, 0x10000020, r155, r153, 0x201}) r156 = getgid() r157 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r157, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r157, r157, &(0x7f0000000000), 0x0) r158 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r158, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r158, r158, &(0x7f0000000000), 0x0) r159 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r159, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r159, r159, &(0x7f0000000000), 0x0) r160 = fsmount(r159, 0x3, 0x1a1) r161 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r161, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r161, r161, &(0x7f0000000000), 0x0) r162 = socket$inet_udp(0x2, 0x2, 0x0) r163 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r163, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r163, r163, &(0x7f0000000000), 0x0) sendmmsg$unix(r4, &(0x7f0000003c40)=[{&(0x7f0000001a00)=@abs={0x3, 0x0, 0x4e23}, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000001a80)="9ef801574cf7a55bc66c8537ae5aa5ed026a09e6d07fbc99af80383ef0d48e7a55382d7a9aab98f3d230a1526b37050d142e469af7744155190667d90374c55d79c03b2a563ea063bd1bbecf3d1c3626921cb80b8f06223934a2f02595f767ffd979562816e8cc93", 0x68}], 0x1, &(0x7f0000001c00)=[@rights={{0x20, 0x1, 0x1, [r5, r6, r7, r8]}}, @rights={{0x34, 0x1, 0x1, [r9, r10, r11, r12, r1, r0, r13, r14, r2]}}, @rights={{0x28, 0x1, 0x1, [r15, r16, r0, r18, r19, r0]}}], 0x80, 0x40000}, {&(0x7f0000001c80)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001e40)=[{&(0x7f0000001d00)="d5a3479af488c990f8d3830c0afca3c5a743f72bf73712a83701c556a315f42b3c24e8a23b6b2491182df9f71c7986e4e111f5a770709d043b13f0d42b4547366e9737658ee02a25116903c661d48a1d586d94b754110b26f3557c9c1155e61d33b5de82865ce4f2ca603728f66a320f0b5bf7bde41d227c62311c785381c82bb732a9cceb0c20a2ec84c68f5bd4235b2cb9a469b94bca9198302c69b32ca8f82a4d10249d6db2ef18aa573f00868709cdad98ca5b81b6eb55c651714da073", 0xbf}, {&(0x7f0000001dc0)="52e05374dd7f39c0bf2d81fc726f629967b6ec70af7e87f39f5ca995b2078f187842195890365106ffb7d7a4b60c964cecdac706e484cdee92f14fe1724dcb2de38b6c228c41941e2fc703fb89a09d9bd6e25c07da1c", 0x56}], 0x2, &(0x7f0000003ec0)=[@rights={{0x28, 0x1, 0x1, [r157, r158, r160, r161, r162, r163]}}, @cred={{0x1c, 0x1, 0x2, {r23, r24, r25}}}, @cred={{0x1c, 0x1, 0x2, {r26, r29, r31}}}, @rights={{0x24, 0x1, 0x1, [r2, r32, r33, r34, r0]}}, @cred={{0x1c, 0x1, 0x2, {r35, r38, r41}}}, @cred={{0x1c, 0x1, 0x2, {r44, r45, r46}}}, @cred={{0x1c, 0x1, 0x2, {r47, r48, r49}}}, @cred={{0x1c, 0x1, 0x2, {r50, r52, r56}}}], 0x110}, {&(0x7f0000002800)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000002b00)=[{&(0x7f0000002880)="455416053751a04d2b2393287c252eb5d987bdf086de560fadd991a65a64a6e6722c2380a16ffa5b7993db9a7935a1195daf272d7b1fe5a43aa17ad8153457d830f93a9d71a7e0728d4d116cff0926319fd4deb786042d7b231af9d988c5bcc0567cc8de7d8a013910f5097c5e7f228d62492114e2432a3ed93d469477f59a63d4369c4ff8ed01c7ec23d091724bfa6610de0606ea2c06f81babee15964e99dbcc02767b0d3fc0f153f43b9cfd87e70f1007c8c63a6f4be0084232d658a03fa0", 0xc0}, {&(0x7f0000002940)="badf292f4e3102a4202283a1279419d29ec908ea2735c503a321b251796c4918f5d1903fdc3a70a15c55ce16866015d24354f826ecf0318eaee31fe26139cd5adafcc3cd7cbd75fcab226ca5728e3ba641f2202568ec3def3cc33bc889c13b985abccaea3c5c930e26a0caa0ce4071074c0db7006ce73eef19668e4f15015049fa5da616e14647f1c38eaf58127154630defa5ae746550532a69534e7d25616a95c5370af6a27a171d9e", 0xaa}, {&(0x7f0000002a00)="bb34bf9f8b5e3ec996e6487e49999a61a14e515a2afa4ddb36bfa92dc2f9bc249f372433e18ed80045725433903905ec8a0a19e570421dc068955c58533d223f69d968f693cb126eaafa675d608865b55df67612b39af3b84c37b1b28a8ad37a5bdb40d551073326", 0x68}, {&(0x7f0000002a80)="47bcba433b20786293859d8500f986770be9b6448a79ffd65d006c8de12b6ef68a48784d397291099fa51220fa09aa4ae4951bd76faf6c2fb419305e2575bf5c59c2a0a58323453976f43a0a6d8678cc7dc32eb3143aacce55", 0x59}], 0x4, &(0x7f0000002e80)=[@cred={{0x1c, 0x1, 0x2, {r57, r58, r59}}}, @rights={{0x2c, 0x1, 0x1, [r60, r61, r2, r62, r63, r1, r64]}}, @rights={{0x30, 0x1, 0x1, [r65, r0, r66, r67, r0, r1, r1, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [r68, r69, r70]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, r75, r2, r0]}}, @cred={{0x1c, 0x1, 0x2, {r76, r79, r82}}}, @cred={{0x1c, 0x1, 0x2, {r83, r84, r86}}}, @rights={{0x2c, 0x1, 0x1, [r87, r88, r0, r89, r90, r91, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [r92, 0xffffffffffffffff, r93, r94, 0xffffffffffffffff, r95, r96, r97, r98]}}], 0x168, 0x40}, {&(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003280)=[{&(0x7f0000003080)="732189c1faba09793deb30bb0b31edea07c9e3e5264430ab02716968e822919e0673b40ccbcb8ba1c29540b6d6017d9e9208418e7d92b57d0dbcbf1d55de6623f3baaf8c12cb043c083a573933f659436897633ba97da8f580d5abd5544db18f7296c62345aa801f5ad6b117e5d4545252e0515ffbf5fd3a5169308d11f9592dd934689cd63b6185af49c53c48f682aae185c4ad39499b401de1b0fd20c365fffe", 0xa1}, {&(0x7f0000003140)="4ce48b91911a0862c71cd65d592863c711f26d12c7581a10b935999aa31777f2699ffecf66082c892c979fd5f324ea089592e91d12cbfb4d38936b5d", 0x3c}, {&(0x7f0000003180)="30bb14e9730f3b81022883d00f2650e4ad5bc70218a31f3a4a9d5b9604bf948ec6be15feafc3f6e655352775da4fdf185611df4103c95d4970f51c8b9e00a99a0360bd16bea287f1d4e3ecd77b4bea33389e259bc204965bf340f86f027e606e8f951e7683181f5bb7ac6b29b74c49bfec36bf17703c8a9b22d719e85d905354df431c0c1d33eadabbf08426c99cbf263168f8b333d1512c58cbc5418c477eaad1a3395f44bfbe1fbf3e05da096ed356d4da1dcad121f73288fbec8adb97e0d217fcd5b408a35fbc3fab63596ee53f6acb8e660e4aa67575b96a", 0xda}], 0x3, &(0x7f00000032c0)=[@rights={{0x1c, 0x1, 0x1, [r99, r100, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r101, 0xee01, r102}}}, @cred={{0x1c, 0x1, 0x2, {r103, 0xee01, r104}}}, @rights={{0x20, 0x1, 0x1, [r105, r106, r107, r1]}}, @rights={{0x1c, 0x1, 0x1, [r1, r108, r109]}}, @rights={{0x20, 0x1, 0x1, [r110, r0, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc0, 0x4013006}, {&(0x7f0000003380)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003580)=[{&(0x7f0000003400)="87b0adbd6a49598d974171eaa15661555f734d6c7e51fe6d2a36fdc45915a3f9eba3732e0c49dd16df06eb9b2accb91f35b6b5d2dd066490410e9d2e00a35af7ae4742604a2545c7cde39718e54a2c3a706cd3e513078fdd2232c2e44d59bf2f77282a4d77f9", 0x66}, {&(0x7f0000003480)="6e540c045b6dc435f83ba2716c286e78e850279e2f606fb604c9092fc473bddd8f3fe9012670fed0d37c39d7d67916406628de1413ae242937e638daac694f8a95f4e03f1731487415daeded8f5ca0311fb4171d4a3e1efc5e51fb3beb1b7ac981062e5406145c", 0x67}, {&(0x7f0000003500)="821f0e7ecec306695ac985a92763e4d7904b894fa6d26e625f82a9bc0029e758843f8c97969d9f23ebe1a596f12e5e57af905e9be084a62999160314c1e3e3c7cf5f9d339b73f2dcc7e2d81ae946274518f8a9e2cc5bcc0279dbb9dcc0f4087ba863ff449dd26b112f221f44d9d98cd38a379cf41dd17af5ec386d", 0x7b}], 0x3, &(0x7f0000003ac0)=[@cred={{0x1c, 0x1, 0x2, {r111, r112, 0xee00}}}, @rights={{0x30, 0x1, 0x1, [r0, r0, r2, 0xffffffffffffffff, r113, r0, r114, r115]}}, @rights={{0x30, 0x1, 0x1, [r116, r117, r118, r119, r120, 0xffffffffffffffff, r1, r122]}}, @cred={{0x1c, 0x1, 0x2, {r123, r124, r125}}}, @cred={{0x1c, 0x1, 0x2, {r126, r128, r135}}}, @rights={{0x30, 0x1, 0x1, [r136, r2, r1, r137, r138, r139, r140, r141]}}, @cred={{0x1c, 0x1, 0x2, {r142, r144, r147}}}, @rights={{0x1c, 0x1, 0x1, [r148, r149, r150]}}, @rights={{0x14, 0x1, 0x1, [r151]}}, @cred={{0x1c, 0x1, 0x2, {r152, r154, r156}}}], 0x168, 0xc}], 0x5, 0x4000011) r164 = memfd_create(&(0x7f00000002c0)='systemem0md5sum$\x00', 0x0) ioctl$SIOCGIFHWADDR(r2, 0x8927, &(0x7f0000000100)) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r164, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, {0x4000001}, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000040)='coredump_filter\x00*\x0e\xc3=.\x13\xcbx\x95*\xeeX\x9fcy\xa49\xf6\x8f\x82^\x19\xa9\xcd+\b\x9f\xc6,\xa0\xf0\xff\x9dO\x06\xc9\x15\xda\xa4\x7fh\xd4\xe8C\xdeKUrR\xf4\x9c\x87\xee\xd2\xfb\xdfs\xd0G\x91\x02\x15Z\xa8\x1ad\xadY\x13\x14mg\xc9\x00\x16\xa4\xc48\x06u\x1e:\xd4Y?\xd8P\xe8reP\xffv\xd6\x12\x85N1\n\f\xb0\x1e\xe7\xffD\x1aS\xbf0\x80\xff\xff7V\xcc5\x96W\x14J\xe2\x93\xe3\xc6A7\xd8\xec\xb2m\xf5\x16-\x1b\xbd\x11\x1aYg\xe0\xa7\xd19\a') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') io_setup(0x8, &(0x7f0000000280)=0x0) r166 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) io_submit(r165, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r166, 0x0, 0x0, 0x200, 0x0, 0x1}]) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) r168 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r168, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x3}, 0x4) r169 = openat$zero(0xffffffffffffff9c, &(0x7f0000001800)='/dev/zero\x00', 0x80, 0x0) setsockopt$XDP_RX_RING(r169, 0x11b, 0x2, &(0x7f0000001840)=0x100800, 0x1) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x8888, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRESHEX=r166, @ANYBLOB="2c726f6f746d6f64653f30303030303030303030303030303030fd0034303030202c65725f69643da0eeb119a266777b39b23b2c7e448c8bca65a257474332e95588ff4b0ae83d8e4a2489c1833dfb5ea28429ff7c39ca9f5b5bfb347faff1f6478a46b897ac3ac6b2cc1b7b600bf4a8dc853afe30541f32c8b485883165b5c46b982d13e11aeae6ddbda0e29c76630000cf7b4f7d8c1d25db1d3dbb3f730f952a8d13df7aa9842061fc1a4ba836cc286f813ac645acddee4fde3ab4f57c7b2799923684a5af7dd4c4d766d9392bc88a", @ANYRESDEC=r167, @ANYBLOB="2c5039cb51705f69643d", @ANYRESDEC=r168, @ANYBLOB="2c15616c6c6f775f6f746865722c66756e633d43524544535f434845434b2c"]) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f00000001c0)='./file0\x00', 0xfffffffffffff77c, 0x7, &(0x7f0000001680)=[{&(0x7f0000000300)="65a591855aef031818d481bfc46c483a8e0c07296cf2b4dfb1140e88b22783709864b11e8af080acf16a9eaf4fadc0cee43b0ae608a460b11c2e09529bd5341e0893a3e2b1d18e8ce593e7bd25f1c89628c82d72ec775abe7a3134e4c90351d895fb16065daff0a7999f3806e281dc2f43dfd724a979e94ff6ea757e2c55be9f381d57103dc0161c769e13a9abffa546ec56399f6c9c35a21b947656c32ad79966d4ce211839e0774e67c5d19afb0fd06150d5206646125c6d65450f4cbdc9de5d7fd76f8a7599", 0xc7, 0x1213}, {&(0x7f0000000400)="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", 0x1000, 0xffffffffffffffe1}, {&(0x7f0000000200)="d57aaae1180f4e84761ad3ffdc63c8ea1859b7f8a898266638091ad4a86be5dd65c15f1b2d222cb91cd98c04b3b63f08072805eec8aa7306f1a465868f8ccec182", 0x41, 0x1}, {&(0x7f0000001400)="0353ac2ebc0d8e52bf2051d44fe7a236ea0c88dbc0f177db69e9618ba2582f955dff1a505fbdb8167a1f023eb08038bcc87e2b3ffd3d8914a1a1a88c51706445e05efc5d810fd9e606", 0x49, 0x5}, {&(0x7f0000000280)="439a4b971052fd7b83b6a907ac6c5b50535d3781d7dc5e534adc029588b71709d25955e8e08a7fb2deae2a4b57de1d", 0x2f, 0x421}, {&(0x7f0000001480)="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", 0xfa, 0x1}, {&(0x7f0000001580)="fc2d7ae6eee8e3232a268a0d0274ddd344741c30e7932a58bd66fe9215cab01ab322212207ce75ca68ccbadfc54c423a0f9312177e30164d2167cf77bd3efdbcd5f529fe78e8e0826ff25b67e4c4360847da1c64a066bbfa7570d470b672bec62dae11e3a7bac0be5f3a064199f369c1a0ea1cac88f8326dab69f9b4ba751c046bb9fc546913fa75487a2413f0b8009242c55c8e26292bb696d9b60a681da365c6e9b56c2a44c6324e0d771b0b88deaf96135d83c69e9eeb50ec7fc56f94d6117b2cc122c577f85644968a10d1abeaad1b86f7195e2551b6b8030911a9607a1c69fcd402225c9b", 0xe7, 0x3f}], 0x808000, &(0x7f0000001740)={[{@nolazytime='nolazytime'}, {@noinline_data='noinline_data'}, {@background_gc_off='background_gc=off'}, {@nolazytime='nolazytime'}, {@flush_merge='flush_merge'}, {@nodiscard='nodiscard'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@pcr={'pcr', 0x3d, 0x5}}, {@uid_eq={'uid', 0x3d, r167}}, {@dont_appraise='dont_appraise'}]}) 10:09:00 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000303e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1631.082224][ T26] audit: type=1800 audit(1576836540.156:78): pid=32157 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.4" name="bus" dev="sda1" ino=16534 res=0 10:09:00 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r0, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r0, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r2, 0x0) close(r2) 10:09:00 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r0, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r0, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r2, 0x0) close(r2) 10:09:00 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r0, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r0, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r2, 0x0) close(r2) [ 1631.427483][T32169] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 10:09:00 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f00000002c0)='systemem0md5sum$\x00', 0x0) ioctl$SIOCGIFHWADDR(r1, 0x8927, &(0x7f0000000100)) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r2, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f00000001c0)={0x4, &(0x7f0000000140)=[{0x1ff, 0x4, 0x1f, 0x2}, {0x800, 0x1f, 0xdd, 0x3}, {0x2, 0x1f, 0x1, 0x8}, {0x0, 0x3, 0x0, 0x3ff}]}, 0x10) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, {0x4000001}, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='coredump_filter\x00*\x0e\xc3=.\x13\xcbx\x95*\xeeX\x9fcy\xa49\xf6\x8f\x82^\x19\xa9\xcd+\b\x9f\xc6,\xa0\xf0\xff\x9dO\x06\xc9\x15\xda\xa4\x7fh\xd4\xe8C\xdeKUrR\xf4\x9c\x87\xee\xd2\xfb\xdfs\xd0G\x91\x02\x15Z\xa8\x1ad\xadY\x13\x14mg\xc9\x00\x16\xa4\xc48\x06u\x1e:\xd4Y?\xd8P\xe8reP\xffv\xd6\x12\x85N1\n\f\xb0\x1e\xe7\xffD\x1aS\xbf0\x80\xff\xff7V\xcc5\x96W\x14J\xe2\x93\xe3\xc6A7\xd8\xec\xb2m\xf5\x16-\x1b\xbd\x11\x1aYg\xe0\xa7\xd19\a') prctl$PR_SET_DUMPABLE(0x4, 0x0) setsockopt$inet_int(r4, 0x0, 0x13, &(0x7f0000000200)=0x5, 0x4) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') [ 1631.496886][T32169] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1631.521883][T32180] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 10:09:00 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4805, 0x0) [ 1631.546716][T32169] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1631.553022][T32180] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors 10:09:00 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r0, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r0, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r2, 0x0, 0x0) listen(r2, 0x0) close(r2) [ 1631.623639][T32169] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 1631.758096][T32180] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1631.869190][T32180] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 10:09:10 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="0fe2fb1967c1b9f31a07e5944a93f9bf75282b82fe649f185f26f6e03d15da64cfbfaa3cd36c515c79e78514e316820023479170a133ef5878e9fd2f96066c0870d2376b78a98e5f717200af8afb9b504e3b74bbfdd2a785e7bc72f92971468760f984af5c6205be909b9d0120cf7cfc66e3c5a6dcd9dc8ab08770bbec73059ea8101e4726b294e265ca8582ea1f7da287bd017c1f171cb748c657fa63de7286af499d0f6d0136728e6fc2d599fdb43df6edc123d6ab214a91f210dd"], 0x1) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r1, r1, &(0x7f0000000000), 0x0) fanotify_mark(0xffffffffffffffff, 0x20, 0x1000, r1, &(0x7f00000002c0)='./bus\x00') sendfile(r0, r0, &(0x7f0000000000), 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x0, 0x383, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, r0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0xa100, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r2, 0x40046207, 0x0) 10:09:10 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') getdents64(r0, &(0x7f00000005c0)=""/153, 0x99) getdents64(r0, &(0x7f0000000000)=""/186, 0xba) getdents64(r0, &(0x7f00000000c0)=""/71, 0x47) 10:09:10 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e62e04006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:09:10 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000200)=ANY=[@ANYBLOB="e4da1b7b8fe10022c60d9124ea8cabc004f89942852a0b6a3a28c2df53edd57e025a6f2a29d03036812773556474626aa5c33b7e9966a095799a800517fd727374cbc838f709513977f1da46178a76293122ebdf71da07bd4dd7bb6e676e50cda9f45d208c0f80dc249aa8355af154f93a9c452953a18a8ca147c0b8c60757210424fc553334e242f3"], 0x1) sendfile(r2, r2, &(0x7f0000000000), 0x0) ioctl$VT_SETMODE(r2, 0x5602, &(0x7f0000000140)={0x20, 0x4, 0x7fff, 0x2, 0x7}) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = memfd_create(&(0x7f00000002c0)='systemem0md5sum$\x00', 0x0) ioctl$SIOCGIFHWADDR(r1, 0x8927, &(0x7f0000000100)) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r3, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, {0x4000001}, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000040)='coredump_filter\x00*\x0e\xc3=.\x13\xcbx\x95*\xeeX\x9fcy\xa49\xf6\x8f\x82^\x19\xa9\xcd+\b\x9f\xc6,\xa0\xf0\xff\x9dO\x06\xc9\x15\xda\xa4\x7fh\xd4\xe8C\xdeKUrR\xf4\x9c\x87\xee\xd2\xfb\xdfs\xd0G\x91\x02\x15Z\xa8\x1ad\xadY\x13\x14mg\xc9\x00\x16\xa4\xc48\x06u\x1e:\xd4Y?\xd8P\xe8reP\xffv\xd6\x12\x85N1\n\f\xb0\x1e\xe7\xffD\x1aS\xbf0\x80\xff\xff7V\xcc5\x96W\x14J\xe2\x93\xe3\xc6A7\xd8\xec\xb2m\xf5\x16-\x1b\xbd\x11\x1aYg\xe0\xa7\xd19\a') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 10:09:10 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r0, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r0, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r2, 0x0, 0x0) listen(r2, 0x0) close(r2) 10:09:10 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000304e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:09:10 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r0, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r0, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r2, 0x0, 0x0) listen(r2, 0x0) close(r2) 10:09:10 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000140), &(0x7f00000001c0)=0x8) r2 = memfd_create(&(0x7f00000002c0)='systemem0md5sum$\x00', 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) ioctl$SIOCGIFHWADDR(r1, 0x8927, &(0x7f0000000100)) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r2, 0x0) rt_sigaction(0x35, &(0x7f0000b4a000)={0xfffffffffffffffd, {0x8}, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000040)='smaps_rollup\x00') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') [ 1641.786292][T32421] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1641.800995][T32349] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1641.815636][T32421] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1641.830424][T32349] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1641.875044][T32421] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1641.891043][T32349] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1641.912217][T32349] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 10:09:11 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000305e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1641.962420][T32421] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 10:09:11 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r0, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r0, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r2, &(0x7f0000008ff0)={0x2, 0x0, @multicast2}, 0x10) listen(r2, 0x0) close(r2) 10:09:11 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f00000002c0)='systemem0md5sum$\x00', 0x0) ioctl$SIOCGIFHWADDR(r1, 0x8927, &(0x7f0000000100)) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r2, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, {0x4000001}, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000040)='coredump_filter\x00*\x0e\xc3=.\x13\xcbx\x95*\xeeX\x9fcy\xa49\xf6\x8f\x82^\x19\xa9\xcd+\b\x9f\xc6,\xa0\xf0\xff\x9dO\x06\xc9\x15\xda\xa4\x7fh\xd4\xe8C\xdeKUrR\xf4\x9c\x87\xee\xd2\xfb\xdfs\xd0G\x91\x02\x15Z\xa8\x1ad\xadY\x13\x14mg\xc9\x00\x16\xa4\xc48\x06u\x1e:\xd4Y?\xd8P\xe8reP\xffv\xd6\x12\x85N1\n\f\xb0\x1e\xe7\xffD\x1aS\xbf0\x80\xff\xff7V\xcc5\x96W\x14J\xe2\x93\xe3\xc6A7\xd8\xec\xb2m\xf5\x16-\x1b\xbd\x11\x1aYg\xe0\xa7\xd19\a') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) 10:09:11 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e62f04006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1642.511426][T32576] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1642.535437][T32576] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1642.585590][T32576] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1642.624302][T32576] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 10:09:11 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) r0 = geteuid() ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000002c0)={0x5, 0x1, 0x4000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f00000001c0)=0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x104841, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=unix,uname=*$[,nodevmap,posixacl,access=', @ANYRESDEC=r0, @ANYBLOB=',audit,subj_user=ext4\x00,subj_type=em1(!nodev,fowner>', @ANYRESDEC=r1, @ANYBLOB=',dont_meaurm,\x00']) [ 1642.702558][T32693] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1642.715886][T32693] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1642.729957][T32693] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1642.760924][T32693] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 10:09:16 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') getdents64(r0, &(0x7f00000005c0)=""/153, 0x99) r1 = accept(r0, &(0x7f00000000c0)=@nfc, &(0x7f0000000140)=0x80) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r2, r2, &(0x7f0000000000), 0x0) sendfile(r1, r2, &(0x7f0000000180)=0x9, 0x3) getdents64(r0, &(0x7f0000000000)=""/186, 0xba) 10:09:16 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000140)=0x7d4e0a3134a99d7f, 0x4) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f00000002c0)='systemem0md5sum$\x00', 0x0) ioctl$SIOCGIFHWADDR(r1, 0x8927, &(0x7f0000000100)) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r2, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, {0x4000001}, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000040)='coredump_filter\x00*\x0e\xc3=.\x13\xcbx\x95*\xeeX\x9fcy\xa49\xf6\x8f\x82^\x19\xa9\xcd+\b\x9f\xc6,\xa0\xf0\xff\x9dO\x06\xc9\x15\xda\xa4\x7fh\xd4\xe8C\xdeKUrR\xf4\x9c\x87\xee\xd2\xfb\xdfs\xd0G\x91\x02\x15Z\xa8\x1ad\xadY\x13\x14mg\xc9\x00\x16\xa4\xc48\x06u\x1e:\xd4Y?\xd8P\xe8reP\xffv\xd6\x12\x85N1\n\f\xb0\x1e\xe7\xffD\x1aS\xbf0\x80\xff\xff7V\xcc5\x96W\x14J\xe2\x93\xe3\xc6A7\xd8\xec\xb2m\xf5\x16-\x1b\xbd\x11\x1aYg\xe0\xa7\xd19\a') prctl$PR_SET_DUMPABLE(0x4, 0x0) prctl$PR_GET_SECCOMP(0x15) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 10:09:16 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r0, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r0, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r2, &(0x7f0000008ff0)={0x2, 0x0, @multicast2}, 0x10) listen(r2, 0x0) close(r2) 10:09:16 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000306e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:09:16 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x4, 0x111, &(0x7f00000007c0), 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$IMGETVERSION(r0, 0x80044942, &(0x7f0000000140)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) tee(r1, r1, 0x401, 0x2) munlock(&(0x7f0000ffe000/0x1000)=nil, 0x1000) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:09:16 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e63004006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:09:17 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r0, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r0, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r2, &(0x7f0000008ff0)={0x2, 0x0, @multicast2}, 0x10) listen(r2, 0x0) close(r2) 10:09:17 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r0, r0, &(0x7f0000000000), 0x0) fsetxattr$smack_xattr_label(r0, &(0x7f0000000140)='security.SMACK64IPOUT\x00', &(0x7f00000001c0)={'em1]'}, 0x5, 0x1) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f00000002c0)='systemem0md5sum$\x00', 0x0) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000100)) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='coredump_filter\x00*\x0e\xc3=.\x13\xcbx\x95*\xeeX\x9fcy\xa49\xf6\x8f\x82^\x19\xa9\xcd+\b\x9f\xc6,\xa0\xf0\xff\x9dO\x06\xc9\x15\xda\xa4\x7fh\xd4\xe8C\xdeKUrR\xf4\x9c\x87\xee\xd2\xfb\xdfs\xd0G\x91\x02\x15Z\xa8\x1ad\xadY\x13\x14mg\xc9\x00\x16\xa4\xc48\x06u\x1e:\xd4Y?\xd8P\xe8reP\xffv\xd6\x12\x85N1\n\f\xb0\x1e\xe7\xffD\x1aS\xbf0\x80\xff\xff7V\xcc5\x96W\x14J\xe2\x93\xe3\xc6A7\xd8\xec\xb2m\xf5\x16-\x1b\xbd\x11\x1aYg\xe0\xa7\xd19\a') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 10:09:17 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r0, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r0, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r2, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(0xffffffffffffffff, 0x0) close(r2) [ 1648.168620][T32738] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1648.197023][T32727] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1648.258686][T32738] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1648.280687][T32738] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock 10:09:17 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x83800) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, r0}, 0xfffffffffffffcdf) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1648.325468][T32727] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1648.352472][T32738] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 1648.364922][T32727] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1648.459920][T32727] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 10:09:17 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r0, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r0, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r2, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(0xffffffffffffffff, 0x0) close(r2) 10:09:17 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e63104006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1648.978626][ T408] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1648.991482][ T408] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1649.012900][ T408] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1649.034305][ T408] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 10:09:26 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000307e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:09:26 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r0, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r0, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r2, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(0xffffffffffffffff, 0x0) close(r2) 10:09:26 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r0, r0, &(0x7f0000000000), 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000100)={0x0, 0x0}) sched_setaffinity(r2, 0x8, &(0x7f0000000500)=0xa000000000000005) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0}, 0x0) setreuid(0x0, r3) r4 = getpgrp(0x0) setpriority(0x0, r4, 0xffff) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000900)={r4}, 0xc) shmctl$IPC_SET(0x0, 0x1, &(0x7f00000001c0)={{0x6, r3, 0xee01, 0x0, 0xee01, 0x10, 0x319a}, 0x81, 0xe86b, 0x0, 0x10000020, r4, r2, 0x201}) r5 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r5, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r5, r5, &(0x7f0000000000), 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r5, 0x84, 0x16, &(0x7f0000000280)={0x5, [0x3, 0x2, 0x8, 0xfffd, 0x200]}, &(0x7f00000002c0)=0xe) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@remote, @in=@loopback, 0x4e20, 0x7, 0x4e21, 0x5a, 0x2, 0x0, 0xc0, 0x16, r1, r3}, {0xffffffff, 0x8, 0x1, 0x43, 0x2, 0xfffffffffffffbff, 0x2b8fc328, 0xd108}, {0x5, 0x24b, 0x77f47e60, 0x100000001}, 0xff, 0x6e6bba, 0x3, 0x0, 0x2}, {{@in=@remote, 0x4d3, 0x2b}, 0x2, @in6=@dev={0xfe, 0x80, [], 0x1d}, 0x3501, 0xdced77de42300c82, 0x2, 0x5, 0xffffffff, 0x2, 0x1000}}, 0xe8) 10:09:26 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e63204006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:09:26 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') getdents64(r0, &(0x7f00000005c0)=""/153, 0x99) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r1, r1, &(0x7f0000000000), 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e23, @local}, {0x2, 0x4e24, @broadcast}, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x613e641193c47fd8, 0x0, 0x0, 0x0, 0x5, &(0x7f00000000c0)='gretap0\x00', 0x4, 0x7fffffff, 0x3ff}) getdents64(r0, &(0x7f0000000000)=""/186, 0xba) 10:09:26 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = syz_open_dev$video(&(0x7f0000000200)='/dev/video#\x00', 0x0, 0x2040) ioctl$VIDIOC_S_AUDOUT(r2, 0x40345632, &(0x7f0000000240)={0x2, "c3ef9f97cd3641a658b59d568cd61afca94488deea444327103c2bb3ce7fb743", 0x1}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0}, &(0x7f00000004c0)=0xc) io_setup(0x8, &(0x7f0000000280)=0x0) r5 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) io_submit(r4, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r5, 0x0, 0x0, 0x200, 0x0, 0x1}]) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r7, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x3}, 0x4) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x8888, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRESHEX=r5, @ANYBLOB="2c726f6f746d6f64653f30303030303030303030303030303030fd0034303030202c65725f69643da0eeb119a266777b39b23b2c7e448c8bca65a257474332e95588ff4b0ae83d8e4a2489c1833dfb5ea28429ff7c39ca9f5b5bfb347faff1f6478a46b897ac3ac6b2cc1b7b600bf4a8dc853afe30541f32c8b485883165b5c46b982d13e11aeae6ddbda0e29c76630000cf7b4f7d8c1d25db1d3dbb3f730f952a8d13df7aa9842061fc1a4ba836cc286f813ac645acddee4fde3ab4f57c7b2799923684a5af7dd4c4d766d9392bc88a", @ANYRESDEC=r6, @ANYBLOB="2c5039cb51705f69643d", @ANYRESDEC=r7, @ANYBLOB="2c15616c6c6f775f6f746865722c66756e633d43524544535f434845434b2c"]) syz_mount_image$erofs(&(0x7f0000000300)='erofs\x00', &(0x7f0000000340)='./bus\x00', 0x609, 0x1, &(0x7f0000000440)=[{&(0x7f0000000380)="21666796af3b0b55c787d24864fb04cd0bc11ad593210508a5d6a939716576f06dd3945a474872b8af96ba8a022c6b71e3dd3b95419ab1535e978dacd4fec8840793fd1cff9d1e2c44e3e59324990c982a1c9d393360db780c6aedc3d921d3ce6a5a3880bfc01b2da166715599f98adcf7667eba5d1922ac3d4a1c19dd1cdc5628957d6b0372f7103a9400a51d53aed329fe7b20a3178270d9195ea72141", 0x9e, 0xfffffffffffff1eb}], 0x20, &(0x7f0000000500)={[{@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}], [{@smackfsroot={'smackfsroot', 0x3d, 'systemem0md5sum$\x00'}}, {@dont_measure='dont_measure'}, {@uid_eq={'uid', 0x3d, r3}}, {@subj_role={'subj_role', 0x3d, 'systemem0md5sum$\x00'}}, {@fowner_lt={'fowner<', r6}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}]}) r8 = memfd_create(&(0x7f00000002c0)='systemem0md5sum$\x00', 0x0) ioctl$SIOCGIFHWADDR(r1, 0x8927, &(0x7f0000000100)) r9 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r9, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r9, r9, &(0x7f0000000000), 0x0) r10 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r10, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r10, r10, &(0x7f0000000000), 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r10, 0xc00c642e, &(0x7f0000000140)={0x0, 0x80000, r1}) ioctl$DRM_IOCTL_GEM_CLOSE(r9, 0x40086409, &(0x7f00000001c0)={r11}) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r8, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, {0x4000001}, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) r12 = open(&(0x7f00000001c0)='./bus\x00', 0x1c1442, 0x0) write$P9_RREADLINK(r12, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r12, r12, &(0x7f0000000000), 0x0) write$FUSE_INTERRUPT(r12, &(0x7f0000000280)={0x10, 0x0, 0x6}, 0x10) syz_open_procfs(0x0, &(0x7f0000000040)='coredump_filter\x00*\x0e\xc3=.\x13\xcbx\x95*\xeeX\x9fcy\xa49\xf6\x8f\x82^\x19\xa9\xcd+\b\x9f\xc6,\xa0\xf0\xff\x9dO\x06\xc9\x15\xda\xa4\x7fh\xd4\xe8C\xdeKUrR\xf4\x9c\x87\xee\xd2\xfb\xdfs\xd0G\x91\x02\x15Z\xa8\x1ad\xadY\x13\x14mg\xc9\x00\x16\xa4\xc48\x06u\x1e:\xd4Y?\xd8P\xe8reP\xffv\xd6\x12\x85N1\n\f\xb0\x1e\xe7\xffD\x1aS\xbf0\x80\xff\xff7V\xcc5\x96W\x14J\xe2\x93\xe3\xc6A7\xd8\xec\xb2m\xf5\x16-\x1b\xbd\x11\x1aYg\xe0\xa7\xd19\a') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 10:09:26 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'syz_tun\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000002700)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r8, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000002700)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r9}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) r10 = dup(r0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r11 = memfd_create(&(0x7f00000002c0)='systemem0md5sum$\x00', 0x0) ioctl$SIOCGIFHWADDR(r10, 0x8927, &(0x7f0000000100)) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r11, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, {0x4000001}, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000040)='coredump_filter\x00*\x0e\xc3=.\x13\xcbx\x95*\xeeX\x9fcy\xa49\xf6\x8f\x82^\x19\xa9\xcd+\b\x9f\xc6,\xa0\xf0\xff\x9dO\x06\xc9\x15\xda\xa4\x7fh\xd4\xe8C\xdeKUrR\xf4\x9c\x87\xee\xd2\xfb\xdfs\xd0G\x91\x02\x15Z\xa8\x1ad\xadY\x13\x14mg\xc9\x00\x16\xa4\xc48\x06u\x1e:\xd4Y?\xd8P\xe8reP\xffv\xd6\x12\x85N1\n\f\xb0\x1e\xe7\xffD\x1aS\xbf0\x80\xff\xff7V\xcc5\x96W\x14J\xe2\x93\xe3\xc6A7\xd8\xec\xb2m\xf5\x16-\x1b\xbd\x11\x1aYg\xe0\xa7\xd19\a') r12 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r12, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0xfffffffffffffe67) sendfile(r12, r12, &(0x7f0000000000), 0x0) getsockopt$inet_udp_int(r12, 0x11, 0x0, &(0x7f00000001c0), &(0x7f0000000200)=0x4) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 10:09:26 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r0, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r0, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r2, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r2, 0x0) close(0xffffffffffffffff) [ 1657.484874][ T441] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1657.514449][ T442] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1657.519304][ T449] bridge9: port 1(syz_tun) entered blocking state [ 1657.533018][ T442] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors 10:09:26 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r0, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r0, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r2, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r2, 0x0) close(0xffffffffffffffff) [ 1657.575431][ T442] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1657.594294][ T441] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1657.616528][ T449] bridge9: port 1(syz_tun) entered disabled state [ 1657.633248][ T441] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1657.655112][ T449] device syz_tun entered promiscuous mode [ 1657.665702][ T442] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 1657.697752][ T441] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 10:09:26 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r0, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r0, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000016ffc)=0xd6c4, 0x4) bind$inet(r2, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) listen(r2, 0x0) close(0xffffffffffffffff) 10:09:26 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e63304006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:09:26 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f00000002c0)='systemem0md5sum$\x00', 0x0) ioctl$SIOCGIFHWADDR(r1, 0x8927, &(0x7f0000000100)) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r2, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, {0x4000001}, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000040)='coredump_filter\x00*\x0e\xc3=.\x13\xcbx\x95*\xeeX\x9fcy\xa49\xf6\x8f\x82^\x19\xa9\xcd+\b\x9f\xc6,\xa0\xf0\xff\x9dO\x06\xc9\x15\xda\xa4\x7fh\xd4\xe8C\xdeKUrR\xf4\x9c\x87\xee\xd2\xfb\xdfs\xd0G\x91\x02\x15Z\xa8\x1ad\xadY\x13\x14mg\xc9\x00\x16\xa4\xc48\x06u\x1e:\xd4Y?\xd8P\xe8reP\xffv\xd6\x12\x85N1\n\f\xb0\x1e\xe7\xffD\x1aS\xbf0\x80\xff\xff7V\xcc5\x96W\x14J\xe2\x93\xe3\xc6A7\xd8\xec\xb2m\xf5\x16-\x1b\xbd\x11\x1aYg\xe0\xa7\xd19\a') prctl$PR_SET_DUMPABLE(0x4, 0x0) shmdt(0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 10:09:27 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000308e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:09:27 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0x10, 0x2}, 0x10) sendto$inet(r0, &(0x7f0000000480)='R', 0x1, 0x141, &(0x7f0000000000)={0x10, 0x2}, 0x10) 10:09:27 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r0, r0, &(0x7f0000000000), 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000140)=[@in={0x2, 0x4e23, @empty}, @in={0x2, 0x4e23, @local}, @in6={0xa, 0x4e21, 0x3f, @remote, 0x7}, @in6={0xa, 0x4e22, 0x9, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa, 0x4e23, 0x7cbc, @mcast2, 0x1000}], 0x74) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r1, r1, &(0x7f0000000000), 0x0) ioctl$BLKPBSZGET(r1, 0x127b, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1658.137373][ T577] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1658.174453][ T577] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1658.188621][ T577] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock 10:09:27 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f00000002c0)='systemem0md5sum$\x00', 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x0) ioctl$SIOCGIFHWADDR(r3, 0x8927, &(0x7f0000000100)) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x30}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x3c, r4, 0x800, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_PEER_V4={0x8, 0x8, @broadcast}, @FOU_ATTR_AF={0x8, 0x2, 0x2}, @FOU_ATTR_AF={0x8, 0x2, 0x2}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e21}]}, 0x3c}, 0x1, 0x0, 0x0, 0x10}, 0x4000) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r2, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, {0x4000001}, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000040)='coredump_filter\x00*\x0e\xc3=.\x13\xcbx\x95*\xeeX\x9fcy\xa49\xf6\x8f\x82^\x19\xa9\xcd+\b\x9f\xc6,\xa0\xf0\xff\x9dO\x06\xc9\x15\xda\xa4\x7fh\xd4\xe8C\xdeKUrR\xf4\x9c\x87\xee\xd2\xfb\xdfs\xd0G\x91\x02\x15Z\xa8\x1ad\xadY\x13\x14mg\xc9\x00\x16\xa4\xc48\x06u\x1e:\xd4Y?\xd8P\xe8reP\xffv\xd6\x12\x85N1\n\f\xb0\x1e\xe7\xffD\x1aS\xbf0\x80\xff\xff7V\xcc5\x96W\x14J\xe2\x93\xe3\xc6A7\xd8\xec\xb2m\xf5\x16-\x1b\xbd\x11\x1aYg\xe0\xa7\xd19\a') setxattr$security_capability(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f0000000240)=@v2={0x2000000, [{0x80000000, 0x1}, {0x2, 0x1}]}, 0x14, 0x2) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') [ 1658.229258][ T577] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 1658.504279][ T691] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1658.532260][ T691] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1658.579624][ T691] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1658.596256][ T691] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 10:09:35 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') getdents64(r0, &(0x7f00000005c0)=""/153, 0x99) ioctl$VHOST_SET_VRING_CALL(r0, 0x4008af21, &(0x7f00000000c0)={0x1, r0}) getdents64(r0, &(0x7f0000000000)=""/186, 0xba) ioctl$TCSETX(r0, 0x5433, &(0x7f0000000100)={0x5, 0xf66e, [0x800, 0xff, 0x9, 0x0, 0xb63c], 0x86}) 10:09:35 executing program 0: openat$apparmor_task_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = dup2(r0, r0) shutdown(r1, 0x0) recvmmsg(r1, &(0x7f0000000000), 0xfffffffffffffe85, 0x0, 0x0) 10:09:35 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r1, r1, &(0x7f0000000000), 0x0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r2, r2, &(0x7f0000000000), 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) accept4$inet6(r3, &(0x7f0000000140)={0xa, 0x0, 0x0, @local}, &(0x7f00000001c0)=0x1c, 0x1800) r4 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = memfd_create(&(0x7f00000002c0)='systemem0md5sum$\x00', 0x0) ioctl$SIOCGIFHWADDR(r4, 0x8927, &(0x7f0000000100)) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r5, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, {0x4000001}, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000040)='coredump_filter\x00*\x0e\xc3=.\x13\xcbx\x95*\xeeX\x9fcy\xa49\xf6\x8f\x82^\x19\xa9\xcd+\b\x9f\xc6,\xa0\xf0\xff\x9dO\x06\xc9\x15\xda\xa4\x7fh\xd4\xe8C\xdeKUrR\xf4\x9c\x87\xee\xd2\xfb\xdfs\xd0G\x91\x02\x15Z\xa8\x1ad\xadY\x13\x14mg\xc9\x00\x16\xa4\xc48\x06u\x1e:\xd4Y?\xd8P\xe8reP\xffv\xd6\x12\x85N1\n\f\xb0\x1e\xe7\xffD\x1aS\xbf0\x80\xff\xff7V\xcc5\x96W\x14J\xe2\x93\xe3\xc6A7\xd8\xec\xb2m\xf5\x16-\x1b\xbd\x11\x1aYg\xe0\xa7\xd19\a') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 10:09:35 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e63404006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:09:35 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0xffffffff00000001, 0x1, &(0x7f00000007c0)=[{&(0x7f00000002c0)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffdd3, 0x9}], 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000880)=ANY=[@ANYBLOB='\x00'], 0x1) sendfile(r0, r0, &(0x7f0000000000), 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r0, 0x8983, &(0x7f0000000140)={0x0, 'vlan0\x00', {}, 0x5}) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000040)=""/15) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0xe948f2bb6d123345, 0x80) write$P9_RREADLINK(r1, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r1, r1, &(0x7f0000000000), 0x0) recvfrom$unix(r1, &(0x7f0000000200)=""/143, 0x8f, 0x100, 0x0, 0x0) 10:09:35 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000309e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1666.800937][ T741] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1666.851350][ T742] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1666.877743][ T742] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1666.888850][ T742] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock 10:09:35 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f00000002c0)='systemem0md5sum$\x00', 0x0) ioctl$SIOCGIFHWADDR(r1, 0x8927, &(0x7f0000000100)) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r2, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, {0x1}, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000040)='coredump_filter\x00*\x0e\xc3=.\x13\xcbx\x95*\xeeX\x9fcy\xa49\xf6\x8f\x82^\x19\xa9\xcd+\b\x9f\xc6,\xa0\xf0\xff\x9dO\x06\xc9\x15\xda\xa4\x7fh\xd4\xe8C\xdeKUrR\xf4\x9c\x87\xee\xd2\xfb\xdfs\xd0G\x91\x02\x15Z\xa8\x1ad\xadY\x13\x14mg\xc9\x00\x16\xa4\xc48\x06u\x1e:\xd4Y?\xd8P\xe8reP\xffv\xd6\x12\x85N1\n\f\xb0\x1e\xe7\xffD\x1aS\xbf0\x80\xff\xff7V\xcc5\x96W\x14J\xe2\x93\xe3\xc6A7\xd8\xec\xb2m\xf5\x16-\x1b\xbd\x11\x1aYg\xe0\xa7\xd19\a') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') [ 1666.905460][ T741] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1666.909711][ T742] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 1666.979396][ T741] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1666.994584][ T741] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 10:09:36 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="80000000380400001900030ae60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:09:36 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f00000002c0)='systemem0md5sum$\x00', 0x0) ioctl$SIOCGIFHWADDR(r1, 0x8927, &(0x7f0000000100)) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r4, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x0) fcntl$dupfd(r3, 0x406, r4) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r2, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, {0x4000001}, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000040)='coredump_filter\x00*\x0e\xc3=.\x13\xcbx\x95*\xeeX\x9fcy\xa49\xf6\x8f\x82^\x19\xa9\xcd+\b\x9f\xc6,\xa0\xf0\xff\x9dO\x06\xc9\x15\xda\xa4\x7fh\xd4\xe8C\xdeKUrR\xf4\x9c\x87\xee\xd2\xfb\xdfs\xd0G\x91\x02\x15Z\xa8\x1ad\xadY\x13\x14mg\xc9\x00\x16\xa4\xc48\x06u\x1e:\xd4Y?\xd8P\xe8reP\xffv\xd6\x12\x85N1\n\f\xb0\x1e\xe7\xffD\x1aS\xbf0\x80\xff\xff7V\xcc5\x96W\x14J\xe2\x93\xe3\xc6A7\xd8\xec\xb2m\xf5\x16-\x1b\xbd\x11\x1aYg\xe0\xa7\xd19\a') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 10:09:36 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60006006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:09:36 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) memfd_create(&(0x7f00000002c0)='systemem0md5sum$\x00', 0x0) ioctl$SIOCGIFHWADDR(r1, 0x8927, &(0x7f0000000100)) r2 = mq_open(&(0x7f0000000140), 0x2, 0x81, &(0x7f00000001c0)={0x6e81, 0x9, 0x2fe, 0x8}) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x1010, r2, 0xffffe000) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, {0x4000001}, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000040)='coredump_filter\x00*\x0e\xc3=.\x13\xcbx\x95*\xeeX\x9fcy\xa49\xf6\x8f\x82^\x19\xa9\xcd+\b\x9f\xc6,\xa0\xf0\xff\x9dO\x06\xc9\x15\xda\xa4\x7fh\xd4\xe8C\xdeKUrR\xf4\x9c\x87\xee\xd2\xfb\xdfs\xd0G\x91\x02\x15Z\xa8\x1ad\xadY\x13\x14mg\xc9\x00\x16\xa4\xc48\x06u\x1e:\xd4Y?\xd8P\xe8reP\xffv\xd6\x12\x85N1\n\f\xb0\x1e\xe7\xffD\x1aS\xbf0\x80\xff\xff7V\xcc5\x96W\x14J\xe2\x93\xe3\xc6A7\xd8\xec\xb2m\xf5\x16-\x1b\xbd\x11\x1aYg\xe0\xa7\xd19\a') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') [ 1667.562979][ T1052] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1667.578386][ T1052] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1667.611877][ T1052] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1667.685953][ T1087] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1667.700556][ T1052] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 1667.717659][ T1087] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1667.752062][ T1087] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock 10:09:36 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='systemem0md5sum$\x00', 0x0) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000100)) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, {0x4000001}, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000040)='coredump_filter\x00*\x0e\xc3=.\x13\xcbx\x95*\xeeX\x9fcy\xa49\xf6\x8f\x82^\x19\xa9\xcd+\b\x9f\xc6,\xa0\xf0\xff\x9dO\x06\xc9\x15\xda\xa4\x7fh\xd4\xe8C\xdeKUrR\xf4\x9c\x87\xee\xd2\xfb\xdfs\xd0G\x91\x02\x15Z\xa8\x1ad\xadY\x13\x14mg\xc9\x00\x16\xa4\xc48\x06u\x1e:\xd4Y?\xd8P\xe8reP\xffv\xd6\x12\x85N1\n\f\xb0\x1e\xe7\xffD\x1aS\xbf0\x80\xff\xff7V\xcc5\x96W\x14J\xe2\x93\xe3\xc6A7\xd8\xec\xb2m\xf5\x16-\x1b\xbd\x11\x1aYg\xe0\xa7\xd19\a') prctl$PR_SET_DUMPABLE(0x4, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000880)=ANY=[@ANYBLOB="18"], 0x1) sendfile(r2, r2, &(0x7f0000000000)=0x1000, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="f0883571000000020000000000000000"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r4, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x0) write$P9_RREADLINK(r3, &(0x7f0000000400)=ANY=[@ANYBLOB="fe72b1c968f84cbf628c36ba456a723c7d0957a36dafc61d5b1ea5c50b2a18329a99b560d1ce13092b27f8d8b1ecaec68140e11fc502ecbb531d5ead6baf342e739a11c593e619eb2c8b9ca4912d61a12a41c871a307e954eaf4bace8861515032907ceef43cf1dea7358ee08a4749dd07d4fd843fb572e4aadd880245543e3fe8cccbc4aadd17d45a10156716f99b8936ad16fa489b75631501af299a961956012a2032fbde4206e9ee68086a44409cacdaff4a0563debb1c270f6b489f9bbc"], 0xc0) sendfile(r1, r1, &(0x7f0000000000), 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000140)=0x0) syz_open_procfs(r5, &(0x7f0000000180)='net/ip_tables_targets\x00') [ 1667.803491][ T1087] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 10:09:41 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e6f825006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:09:41 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="80000000380400001900030ce60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:09:41 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f00000002c0)='systemem0md5sum$\x00', 0x0) ioctl$SIOCGIFHWADDR(r1, 0x8927, &(0x7f0000000100)) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x800, 0x0) ioctl$PPPIOCSDEBUG(r3, 0x40047440, &(0x7f00000001c0)=0x5) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r2, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, {0xe0e}, 0x8e0519ef98ce978d, 0x0}, 0x0, 0x8, &(0x7f0000000000)) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r4, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x0) ioctl$VFIO_GET_API_VERSION(r4, 0x3b64) syz_open_procfs(0x0, &(0x7f0000000040)='coredump_filter\x00*\x0e\xc3=.\x13\xcbx\x95*\xeeX\x9fcy\xa49\xf6\x8f\x82^\x19\xa9\xcd+\b\x9f\xc6,\xa0\xf0\xff\x9dO\x06\xc9\x15\xda\xa4\x7fh\xd4\xe8C\xdeKUrR\xf4\x9c\x87\xee\xd2\xfb\xdfs\xd0G\x91\x02\x15Z\xa8\x1ad\xadY\x13\x14mg\xc9\x00\x16\xa4\xc48\x06u\x1e:\xd4Y?\xd8P\xe8reP\xffv\xd6\x12\x85N1\n\f\xb0\x1e\xe7\xffD\x1aS\xbf0\x80\xff\xff7V\xcc5\x96W\x14J\xe2\x93\xe3\xc6A7\xd8\xec\xb2m\xf5\x16-\x1b\xbd\x11\x1aYg\xe0\xa7\xd19\a') r5 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', 0x2800, 0x0) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000440)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r5, &(0x7f0000000540)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000500)={&(0x7f0000000300)=ANY=[@ANYBLOB="48374109ebbbba12521c7101d45b7a0a6c35cbc3e3b5a233e61a4a0ad22094fdceb902a5a9e7ccdd6b9e00007d", @ANYRES16=r6, @ANYBLOB="100428bd7000fedbdf251000000008000500060000001c00020008a909060000000008000600dbb03f03b8983416db42b156cb5eaa00000800060056ab860708000500870d00000800050007000000"], 0x48}, 0x1, 0x0, 0x0, 0x41800}, 0x4000000) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 10:09:41 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xc0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x1000, 0x0, 0x0, 0x0, &(0x7f0000000300)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x200000c, 0x2, 0x14}, &(0x7f0000000380)=0x94, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=0x15}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000640)=r0, 0x4) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) r2 = getpgrp(0xffffffffffffffff) prlimit64(r2, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) syz_open_procfs(r2, &(0x7f00000000c0)='net/mcfilter\x00') r3 = syz_open_procfs(r2, &(0x7f0000000280)='net/ip6_mr_cache\x00') r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r4, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x0) ioctl$KDGETMODE(r4, 0x4b3b, &(0x7f0000000200)) sendmsg$kcm(r3, &(0x7f0000000780)={&(0x7f0000000440)=@isdn={0x22, 0x5, 0x40, 0x80, 0x3}, 0x80, &(0x7f0000000500)=[{&(0x7f00000008c0)="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", 0x1000}, {&(0x7f00000006c0)="a9992dc6a01ab9f6b59a27455023a0e63cae9af4aa9120b22d197df6e3a0638c1d61a116740d881e3b8ed67926e3274c43d5b49223bf7a2b758eaf890d82aab8a07759ffb58772edbbb933392766495ff665fc85f6807f87b133ffd43a658c8bf6952420773620b9e519847da884351fbe30bdd172b1a14417a401e72dd2e6df303802aabff55237ddfaea01e484511620d02b3b4de44b9a0ea15a358ab6609218e6f81effffedac49dbd8f2a70cd5824bade8f57278352aa65709c1", 0xbc}, {&(0x7f00000018c0)="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", 0x1000}, {&(0x7f00000002c0)="1e7bac6eae871ac4830c45e9ec9f5eee9ea7e1ef6569ec744d12b6964d01f31396a762b81eb824f70f3e94f145", 0x2d}, {&(0x7f00000028c0)="d5ba86e7d38c84351de0a026aa03c2935100d3e7944285b02654707cc6ea3e25452f972d42c7a93808e712a815d190b0e4cf60bac30125b1d764ade7bd6de021afc76e15c554caca780b61bdabf3b9c532c41d2db9f0b79ca41f869b62c3703b6c6b249886d4bf76220730de3eca276cb6cb0f8f44404ecb3978194875425d127006eeb5b4356a761b68f0ba513c5ee9533d345429db17a243fc28aecf81415714b0ce8cba14aed005ef9992585e4c96e650d765e3ad396f9ea52ee0584f4e68d8cdba38cf2a421542c8a2f0", 0xcc}, {&(0x7f00000029c0)="5733f89495d23c4c299e4cae592ac85c9e61b1d3adfb78c3c293ca197984f462e6c2a40d436e32e5e6dba74652728bbe31b04d56d19c7c81e8924253bcc2f028bbfc68ecb59031e1dd7200e72caa5811a9aacf25a15eb41632ea6d5d348e25982410e82b46a3b3a0d8ec3d24012b9cf35f9710127b86b3b1ed45a1cca2a7b43dc61f7836c0bacce2b8160df0175f093669254c225f6e0ea313db51725f0b3fab10f6e2968c14cb7e9577b800bcc4725efddabb5660cec687ddbcb05e22d2e52f93e1f492466716cd601eaf71a7de15c55d8c660d689201", 0xd7}, {&(0x7f0000002ac0)="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", 0xfb}, {&(0x7f0000002bc0)="466b806c1d9a97daf721aa94c6584a9db35182ae6c4de2b490104b6475a0b6f659087cc0b1cd680662b459fa38653710de6748c43efe5201f6bc7734305af9e14cba3ce75538259ae27d40ddaa4d17f45ff2084ef48bf7300ff6215cffe393677891f633e14bda792810f51dc83a340affda20e7e9190c8de32a1eebece240f4206fbebab43a71d78616796acd655b0b185f9ba5511786bee6e1f904394ceb3b0c6457a9db3e35d4d5dada3445c49576039432f546fcc15061d65dcb65acb4923d037f9655027f057d7b6d5bf03c2e1c74ff81e2def42ccb47578f99916bb925", 0xe0}], 0x8, &(0x7f0000002cc0)=[{0x1010, 0x113, 0xfffffffa, "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"}, {0x108, 0x22a, 0xc2, "7ce9161081bee9fc33db26bbe1b97db1ab43e34463fcbabf812fae3f9f4aa032e62c353242b7630d75147cb70661a3e1d3d2e949245fd900d16e8010034f295e1f57b441eacae4e87703b447300f1026fa39f8e15f621e604dc1217981b385ccbe865cb29f978550097f1c1f60333cd59eac267cc48ff8343b9e96dafa23d3fd6ecdfe6608f7881531be19d60eca613269dd95ffba7fb8fa60a97d6c9101edfba5e1e9410175ec62f904767bb294c70ef1f1f023d90a28594fa69d503e04325ba83f83c58ae71049f18de97f27b6abc3dbd74ebe8469eea847c264e58aca7cd9bcb88ae78261fa2b4d629879a558d74c82"}, {0x60, 0x10e, 0x9, "de2b6bca79924369f0ef79acd0f873c2ecb616cdb8014eea7c2e8ee1a048f2651b7a048ea10b521f0f953b27f007db789c539280c1f922f34ec378d8f22e92fa49f528e89c8d9a61c797"}, {0x18, 0x102, 0x7fffffff, "c156e563"}, {0xd8, 0x118, 0x3ff, "beac72da14a351652f2b9cdaf750ea4184995dc3026fae8f2906722ada7ea9068e73ca5f6014e6ace569c936d042be387c14cfbfb8278e9c0a2ccaf131f23541e51704136fa6d703b5b6571cd469be1f1867142551e3aea9aeaa407f9c181304f0ca97c59ac7cddbb3cda738c425ce8f5efccd62c0a56d4c9b5cc10dc6850152af7567edb590899465b16ef1f6f9ed56692ccc86a4ff4fa44f1bbeb1538041c71ccbedab895d60d6bc82ecad11e6c56b87ca9d2b09ab33994e8971f9e28aa7305d"}], 0x1268}, 0x4000) sendfile(r1, r1, &(0x7f0000000000), 0x0) ioctl$SOUND_MIXER_INFO(r1, 0x805c4d65, &(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x2000000f, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, r0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:09:41 executing program 0: openat$apparmor_task_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = dup2(r0, r0) shutdown(r1, 0x0) recvmmsg(r1, &(0x7f0000000000), 0xfffffffffffffe85, 0x0, 0x0) 10:09:41 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r0, r0, &(0x7f0000000000), 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000100)={r1, 0x0, 0x1}, 0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f00000000c0)={r1, 0x99, 0x10, 0x4, 0x3b}, &(0x7f0000000100)=0x18) r2 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') getdents64(r2, &(0x7f00000005c0)=""/153, 0x99) socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x0) ioctl$SCSI_IOCTL_DOORLOCK(r3, 0x5380) getdents64(r2, &(0x7f0000000000)=""/186, 0xba) 10:09:42 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x3f, 0x800) ioctl$IOC_PR_REGISTER(r0, 0x401870c8, &(0x7f0000000080)={0x7, 0x2, 0x1}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = memfd_create(&(0x7f00000002c0)='systemem0md5sum$\x00', 0x0) ioctl$SIOCGIFHWADDR(r2, 0x8927, &(0x7f0000000140)) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r3, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, {0x4000001}, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000300)='coredump_filter\x00*\x0e\xc3=.\x13\xcbx\x95*\xeeX\x9fcy\xa49\xf6\x8f\x82^\x19\xa9\xcd+\b\x9f\xc6,\xa0\xf0\xff\x9dO\x06\xc9\x15\xda\xa4\x7fh\xd4\xe8C\xdeKUrR\xf4\x9c\x87\xee\xd2\xfb\xdfs\xd0G\x91\x02\x15Z\xa8\x1ad\xadY\x13\x14mg\xc9\x00\x16\xa4\xc48\x06u\x1e:\xd4Y?\xd8P\xe8reP\xffv\xd6\x12\x85N1\n\f\xb0\x1e\xe7\xffD\x1aS\xbf0\x80\xff\xff7V\xcc5\x96W\x14J\xe2\x93\xe3\xc6A7\xd8\xec\xb2m\xf5\x16-\x1b\xbd\x11\x1aYg\xe0\xa7\xd19\a') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') [ 1673.145431][ T1343] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1673.155222][ T1343] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1673.166766][ T1226] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1673.262905][ T1226] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors 10:09:42 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f00000002c0)='systemem0md5sum$\x00', 0x0) ioctl$SIOCGIFHWADDR(r1, 0x8927, &(0x7f0000000100)) mmap(&(0x7f0000289000/0x4000)=nil, 0x4000, 0x1000001, 0x20010, r2, 0x0) rt_sigaction(0x1e, &(0x7f0000b4a000)={0xfffffffffffffffd, {0x4000001}, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) r3 = syz_open_dev$swradio(&(0x7f0000000140)='/dev/swradio#\x00', 0x1, 0x2) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r3) syz_open_procfs(0x0, &(0x7f0000000040)='coredump_filter\x00*\x0e\xc3=.\x13\xcbx\x95*\xeeX\x9fcy\xa49\xf6\x8f\x82^\x19\xa9\xcd+\b\x9f\xc6,\xa0\xf0\xff\x9dO\x06\xc9\x15\xda\xa4\x7fh\xd4\xe8C\xdeKUrR\xf4\x9c\x87\xee\xd2\xfb\xdfs\xd0G\x91\x02\x15Z\xa8\x1ad\xadY\x13\x14mg\xc9\x00\x16\xa4\xc48\x06u\x1e:\xd4Y?\xd8P\xe8reP\xffv\xd6\x12\x85N1\n\f\xb0\x1e\xe7\xffD\x1aS\xbf0\x80\xff\xff7V\xcc5\x96W\x14J\xe2\x93\xe3\xc6A7\xd8\xec\xb2m\xf5\x16-\x1b\xbd\x11\x1aYg\xe0\xa7\xd19\a') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000200)='\x06\x00u\x00') [ 1673.365374][ T1343] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1673.379779][ T1226] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock 10:09:42 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r0, r0, &(0x7f0000000000), 0x0) setns(r0, 0x20000) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1673.444801][ T1343] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 1673.493499][ T1226] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 10:09:42 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r2, r2, &(0x7f0000000000), 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r2, 0xc0585604, &(0x7f00000001c0)={0x1, 0x0, {0x3, 0x7, 0x1009, 0x1, 0x2, 0x7, 0x3, 0x6524dbf4da8d8bc2}}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = memfd_create(&(0x7f00000002c0)='systemem0md5sum$\x00', 0x0) ioctl$SIOCGIFHWADDR(r1, 0x8927, &(0x7f0000000100)) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x200000, 0x0) connect$bt_l2cap(r4, &(0x7f0000000240)={0x1f, 0x9, {0x9, 0x9, 0xc9, 0x0, 0xfb, 0x1f}, 0x7, 0x7}, 0xe) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r3, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, {0x4000001}, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000040)='coredump_filter\x00*\x0e\xc3=.\x13\xcbx\x95*\xeeX\x9fcy\xa49\xf6\x8f\x82^\x19\xa9\xcd+\b\x9f\xc6,\xa0\xf0\xff\x9dO\x06\xc9\x15\xda\xa4\x7fh\xd4\xe8C\xdeKUrR\xf4\x9c\x87\xee\xd2\xfb\xdfs\xd0G\x91\x02\x15Z\xa8\x1ad\xadY\x13\x14mg\xc9\x00\x16\xa4\xc48\x06u\x1e:\xd4Y?\xd8P\xe8reP\xffv\xd6\x12\x85N1\n\f\xb0\x1e\xe7\xffD\x1aS\xbf0\x80\xff\xff7V\xcc5\x96W\x14J\xe2\x93\xe3\xc6A7\xd8\xec\xb2m\xf5\x16-\x1b\xbd\x11\x1aYg\xe0\xa7\xd19\a') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 10:09:42 executing program 1: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x4101, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000140)={0x4a, 0x4, &(0x7f0000000800)="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"}) flock(r0, 0x3) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000000200)={{0x1, 0xff}, {0xda, 0x81}, 0x1ff, 0x1, 0x1}) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc8, 0x0, 0x0, 0x0, 0x268, 0x0, 0xd9e83a284901a4b4, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0xfffffffffffffc39) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000280)="800000003804000019000300e60100006c0000000000000001000c29c52c59abe89e426f19d931000001000080000000101308006d5ebe5a0000ffff53ef000000000000000000f7b2e9ddde660f35c7168f11a48cd6fe2d57c8e84b4207c42e46b0eb381b7887e15ad15e3ecc0c440c15c4f69bd1a51678b48167a4b3736e5ab5bfe59a6e7f40b5fdaa5556622c69cba1250d8daf7d9e34a49b7e15609debbbe89f5a0b6458635e454e3df4ca243e6c7413b0ac13490dbc", 0xb8, 0x400}], 0x4801, 0x0) 10:09:42 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000323e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:09:43 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60326006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:09:43 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r2, r2, &(0x7f0000000000), 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r2, 0x10e, 0x5, &(0x7f0000000140)=0x3, 0x4) r3 = memfd_create(&(0x7f00000002c0)='systemem0md5sum$\x00', 0x0) ioctl$SIOCGIFHWADDR(r1, 0x8927, &(0x7f0000000100)) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r3, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, {0x4000001}, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000040)='coredump_filter\x00*\x0e\xc3=.\x13\xcbx\x95*\xeeX\x9fcy\xa49\xf6\x8f\x82^\x19\xa9\xcd+\b\x9f\xc6,\xa0\xf0\xff\x9dO\x06\xc9\x15\xda\xa4\x7fh\xd4\xe8C\xdeKUrR\xf4\x9c\x87\xee\xd2\xfb\xdfs\xd0G\x91\x02\x15Z\xa8\x1ad\xadY\x13\x14mg\xc9\x00\x16\xa4\xc48\x06u\x1e:\xd4Y?\xd8P\xe8reP\xffv\xd6\x12\x85N1\n\f\xb0\x1e\xe7\xffD\x1aS\xbf0\x80\xff\xff7V\xcc5\x96W\x14J\xe2\x93\xe3\xc6A7\xd8\xec\xb2m\xf5\x16-\x1b\xbd\x11\x1aYg\xe0\xa7\xd19\a') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 10:09:43 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$pokeuser(0x6, r0, 0x388, 0xffffffffffffffff) sched_getattr(r0, &(0x7f0000000140)={0x38}, 0x38, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) r1 = open(&(0x7f0000000180)='./bus\x00', 0x286980, 0x0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r2, r2, &(0x7f0000000000), 0x0) ioctl$EVIOCGEFFECTS(r2, 0x80044584, &(0x7f0000000ec0)=""/52) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(r1, &(0x7f0000000500)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000480)={&(0x7f0000000240)={0x204, r3, 0x10, 0x70bd2c, 0x25dfdbfb, {}, [@TIPC_NLA_NODE={0x30, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8c34}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x80000000}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x400}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8b11}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_BEARER={0xd4, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @multicast2}}, {0x14, 0x2, @in={0x2, 0x4e21, @multicast2}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x100, @ipv4={[], [], @multicast2}, 0x3f}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'veth1\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @loopback}}, {0x14, 0x2, @in={0x2, 0x4e23, @multicast1}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'eth', 0x3a, 'veth1_to_bond\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7}]}, @TIPC_NLA_MON={0x3c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7f}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3ff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3f}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfff}]}, @TIPC_NLA_MEDIA={0xb0, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x401}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffff8970}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}]}, 0x204}, 0x1, 0x0, 0x0, 0x800}, 0x10) syz_mount_image$jfs(&(0x7f00000006c0)='jfs\x00', &(0x7f0000000700)='./file0\x00', 0x7f, 0x9, &(0x7f0000000d40)=[{&(0x7f00000008c0)="c5d09b1ea172cf48e6efb91ffacd08dffb587007ef9cf5db73a158499104180db168ff798d470a55e175d03f992997b851c5a17bad814276be3e5eb4263b05f90356c1f1cce64f655eb7660d00f91ae2b23210be4471e9d93948d1bdaa575aaf630fc2552703e340ffce78bb3362d2015289f5aa690cdf622258d5997b2cae78580d8cee0606bfd6629603087c701c6fc6784892aab41653868b5762f0f17bf62cb6d18cd5ac6f734ba492341629df5525c77603fac0833990aec39b2ac5c1a858371adc092155c2ce841ae5fdc0854e081ab9e9786494f72740260c576de9f7d64adcea42a07aad49e3", 0xea, 0x7}, {&(0x7f00000009c0)="04404eb8dbcbf0b59a0a0537456924b9ee36b89d8ac7143c0f45ed05c266e587a64f2bb9e4a78b039ae9245259fcccf693cdb84b8778bca4f88a816357231355e113bf46505d8da6962a2fd73c96ccd3e221e8118e29899df088117966e72f8a75d27a42196336c45d977782269703cc0b6beac58d8fddeeeb7b21244b5fedfcab6608882eedad7b3464fb2fb356d68bb29c6b16c44222ab0980ffd7e2610a1229c28db523448b4b218b3e94cee7683d7dd5f8c9ad44a745aa61f111e4bee46ddeeb88a415a20b06cf3e9a2dbe09fdb4d4541e", 0xd3, 0xfffffffffffffffb}, {&(0x7f0000000740)="0a0c9979d259ea3be826ea5f1965c85b726a4e4145dce28c49d13c3002585d55016d0b280c9a2e1e58572af813231f4dcd381a4d947132039fcf1ea5ef77544608822f1f57f825d04e1627f1c035c2", 0x4f, 0xffffffff}, {&(0x7f0000000ac0)="cb684d60c968293a400853ef0bf44984b6f7190065589f51e651c436f6439cec61c7ad0574e169da4fdd08bed3782a17c8957ed515158dd9aaec50adff259374ed12614a267d7d92458b05935b3c125b87ba68037e46350d253d581056fc25f44f9384cf224b73fe24c76ba89c2d2d4aec593a006109bda73bdcdb6561d41b8e740588a243b12f8c37afb1999a4d3b1a6ab2867eef16670b496c9322f42f33138c8855a1d97f8a71fdffc05b86aa7ebe2a4576a5e3f3a1a77bb885f2875f47f142a7fd4cf51d6d45cc8ed915b98e6f8c405f24c3bc5abb4d477c6337dfde2704cbc8cb769d", 0xe5, 0x3f}, {&(0x7f0000000800)="752dc42309af54b2137e0b", 0xb, 0x6}, {&(0x7f0000000840)="f2a4d8f575db1bc04f3133aa1eee15ab49606074a1ef7580a829002a39e8de8c2531a563e3f7fb723b504b973b3691", 0x2f, 0x91}, {&(0x7f0000000bc0)="1fb902c2ac0931c8a28faabae45b03939b11d2d8534f514d59949e65e40fa1d0eb4157fb2628f45ee2ff770dfc09c798644850adf16abb6b45ad212b654d7b4b3bbb933e8abe153fd916e3d7f0e91b370d230c65da334e5ea7d73c4d00db28b1b2cfb27da5063801a7fa9075696b378b57a8598fcd5b37bc417935d1d63e7bb92553d54c0d231695826c6821ae64f37989ddc3971c49edfd148633486e815b0214", 0xa1, 0x2}, {&(0x7f0000000c80)="3a8507696d1d4bcd320561d015cb67cc196ed3d245dc4185f481aa43136929dc4146ae27b77f011d8ba544fde141adbd56dc03f25a3e368d", 0x38, 0x82}, {&(0x7f0000000cc0)="869162cdfe4476eeb3520dc4680737e34f2ab8860245c9ab559ddf096e393124e7d2a6dbf4c5ef234ed859bad1da80dfc9806aefa7eaaf773d14060587351db5a6f567ce0e4ae2d93e3062f070adab55fb00dc669c5aaeea287f47f08e561c32f2b2950ccf27cb29447967b7b5d5ded457ecf9ed7ec3c6245ed00c8b6e", 0x7d, 0x7ff}], 0x20000c, &(0x7f0000000e40)={[{@umask={'umask', 0x3d, 0xfffffffffffffff9}}, {@integrity='integrity'}], [{@smackfshat={'smackfshat', 0x3d, 'veth1_to_bond\x00'}}, {@hash='hash'}]}) write$P9_RREADLINK(r1, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r1, r1, &(0x7f0000000000), 0x0) ioctl$USBDEVFS_DROP_PRIVILEGES(r1, 0x4004551e, &(0x7f0000000040)=0x80) rt_sigprocmask(0x0, &(0x7f0000000540)={0x2f}, 0x0, 0x8) [ 1674.284469][ T1707] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1674.322782][ T1707] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1674.334360][ T1707] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1674.380970][ T1707] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 1674.401449][ T1724] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1674.429090][ T1724] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors 10:09:43 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r0, r0, &(0x7f0000000000), 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400a00) clone(0x3a3dd40088192f01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f00000002c0)='systemem0md5sum$\x00', 0x0) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000100)) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, {0x4000001}, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0xa0c00, 0x0) ioctl$VT_SETMODE(r2, 0x5602, &(0x7f0000000200)={0x8, 0x0, 0x7, 0x2, 0x5}) syz_open_procfs(0x0, &(0x7f0000000040)='coredump_filter\x00*\x0e\xc3=.\x13\xcbx\x95*\xeeX\x9fcy\xa49\xf6\x8f\x82^\x19\xa9\xcd+\b\x9f\xc6,\xa0\xf0\xff\x9dO\x06\xc9\x15\xda\xa4\x7fh\xd4\xe8C\xdeKUrR\xf4\x9c\x87\xee\xd2\xfb\xdfs\xd0G\x91\x02\x15Z\xa8\x1ad\xadY\x13\x14mg\xc9\x00\x16\xa4\xc48\x06u\x1e:\xd4Y?\xd8P\xe8reP\xffv\xd6\x12\x85N1\n\f\xb0\x1e\xe7\xffD\x1aS\xbf0\x80\xff\xff7V\xcc5\x96W\x14J\xe2\x93\xe3\xc6A7\xd8\xec\xb2m\xf5\x16-\x1b\xbd\x11\x1aYg\xe0\xa7\xd19\a') prctl$PR_SET_DUMPABLE(0x4, 0x0) [ 1674.503043][ T1724] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1674.573522][ T1724] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 10:09:44 executing program 0: r0 = socket(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@nat={'nat\x00\x00\x00\x00h\x00', 0x3c1, 0x1, 0x1f8, [0x200006c0], 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000000000000000faffffff00000000000000000000000000000000000000000000ffffffff01000000150000002800000093007665746830000000010000000000000064756d6d7930000000000000000000006873723000000000000000000000000000000000001000000000001000000000aaaaaaaaaaaa0001fcffffffaaaaaaaaaa00ffff0000ff000000c0000000300100006801000069707673000000000000000000000000000000000000000000000000000000002800000000000000ac1414190000000000000000faffffffffffffffffffffffffffffff000000004e24ff01000000000000007265706c790000000000000000000000000000000000000000000000001000000000000000aaaaaa0f43aa0000fcffff0400000000736e61740000000000000000000000000000000000000a0000000000000000001000000000000000ffffffffffff0000fcffffff00000000646e617a9591e80900000000000000000000000000000000000000000000000010000000000000000180c200000100000fffe8000000000000000000000000000000000000000000000000000000000000000000a856177e0000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff00000000"]}, 0x270) [ 1675.730981][ T1970] xt_ipvs: protocol family 7 not supported 10:09:52 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') getdents64(r0, &(0x7f00000005c0)=""/153, 0x99) getdents64(r0, &(0x7f0000000000)=""/186, 0xba) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r0, 0x40bc5311, &(0x7f00000000c0)={0x6, 0x2, 'client1\x00', 0xffffffff80000006, "d8ee457b01f83635", "ba3d9fc6fa2f5b81e3f21955e4581bcdccdafdbb11b4465663a774e5b6ad11f6", 0x10000, 0x5e}) 10:09:52 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@local, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@initdev}}, &(0x7f0000000040)=0xe8) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x10, &(0x7f0000000300)={&(0x7f0000000240)=""/135, 0x87, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], r0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0), 0x8, 0x10, 0x0, 0x0, r1}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff}) ioctl$PPPIOCCONNECT(r2, 0x4004743a, &(0x7f00000003c0)=0x3) 10:09:52 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="80000000380400001900032de60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:09:52 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f00000002c0)='systemem0md5sum$\x00', 0x0) sched_setparam(0x0, &(0x7f0000000140)=0x101) ioctl$SIOCGIFHWADDR(r1, 0x8927, &(0x7f0000000100)) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r2, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, {0x4000001}, 0x80000004, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000040)='coredump_filter\x00*\x0e\xc3=.\x13\xcbx\x95*\xeeX\x9fcy\xa49\xf6\x8f\x82^\x19\xa9\xcd+\b\x9f\xc6,\xa0\xf0\xff\x9dO\x06\xc9\x15\xda\xa4\x7fh\xd4\xe8C\xdeKUrR\xf4\x9c\x87\xee\xd2\xfb\xdfs\xd0G\x91\x02\x15Z\xa8\x1ad\xadY\x13\x14mg\xc9\x00\x16\xa4\xc48\x06u\x1e:\xd4Y?\xd8P\xe8reP\xffv\xd6\x12\x85N1\n\f\xb0\x1e\xe7\xffD\x1aS\xbf0\x80\xff\xff7V\xcc5\x96W\x14J\xe2\x93\xe3\xc6A7\xd8\xec\xb2m\xf5\x16-\x1b\xbd\x11\x1aYg\xe0\xa7\xd19\a') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 10:09:52 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e6003b006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:09:52 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4a480ca0}, 0xc, 0x0}, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 10:09:52 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x4e, &(0x7f0000000040), 0x52d) [ 1683.576431][ T1983] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1683.586921][ T1983] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1683.598351][ T1983] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1683.619184][ T1983] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 10:09:52 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000348e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:09:52 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f00000002c0)='systemem0md5sum$\x00', 0x0) ioctl$SIOCGIFHWADDR(r1, 0x8927, &(0x7f0000000100)) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r2, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000140)=@assoc_value={0x0}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000200)={r3, 0x80000000}, &(0x7f0000000240)=0x8) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, {0x4000001}, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000040)='coredump_filter\x00*\x0e\xc3=.\x13\xcbx\x95*\xeeX\x9fcy\xa49\xf6\x8f\x82^\x19\xa9\xcd+\b\x9f\xc6,\xa0\xf0\xff\x9dO\x06\xc9\x15\xda\xa4\x7fh\xd4\xe8C\xdeKUrR\xf4\x9c\x87\xee\xd2\xfb\xdfs\xd0G\x91\x02\x15Z\xa8\x1ad\xadY\x13\x14mg\xc9\x00\x16\xa4\xc48\x06u\x1e:\xd4Y?\xd8P\xe8reP\xffv\xd6\x12\x85N1\n\f\xb0\x1e\xe7\xffD\x1aS\xbf0\x80\xff\xff7V\xcc5\x96W\x14J\xe2\x93\xe3\xc6A7\xd8\xec\xb2m\xf5\x16-\x1b\xbd\x11\x1aYg\xe0\xa7\xd19\a') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') [ 1683.709452][ T2013] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1683.768456][ T2013] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors 10:09:52 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r0, r0, &(0x7f0000000000), 0x0) getsockname$unix(r0, &(0x7f0000000140), &(0x7f0000000040)=0x6e) 10:09:52 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)=ANY=[@ANYBLOB="240000001a005b2c00000000000000001c000000030000000000000008000100ffe601003dbf2ca440501b2ea99c93951abe22447fba1023e18f39ce025b1b5cba9fb13e25204cb3a3a4afd6a6"], 0x24}}, 0x0) [ 1683.845452][ T2013] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1683.884199][ T2013] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 10:09:53 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)={0x0, 0x0, 0x7, 0x0, 0x3fd}) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'nlmon\t\x00\x7f\xed\xb1[\xe5\xa3\xcd\xb6\x00'}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000380)={0x0, 0x0, @pic={0x0, 0x0, 0x0, 0x64}}) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000080)='hsr0\x00') ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000480)={[0x0, 0x3, 0x0, 0x20, 0x0, 0x0, 0x4cb], 0x100000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1684.096469][ T2125] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1684.115141][ T2125] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1684.149826][ T2125] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1684.192591][ T2125] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 10:10:01 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r0, r0, &(0x7f0000000000), 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc4, 0xc4, 0x8, [@ptr={0x3}, @restrict={0xf, 0x0, 0x0, 0xb, 0x5}, @int={0x2, 0x0, 0x0, 0x1, 0x0, 0x4b, 0x0, 0x6e}, @restrict={0x1, 0x0, 0x0, 0xb, 0x4}, @restrict={0xc, 0x0, 0x0, 0xb, 0x4}, @restrict={0x1, 0x0, 0x0, 0xb, 0x3}, @union={0x3, 0x9, 0x0, 0x5, 0x1, 0x8, [{0xd, 0x2, 0x10001}, {0x7, 0x2, 0x7fff}, {0xa, 0x4, 0x33a}, {0xc, 0x1, 0x4}, {0xc, 0x2, 0x7}, {0x9, 0x1, 0x800}, {0x0, 0x4, 0xfff}, {0x3, 0x1, 0xb429}, {0x8, 0x2, 0x6}]}]}, {0x0, [0x5f, 0x61, 0x0, 0x30, 0x1f, 0x0]}}, &(0x7f0000000100)=""/175, 0xe4, 0xaf}, 0x20) r1 = getpgid(0xffffffffffffffff) fcntl$lock(r0, 0x6, &(0x7f00000000c0)={0x2, 0x0, 0xffffffffffffff80, 0xa7, r1}) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r2, r2, &(0x7f0000000000), 0x0) fcntl$setlease(r2, 0x400, 0x3) r3 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') getdents64(r3, &(0x7f00000005c0)=""/153, 0x99) getdents64(r3, &(0x7f0000000000)=""/186, 0xfffffffffffffd7a) 10:10:01 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = syz_open_dev$vcsn(&(0x7f00000001c0)='/dev/vcs#\x00', 0x4651, 0xf73b9fb452708601) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x20003fd) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = memfd_create(&(0x7f00000002c0)='systemem0md5sum$\x00', 0x0) ioctl$SIOCGIFHWADDR(r1, 0x8927, &(0x7f0000000100)) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r3, 0x0) rt_sigaction(0x7, &(0x7f0000000140)={0xfffffffffffffffd, {0x4000001}, 0x6, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000040)='coredump_filter\x00*\x0e\xc3=.\x13\xcbx\x95*\xeeX\x9fcy\xa49\xf6\x8f\x82^\x19\xa9\xcd+\b\x9f\xc6,\xa0\xf0\xff\x9dO\x06\xc9\x15\xda\xa4\x7fh\xd4\xe8C\xdeKUrR\xf4\x9c\x87\xee\xd2\xfb\xdfs\xd0G\x91\x02\x15Z\xa8\x1ad\xadY\x13\x14mg\xc9\x00\x16\xa4\xc48\x06u\x1e:\xd4Y?\xd8P\xe8reP\xffv\xd6\x12\x85N1\n\f\xb0\x1e\xe7\xffD\x1aS\xbf0\x80\xff\xff7V\xcc5\x96W\x14J\xe2\x93\xe3\xc6A7\xd8\xec\xb2m\xf5\x16-\x1b\xbd\x11\x1aYg\xe0\xa7\xd19\a') prctl$PR_SET_DUMPABLE(0x4, 0x0) utime(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x2, 0x2}) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 10:10:01 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="80000000380400001900034ce60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:10:01 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e6003c006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:10:01 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x80, 0x210400) ioctl$RFKILL_IOCTL_NOINPUT(r0, 0x5201) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r1, r1, &(0x7f0000000000), 0x0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lstat(&(0x7f0000000780)='./bus/file0\x00', &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in=@multicast1, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@local}}, &(0x7f00000009c0)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000100)={0x0, 0x0}) sched_setaffinity(r5, 0x8, &(0x7f0000000500)=0xa000000000000005) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0}, 0x0) setreuid(0x0, r6) r7 = getpgrp(0x0) setpriority(0x0, r7, 0xffff) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000900)={r7}, 0xc) shmctl$IPC_SET(0x0, 0x1, &(0x7f00000001c0)={{0x6, r6, 0xee01, 0x0, 0xee01, 0x10, 0x319a}, 0x81, 0xe86b, 0x0, 0x10000020, r7, r5, 0x201}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000100)={0x0, 0x0}) sched_setaffinity(r8, 0x8, &(0x7f0000000500)=0xa000000000000005) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0}, 0x0) setreuid(0x0, r9) r10 = getpgrp(0x0) setpriority(0x0, r10, 0xffff) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000900)={r10}, 0xc) shmctl$IPC_SET(0x0, 0x1, &(0x7f00000001c0)={{0x6, r9, 0xee01, 0x0, 0xee01, 0x10, 0x319a}, 0x81, 0xe86b, 0x0, 0x10000020, r10, r8, 0x201}) mount$fuse(0x0, &(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='fuse\x00', 0x10401, &(0x7f0000000a00)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x701}}, {@max_read={'max_read', 0x3d, 0x2}}, {@blksize={'blksize', 0x3d, 0x200}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}], [{@fowner_gt={'fowner>', r4}}, {@fowner_eq={'fowner', 0x3d, r6}}, {@uid_lt={'uid<', r9}}, {@obj_user={'obj_user', 0x3d, '/dev/vcs#\x00'}}, {@subj_user={'subj_user', 0x3d, 'ext4\x00'}}]}}) write$P9_RREADLINK(r2, &(0x7f0000000880)=ANY=[@ANYBLOB='2'], 0x1) sendfile(r2, r2, &(0x7f0000000000), 0x0) r11 = dup(r2) ioctl$VHOST_SET_VRING_ERR(r1, 0x4008af22, &(0x7f0000000140)={0x0, r11}) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaade0, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x80}], 0x4801, 0x0) r12 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r12, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r12, r12, &(0x7f0000000000), 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r2, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0x1, 0x0, 0x0, 0x0, &(0x7f0000000300)={0x6, 0x4}, 0x0, 0x0, &(0x7f0000000340)={0x3, 0x4, 0x80000000, 0x9}, &(0x7f0000000380)=0xd27, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=0x1}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={r12, 0x10, &(0x7f0000000540)={&(0x7f0000000200)=""/222, 0xde, r13}}, 0x10) 10:10:01 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x6, 0x8, &(0x7f0000000000), 0x1fe) 10:10:01 executing program 0: poll(0x0, 0x0, 0x800000000004f) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0xa4d, 0x0, 0x0, 0x800e0050d) r1 = socket$inet_udplite(0x2, 0x2, 0x88) lseek(r0, 0x0, 0x0) recvfrom$inet(r1, 0x0, 0x1014a, 0x0, 0x0, 0x800e00515) shutdown(r1, 0x0) 10:10:01 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f00000002c0)='systemem0md5sum$\x00', 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r3, r3, &(0x7f0000000240), 0x0) fstatfs(r3, &(0x7f00000001c0)=""/72) ioctl$SIOCGIFHWADDR(r1, 0x8927, &(0x7f0000000100)) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r2, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, {0x4000001}, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000040)='coredump_filter\x00*\x0e\xc3=.\x13\xcbx\x95*\xeeX\x9fcy\xa49\xf6\x8f\x82^\x19\xa9\xcd+\b\x9f\xc6,\xa0\xf0\xff\x9dO\x06\xc9\x15\xda\xa4\x7fh\xd4\xe8C\xdeKUrR\xf4\x9c\x87\xee\xd2\xfb\xdfs\xd0G\x91\x02\x15Z\xa8\x1ad\xadY\x13\x14mg\xc9\x00\x16\xa4\xc48\x06u\x1e:\xd4Y?\xd8P\xe8reP\xffv\xd6\x12\x85N1\n\f\xb0\x1e\xe7\xffD\x1aS\xbf0\x80\xff\xff7V\xcc5\x96W\x14J\xe2\x93\xe3\xc6A7\xd8\xec\xb2m\xf5\x16-\x1b\xbd\x11\x1aYg\xe0\xa7\xd19\a') setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='hwsim0\x00', 0x10) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') [ 1692.922309][ T2384] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1692.935486][ T2384] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1692.952410][ T2386] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1692.998214][ T2386] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1693.009398][ T2384] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock 10:10:02 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x3, 0x0, 0x2) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f00000002c0)='systemem0md5sum$\x00', 0x0) ioctl$SIOCGIFHWADDR(r1, 0x8927, &(0x7f0000000100)) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r2, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, {0x4000001}, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000040)='coredump_filter\x00*\x0e\xc3=.\x13\xcbx\x95*\xeeX\x9fcy\xa49\xf6\x8f\x82^\x19\xa9\xcd+\b\x9f\xc6,\xa0\xf0\xff\x9dO\x06\xc9\x15\xda\xa4\x7fh\xd4\xe8C\xdeKUrR\xf4\x9c\x87\xee\xd2\xfb\xdfs\xd0G\x91\x02\x15Z\xa8\x1ad\xadY\x13\x14mg\xc9\x00\x16\xa4\xc48\x06u\x1e:\xd4Y?\xd8P\xe8reP\xffv\xd6\x12\x85N1\n\f\xb0\x1e\xe7\xffD\x1aS\xbf0\x80\xff\xff7V\xcc5\x96W\x14J\xe2\x93\xe3\xc6A7\xd8\xec\xb2m\xf5\x16-\x1b\xbd\x11\x1aYg\xe0\xa7\xd19\a') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') [ 1693.088805][ T2384] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 1693.101820][ T2386] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1693.155925][ T2386] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 10:10:02 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000360e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:10:02 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e6003d006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:10:02 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=0xffffffffffffffff, 0x4) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f00000002c0)='systemem0md5sum$\x00', 0x0) ioctl$SIOCGIFHWADDR(r1, 0x8927, &(0x7f0000000100)) mmap(&(0x7f0000940000/0x4000)=nil, 0x4000, 0x3000000, 0x10010, r2, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="17"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x0) ioctl$KDGETMODE(r3, 0x4b3b, &(0x7f0000000280)) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, {0x4000001}, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) write$P9_RCREATE(r1, &(0x7f00000001c0)={0x18, 0x73, 0x2, {{0x28, 0x3, 0x2}, 0x67}}, 0x18) syz_open_procfs(0x0, &(0x7f0000000040)='coredump_filter\x00*\x0e\xc3=.\x13\xcbx\x95*\xeeX\x9fcy\xa49\xf6\x8f\x82^\x19\xa9\xcd+\b\x9f\xc6,\xa0\xf0\xff\x9dO\x06\xc9\x15\xda\xa4\x7fh\xd4\xe8C\xdeKUrR\xf4\x9c\x87\xee\xd2\xfb\xdfs\xd0G\x91\x02\x15Z\xa8\x1ad\xadY\x13\x14mg\xc9\x00\x16\xa4\xc48\x06u\x1e:\xd4Y?\xd8P\xe8reP\xffv\xd6\x12\x85N1\n\f\xb0\x1e\xe7\xffD\x1aS\xbf0\x80\xff\xff7V\xcc5\x96W\x14J\xe2\x93\xe3\xc6A7\xd8\xec\xb2m\xf5\x16-\x1b\xbd\x11\x1aYg\xe0\xa7\xd19\a') prctl$PR_SET_DUMPABLE(0x4, 0x4) io_setup(0x5, &(0x7f0000000300)=0x0) io_cancel(r4, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x7, 0x0, r3, &(0x7f0000000340)="f165143e95507a8d5e0bddd3e5da2e13f06b646ba6de1d8cec61cd66dc8c42e803b48e561a14764ac79b3bb769b98e68f94adc875974c5dca58e74126c9f7df912b39d9041c825ab2807d6cf2435575f256d20c0fe4c90", 0x57, 0x785, 0x0, 0xb95efc7d30452df0}, &(0x7f0000000400)) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x612000, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r5, 0x28, 0x1, &(0x7f0000000240)=0x5, 0x8) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') [ 1693.764327][ T2640] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1693.786904][ T2640] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1693.802486][ T2729] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1693.839270][ T2640] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1693.858383][ T2729] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1693.891570][ T2640] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 1693.906636][ T2729] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1693.935959][ T2729] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 10:10:09 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') getdents64(r0, &(0x7f00000005c0)=""/153, 0x99) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="0237582c0a79727d6c20d41d6763c2bb508dd23858149decf1af192ccb1f6b41afa8f8134ac902dd4a29dd4a37002b71a7ae1c73d09f00a8ea764118c5ece0d712e5156dbe75471b7fad7da64108df3d3ecff65e3fb51011bd841c010f067b03a76a034019735ac437cf0eaf790ba5e9b30bfac9d50357498cbdab3d0362e7ffea7d10b00f9e844b2ab09c8255"], 0x1) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x6c2200, 0x0) ioctl$VHOST_SET_VRING_ENDIAN(r2, 0x4008af13, &(0x7f0000000200)={0x0, 0x80000000}) sendfile(r1, r1, &(0x7f0000000000), 0x0) getdents64(r1, &(0x7f00000000c0)=""/14, 0xe) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000100)={'ah\x00'}, &(0x7f0000000140)=0x1e) getdents64(r0, &(0x7f0000000000)=""/186, 0xba) 10:10:09 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f00000002c0)='systemem0md5sum$\x00', 0x0) ioctl$SIOCGIFHWADDR(r1, 0x8927, &(0x7f0000000100)) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000380)=ANY=[@ANYRESDEC=r1, @ANYRES16, @ANYRES16=r2], 0x18) io_setup(0x8, &(0x7f0000000280)=0x0) r5 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) io_submit(r4, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r5, 0x0, 0x0, 0x200, 0x0, 0x1}]) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r7, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x3}, 0x4) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x8888, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRESHEX=r5, @ANYBLOB="2c726f6f746d6f64653f30303030303030303030303030303030fd0034303030202c65725f69643da0eeb119a266777b39b23b2c7e448c8bca65a257474332e95588ff4b0ae83d8e4a2489c1833dfb5ea28429ff7c39ca9f5b5bfb347faff1f6478a46b897ac3ac6b2cc1b7b600bf4a8dc853afe30541f32c8b485883165b5c46b982d13e11aeae6ddbda0e29c76630000cf7b4f7d8c1d25db1d3dbb3f730f952a8d13df7aa9842061fc1a4ba836cc286f813ac645acddee4fde3ab4f57c7b2799923684a5af7dd4c4d766d9392bc88a", @ANYRESDEC=r6, @ANYBLOB="2c5039cb51705f69643d", @ANYRESDEC=r7, @ANYBLOB="2c15616c6c6f775f6f746865722c66756e633d43524544535f434845434b2c"]) r8 = socket$packet(0x11, 0x2, 0x300) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0xc) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000002380)={{0x0, 0x0, r9, 0xffffffffffffffff}}) lchown(&(0x7f0000000240)='./bus\x00', r6, r9) sendfile(r3, r3, &(0x7f0000000000), 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000440)={0x0}) ioctl$DRM_IOCTL_GET_SAREA_CTX(0xffffffffffffffff, 0xc010641d, &(0x7f0000000500)={r10, &(0x7f0000000480)=""/69}) ioctl$DRM_IOCTL_LOCK(0xffffffffffffffff, 0x4008642a, &(0x7f0000000300)={r10, 0x17}) r11 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r11, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r11, r11, &(0x7f0000000000), 0x0) fcntl$getown(r11, 0x9) ioctl$DRM_IOCTL_NEW_CTX(r3, 0x40086425, &(0x7f00000001c0)={r10, 0x1}) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r2, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, {0x4000001}, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) ioctl$KVM_SIGNAL_MSI(r1, 0x4020aea5, &(0x7f0000000140)={0x8000, 0x2000, 0x7, 0x101, 0x3}) syz_open_procfs(0x0, &(0x7f0000000040)='coredump_filter\x00*\x0e\xc3=.\x13\xcbx\x95*\xeeX\x9fcy\xa49\xf6\x8f\x82^\x19\xa9\xcd+\b\x9f\xc6,\xa0\xf0\xff\x9dO\x06\xc9\x15\xda\xa4\x7fh\xd4\xe8C\xdeKUrR\xf4\x9c\x87\xee\xd2\xfb\xdfs\xd0G\x91\x02\x15Z\xa8\x1ad\xadY\x13\x14mg\xc9\x00\x16\xa4\xc48\x06u\x1e:\xd4Y?\xd8P\xe8reP\xffv\xd6\x12\x85N1\n\f\xb0\x1e\xe7\xffD\x1aS\xbf0\x80\xff\xff7V\xcc5\x96W\x14J\xe2\x93\xe3\xc6A7\xd8\xec\xb2m\xf5\x16-\x1b\xbd\x11\x1aYg\xe0\xa7\xd19\a') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') r12 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r12, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r12, r12, &(0x7f0000000000), 0x0) fcntl$F_SET_FILE_RW_HINT(r12, 0x40e, &(0x7f0000000200)=0xdede9c5c6fa71ce) 10:10:09 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getpid() r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000640)='keyring\x00', &(0x7f0000000680)={'syz', 0x1}, 0x0, 0x0, r1) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xe, 0x4, 0x4, 0x1}, 0x3c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r3, 0x28, &(0x7f0000000040)={0x0, 0x0}}, 0x10) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={r4}, 0xc) write$binfmt_aout(r5, &(0x7f0000000800)={{0xcc, 0x3, 0x0, 0x253, 0x2c9, 0x7, 0x2ed, 0x2}, "3ee016e49bb81d25", [[], []]}, 0x228) add_key$user(&(0x7f00000006c0)='user\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000540)='s', 0xffffffffffffff02, r2) r6 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r6, &(0x7f0000000140)='asymmetric\x00', &(0x7f00000001c0)=@secondary='builtin_and_secondary_trusted\x00') keyctl$reject(0x13, r1, 0x3ff, 0x401, r6) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff01}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r7 = getpid() creat(&(0x7f0000000340)='./file0\x00', 0x1c2) tkill(r7, 0x9) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:10:09 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000368e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:10:09 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e6005c006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:10:09 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x2, 0x1, &(0x7f0000000140)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x7fff}], 0x0, 0x0) lsetxattr(&(0x7f0000000440)='./bus/file0\x00', &(0x7f0000000ac0)=ANY=[@ANYBLOB="5d6e21c8dda493c29ad6ec7bf934ec19cf4dc98e8c14cc93b7e2145a3448fadf32dde5916441ee5f7a34bd2f317a0d7931"], &(0x7f0000000500)='net/ip_tables_matches\x00', 0x16, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x80000, 0x1}, 0x8, 0x10, 0x0}, 0x21) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/snapshot\x00', 0x2, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000800)={&(0x7f0000000540)='./file0\x00', r0}, 0x10) r1 = semget$private(0x0, 0x2000000010a, 0x0) semctl$SETALL(r1, 0x0, 0x10, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000840)=0x1) semctl$IPC_STAT(r1, 0x0, 0x2, &(0x7f00000008c0)=""/211) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) socket$inet(0x2, 0x6, 0xcf) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='net/ip_tables_matches\x00') ioctl$EVIOCGNAME(r3, 0x80404506, &(0x7f0000000200)=""/155) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r4, &(0x7f0000000a80)=ANY=[@ANYPTR64=&(0x7f0000000a00)=ANY=[@ANYBLOB="2b078b55177d316c7c11715bb6e5f7469042e09b3f16bf792218c28323333c13b7678caea49f1b9764bd463095553c5750002fb6075cddc6af3b80071597b62f14063039cb1670675e99e86dc3a013da48bb11e82923c937591184a7d3df26e055c478d56842ce44af"]], 0x8) sendfile(r4, r4, &(0x7f0000000000), 0x0) getsockopt$inet6_opts(r4, 0x29, 0x36, &(0x7f00000006c0)=""/194, &(0x7f0000000400)=0xc2) setxattr$security_ima(&(0x7f0000000480)='./bus\x00', &(0x7f0000000380)='sea\x00\x00\x10\x00', &(0x7f00000003c0)=@v2={0x5, 0x3, 0xd, 0x401, 0x23, "4ed506cd29616b17fb48876c5254bfa0c791010d899ed1bd8ccb40e75ff7adac199329"}, 0x2d, 0x1) rename(&(0x7f00000002c0)='./bus\x00', &(0x7f0000000300)='./file0\x00') r5 = msgget$private(0x0, 0x0) msgrcv(r5, 0x0, 0x0, 0x0, 0x0) r6 = msgget$private(0x0, 0x0) msgrcv(r6, 0x0, 0x0, 0x0, 0x0) msgsnd(r6, &(0x7f0000000040)=ANY=[@ANYBLOB="cfea17da55862930"], 0x8, 0x0) msgsnd(r6, &(0x7f0000000040)={0x2}, 0x8, 0x0) r7 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r7, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r7, r7, &(0x7f0000000000), 0x0) ioctl$KVM_GET_API_VERSION(r7, 0xae00, 0x0) msgctl$MSG_INFO(r5, 0xc, &(0x7f00000009c0)=""/26) fchmodat(r2, &(0x7f0000000040)='./file0\x00', 0xc) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1700.242940][ T2798] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1700.252870][ T2798] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1700.262077][ T2796] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1700.264330][ T2798] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock 10:10:09 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f00000002c0)='systemem0md5sum$\x00', 0x0) ioctl$SIOCGIFHWADDR(r1, 0x8927, &(0x7f0000000100)) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r2, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, {0x4000001}, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='coredump_filter\x00*\x0e\xc3=.\x13\xcbx\x95*\xeeX\x9fcy\xa49\xf6\x8f\x82^\x19\xa9\xcd+\b\x9f\xc6,\xa0\xf0\xff\x9dO\x06\xc9\x15\xda\xa4\x7fh\xd4\xe8C\xdeKUrR\xf4\x9c\x87\xee\xd2\xfb\xdfs\xd0G\x91\x02\x15Z\xa8\x1ad\xadY\x13\x14mg\xc9\x00\x16\xa4\xc48\x06u\x1e:\xd4Y?\xd8P\xe8reP\xffv\xd6\x12\x85N1\n\f\xb0\x1e\xe7\xffD\x1aS\xbf0\x80\xff\xff7V\xcc5\x96W\x14J\xe2\x93\xe3\xc6A7\xd8\xec\xb2m\xf5\x16-\x1b\xbd\x11\x1aYg\xe0\xa7\xd19\a') r4 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_GET(r3, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x24, r4, 0xb3e, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_AF={0x8, 0x2, 0x2}]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x4004) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') [ 1700.295592][ T2798] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 1700.384303][ T2796] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1700.454250][ T2796] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock 10:10:09 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="80000000380400001900036ce60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1700.501932][ T2796] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 10:10:09 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f00000002c0)='systemem0md5sum$\x00', 0x0) ioctl$SIOCGIFHWADDR(r1, 0x8927, &(0x7f0000000100)) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r2, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, {0x4000001}, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000040)='coredump_filter\x00*\x0e\xc3=.\x13\xcbx\x95*\xeeX\x9fcy\xa49\xf6\x8f\x82^\x19\xa9\xcd+\b\x9f\xc6,\xa0\xf0\xff\x9dO\x06\xc9\x15\xda\xa4\x7fh\xd4\xe8C\xdeKUrR\xf4\x9c\x87\xee\xd2\xfb\xdfs\xd0G\x91\x02\x15Z\xa8\x1ad\xadY\x13\x14mg\xc9\x00\x16\xa4\xc48\x06u\x1e:\xd4Y?\xd8P\xe8reP\xffv\xd6\x12\x85N1\n\f\xb0\x1e\xe7\xffD\x1aS\xbf0\x80\xff\xff7V\xcc5\x96W\x14J\xe2\x93\xe3\xc6A7\xd8\xec\xb2m\xf5\x16-\x1b\xbd\x11\x1aYg\xe0\xa7\xd19\a') prctl$PR_SET_DUMPABLE(0x4, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x0) sendto$netrom(r3, &(0x7f00000001c0)="1e8cad5400c9b0440785304836178b17c32c87d2cc5ec51cf9503c9f79103298fc33c5778d9e97a73011f383ca2b04cf519ea1fbc375081741de71fd6c51951de63cf600d2425813d561542b0c9fffa140ebbdd8457c7298a159800936bd4b60058a5f520a617af2505a3bbb6d59c9a9ec1bd3acbe8e227776ef91f237b002d0636da53341d6c674a97555d81e559710f063a05e9cc5b56a2d3b84724176e9fcaba2dcd3d33cc2dc7cae0f29737f787b9bd041340307c81e89bda6a4cea6d3811b9c97c48ec521", 0xc7, 0x1, &(0x7f0000000300)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 10:10:09 executing program 0: io_setup(0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/netlink\x00') read$eventfd(r0, &(0x7f0000000080), 0xff97) semctl$SEM_STAT(0x0, 0x0, 0x12, 0x0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, 0x0) r2 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r3) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) fstat(r4, &(0x7f0000000400)) getresuid(&(0x7f00000002c0), 0x0, &(0x7f00000004c0)) socket(0xa, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xa) r6 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$hfsplus(&(0x7f00000001c0)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@gid={'gid', 0x3d, r7}}]}) stat(&(0x7f0000000500)='./bus\x00', 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000498000)={0x0, 0x0, &(0x7f00008b7ff0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2400000000020100000006000000de0002000000100002000c00010005000100000000e2"], 0x24}}, 0x0) socket(0x10, 0x2, 0x0) 10:10:09 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60067006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:10:09 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f00000002c0)='systemem0md5sum$\x00', 0x0) ioctl$SIOCGIFHWADDR(r1, 0x8927, &(0x7f0000000100)) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r2, 0x0) rt_sigaction(0xb, &(0x7f0000b4a000)={0xfffffffffffffffd, {0x9}, 0x5785e12076d39186, 0x0}, 0x0, 0x8, &(0x7f0000000140)) syz_open_procfs(0x0, &(0x7f0000000040)='coredump_filter\x00*\x0e\xc3=.\x13\xcbx\x95*\xeeX\x9fcy\xa49\xf6\x8f\x82^\x19\xa9\xcd+\b\x9f\xc6,\xa0\xf0\xff\x9dO\x06\xc9\x15\xda\xa4\x7fh\xd4\xe8C\xdeKUrR\xf4\x9c\x87\xee\xd2\xfb\xdfs\xd0G\x91\x02\x15Z\xa8\x1ad\xadY\x13\x14mg\xc9\x00\x16\xa4\xc48\x06u\x1e:\xd4Y?\xd8P\xe8reP\xffv\xd6\x12\x85N1\n\f\xb0\x1e\xe7\xffD\x1aS\xbf0\x80\xff\xff7V\xcc5\x96W\x14J\xe2\x93\xe3\xc6A7\xd8\xec\xb2m\xf5\x16-\x1b\xbd\x11\x1aYg\xe0\xa7\xd19\a') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') [ 1701.104815][ T2934] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1701.177629][ T2951] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1701.192591][ T2934] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1701.214115][ T2951] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1701.238703][ T2951] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1701.262533][ T2951] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 1701.288006][ T2934] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1701.329647][ T2934] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 10:10:18 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ubi_ctrl\x00', 0x10000, 0x0) read$char_usb(r1, &(0x7f0000000100)=""/211, 0xd3) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r2, r2, &(0x7f0000000000), 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000200)=""/250) getdents64(r0, &(0x7f00000005c0)=""/153, 0x99) getdents64(r0, &(0x7f0000000000)=""/186, 0xba) 10:10:18 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f00000002c0)='systemem0md5sum$\x00', 0x0) ioctl$SIOCGIFHWADDR(r1, 0x8927, &(0x7f0000000100)) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x0) fcntl$F_SET_FILE_RW_HINT(r3, 0x40e, &(0x7f0000000140)) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r2, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, {0x4000001}, 0x0, 0x0}, 0x0, 0xfffffffffffffc86, &(0x7f0000000000)) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r4, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, 0x0) pipe2(&(0x7f00000003c0)={0xffffffffffffffff}, 0x40800) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r6, 0x84, 0x20, &(0x7f0000000400), &(0x7f0000000440)=0x4) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000100)={r5, 0x0, 0x1}, 0x8) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000200)={r5, 0xffff, 0x3, [0x800, 0x80, 0x6]}, &(0x7f0000000240)=0xe) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f0000000300)={r7, @in={{0x2, 0x4e22, @local}}}, &(0x7f0000000280)=0x84) syz_open_procfs(0x0, &(0x7f0000000040)='coredump_filter\x00*\x0e\xc3=.\x13\xcbx\x95*\xeeX\x9fcy\xa49\xf6\x8f\x82^\x19\xa9\xcd+\b\x9f\xc6,\xa0\xf0\xff\x9dO\x06\xc9\x15\xda\xa4\x7fh\xd4\xe8C\xdeKUrR\xf4\x9c\x87\xee\xd2\xfb\xdfs\xd0G\x91\x02\x15Z\xa8\x1ad\xadY\x13\x14mg\xc9\x00\x16\xa4\xc48\x06u\x1e:\xd4Y?\xd8P\xe8reP\xffv\xd6\x12\x85N1\n\f\xb0\x1e\xe7\xffD\x1aS\xbf0\x80\xff\xff7V\xcc5\x96W\x14J\xe2\x93\xe3\xc6A7\xd8\xec\xb2m\xf5\x16-\x1b\xbd\x11\x1aYg\xe0\xa7\xd19\a') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') r8 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r8, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r8, r8, &(0x7f0000000000), 0x0) fstat(r8, &(0x7f0000000480)) 10:10:18 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000400)={@rand_addr="2c37da2ec0fdddb91c8059c1abb987e2"}, 0x14) 10:10:18 executing program 1: openat$audio1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio1\x00', 0x120000, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) prctl$PR_SET_DUMPABLE(0x4, 0x2) socket$nl_crypto(0x10, 0x3, 0x15) syz_mount_image$ext4(&(0x7f00000001c0)='ex\x934\x00', &(0x7f0000000000)='./file0\x00', 0x1, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x28, 0x400}], 0x4801, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x101400, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000180)=[0x0, 0x10001]) 10:10:18 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60078006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:10:18 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000374e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:10:18 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'nlmon\t\x00\x7f\xed\xb1[\xe5\xa3\xcd\xb6\x00'}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000480)={[0x3, 0x0, 0x0, 0x20, 0x0, 0x0, 0x4cb], 0x100000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 10:10:18 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f00000002c0)='systemem0md5sum$\x00', 0x0) ioctl$SIOCGIFHWADDR(r1, 0x8927, &(0x7f0000000100)) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r2, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, {0x4000001}, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000040)='coredump_filter\x00*\x0e\xc3=.\x13\xcbx\x95*\xeeX\x9fcy\xa49\xf6\x8f\x82^\x19\xa9\xcd+\b\x9f\xc6,\xa0\xf0\xff\x9dO\x06\xc9\x15\xda\xa4\x7fh\xd4\xe8C\xdeKUrR\xf4\x9c\x87\xee\xd2\xfb\xdfs\xd0G\x91\x02\x15Z\xa8\x1ad\xadY\x13\x14mg\xc9\x00\x16\xa4\xc48\x06u\x1e:\xd4Y?\xd8P\xe8reP\xffv\xd6\x12\x85N1\n\f\xb0\x1e\xe7\xffD\x1aS\xbf0\x80\xff\xff7V\xcc5\x96W\x14J\xe2\x93\xe3\xc6A7\xd8\xec\xb2m\xf5\x16-\x1b\xbd\x11\x1aYg\xe0\xa7\xd19\a') prctl$PR_SET_DUMPABLE(0x4, 0x0) r3 = getpgrp(0xffffffffffffffff) prlimit64(r3, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) syz_open_procfs(r3, &(0x7f00000000c0)='net/mcfilter\x00') syz_open_procfs(r3, &(0x7f0000000180)='net/ip_tables_targets\x00') 10:10:18 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000200)='./file0\x00', 0x10, 0x9) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r1, r1, &(0x7f0000000000), 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0xc) ioctl$EVIOCGMASK(r1, 0x80104592, &(0x7f0000000140)={0x3, 0x26, &(0x7f0000000040)="3736cea8cf387f581dff1d22e6b8c3ec231bc33ed777b4481657f783a14f1d7bc7c9cf43df7f"}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000100)={0x0, 0x0}) sched_setaffinity(r2, 0x8, &(0x7f0000000500)=0xa000000000000005) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0}, 0x0) setreuid(0x0, r3) r4 = getpgrp(0x0) setpriority(0x0, r4, 0xffff) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000900)={r4}, 0xc) shmctl$IPC_SET(0x0, 0x1, &(0x7f00000001c0)={{0x6, r3, 0xee01, 0x0, 0xee01, 0x10, 0x319a}, 0x81, 0xe86b, 0x0, 0x10000020, r4, r2, 0x201}) r5 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r5, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r5, r5, &(0x7f0000000000), 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@empty, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) mount$fuse(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='fuse\x00', 0x2e0008, &(0x7f00000008c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x1ff}}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1400}}, {@blksize={'blksize', 0x3d, 0x200}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x100000000}}], [{@uid_gt={'uid>', r6}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) accept$inet6(r7, &(0x7f00000002c0)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, &(0x7f0000000300)=0x1c) 10:10:18 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='systemem0md5sum$\x00', 0x0) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000100)) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x2a7) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_int(r1, 0x29, 0x16, 0x0, 0xd4) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x1e) wait4(0xffffffffffffffff, 0x0, 0x0, 0x0) rt_sigaction(0x17, &(0x7f0000b4a000)={0xfffffffffffffffd, {0x8}, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000040)='coredump_filter\x00*\x0e\xc3=.\x13\xcbx\x95*\xeeX\x9fcy\xa49\xf6\x8f\x82^\x19\xa9\xcd+\b\x9f\xc6,\xa0\xf0\xff\x9dO\x06\xc9\x15\xda\xa4\x7fh\xd4\xe8C\xdeKUrR\xf4\x9c\x87\xee\xd2\xfb\xdfs\xd0G\x91\x02\x15Z\xa8\x1ad\xadY\x13\x14mg\xc9\x00\x16\xa4\xc48\x06u\x1e:\xd4Y?\xd8P\xe8reP\xffv\xd6\x12\x85N1\n\f\xb0\x1e\xe7\xffD\x1aS\xbf0\x80\xff\xff7V\xcc5\x96W\x14J\xe2\x93\xe3\xc6A7\xd8\xec\xb2m\xf5\x16-\x1b\xbd\x11\x1aYg\xe0\xa7\xd19\a') prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) prctl$PR_SET_DUMPABLE(0x4, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000880)=ANY=[@ANYBLOB='z'], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x0) ioctl$SG_SET_RESERVED_SIZE(r3, 0x2275, &(0x7f00000001c0)=0x3) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') [ 1709.629090][ T3103] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1709.665974][ T3111] kvm: pic: non byte read [ 1709.695502][ T3103] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1709.706224][ T3111] kvm: pic: non byte write [ 1709.711826][ T3106] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1709.719585][ T3103] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1709.734476][ T3106] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1709.770567][ T3111] kvm: pic: non byte read [ 1709.783469][ T3103] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 1709.832772][ T3111] kvm: pic: non byte write 10:10:18 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f00000002c0)='systemem0md5sum$\x00', 0x0) ioctl$SIOCGIFHWADDR(r1, 0x8927, &(0x7f0000000100)) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r2, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, {0x4000001}, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000040)='coredump_filter\x00*\x0e\xc3=.\x13\xcbx\x95*\xeeX\x9fcy\xa49\xf6\x8f\x82^\x19\xa9\xcd+\b\x9f\xc6,\xa0\xf0\xff\x9dO\x06\xc9\x15\xda\xa4\x7fh\xd4\xe8C\xdeKUrR\xf4\x9c\x87\xee\xd2\xfb\xdfs\xd0G\x91\x02\x15Z\xa8\x1ad\xadY\x13\x14mg\xc9\x00\x16\xa4\xc48\x06u\x1e:\xd4Y?\xd8P\xe8reP\xffv\xd6\x12\x85N1\n\f\xb0\x1e\xe7\xffD\x1aS\xbf0\x80\xff\xff7V\xcc5\x96W\x14J\xe2\x93\xe3\xc6A7\xd8\xec\xb2m\xf5\x16-\x1b\xbd\x11\x1aYg\xe0\xa7\xd19\a') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x52302, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r4, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x0) r5 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r5, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r5, r5, &(0x7f0000000000), 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, &(0x7f0000000200)=[@in6={0xa, 0x4e22, 0x7fffffff, @local, 0x935}], 0xfeff) [ 1709.855419][ T3106] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1709.894925][ T3111] kvm: pic: single mode not supported [ 1709.895174][ T3111] kvm: pic: non byte read [ 1709.897133][ T3106] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 1709.927463][ T3111] kvm: pic: non byte write [ 1709.932314][ T3111] kvm: pic: single mode not supported [ 1709.932319][ T3111] kvm: pic: level sensitive irq not supported [ 1709.951318][ T3111] kvm: pic: non byte read [ 1709.971734][ T3111] kvm: pic: non byte write [ 1709.982584][ T3111] kvm: pic: single mode not supported [ 1709.982779][ T3111] kvm: pic: non byte read [ 1709.993107][ T3111] kvm: pic: non byte write [ 1709.998504][ T3111] kvm: pic: single mode not supported [ 1709.998615][ T3111] kvm: pic: non byte read [ 1710.008598][ T3111] kvm: pic: non byte write [ 1710.013414][ T3111] kvm: pic: single mode not supported [ 1710.013538][ T3111] kvm: pic: non byte read [ 1710.024100][ T3111] kvm: pic: non byte write [ 1710.029476][ T3111] kvm: pic: single mode not supported [ 1710.030334][ T3111] kvm: pic: non byte read [ 1710.041693][ T3111] kvm: pic: non byte write [ 1710.047218][ T3111] kvm: pic: single mode not supported [ 1710.047618][ T3111] kvm: pic: non byte read [ 1710.074195][ T3111] kvm: pic: non byte write [ 1710.093533][ T3111] kvm: pic: single mode not supported [ 1710.093717][ T3111] kvm: pic: non byte read [ 1710.118317][ T3111] kvm: pic: non byte write [ 1710.132116][ T3111] kvm: pic: single mode not supported 10:10:19 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="80000000380400001900037ae60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1710.132443][ T3111] kvm: pic: single mode not supported [ 1710.473418][ T3278] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1710.489863][ T3278] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1710.501597][ T3278] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1710.522243][ T3278] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 10:10:23 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') getdents64(r0, &(0x7f00000005c0)=""/153, 0x99) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r1, r1, &(0x7f0000000000), 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f00000000c0)={r1}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000180)={{{@in=@dev, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@empty}}, &(0x7f0000000280)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r2, &(0x7f0000000480)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x300800}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=@mpls_delroute={0x18c, 0x19, 0x300, 0x70bd29, 0x25dfdbfb, {0x1c, 0x90, 0x0, 0x7f, 0xfc, 0x4, 0xff, 0xa, 0x600}, [@RTA_DST={0x8, 0x1, {0x3, 0x0, 0x1}}, @RTA_NEWDST={0x84, 0x13, [{0x5}, {0x1000, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0x6}, {0xf966, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x8}, {0x0, 0x0, 0x1}, {0x91ce, 0x0, 0x1}, {0x1f}, {0x7}, {0xd2b, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x81, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x4746}, {0x12, 0x0, 0x1}, {0x127c, 0x0, 0x1}, {0x3ff, 0x0, 0x1}, {0xffff8, 0x0, 0x1}, {}, {0x3, 0x0, 0x1}, {0x8001, 0x0, 0x1}, {}, {0x8000}, {0x6, 0x0, 0x1}, {0x9}, {}, {0x100, 0x0, 0x1}, {0x6}, {0x7ff, 0x0, 0x1}]}, @RTA_TTL_PROPAGATE={0x8, 0x1a, 0x20}, @RTA_NEWDST={0x84, 0x13, [{0x1ff}, {0x1}, {0x57}, {0x8}, {0x2}, {0x80}, {0x7}, {0x4, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0x7, 0x0, 0x1}, {0x101}, {0x1}, {0x5}, {0x1f, 0x0, 0x1}, {0x80, 0x0, 0x1}, {0xff, 0x0, 0x1}, {0xffffe, 0x0, 0x1}, {0x9}, {0x6, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x81}, {0x2}, {0x4, 0x0, 0x1}, {0x8000, 0x0, 0x1}, {0x7}, {0x5}, {0xdaf}, {0x0, 0x0, 0x1}, {0x1}, {0x7fff, 0x0, 0x1}, {0x8}]}, @RTA_VIA={0x14, 0x12, {0x0, "233af5aa2602ce82b82e9c6e9071"}}, @RTA_OIF={0x8, 0x4, r3}, @RTA_MULTIPATH={0xc, 0x9, {0x6e1, 0x6, 0x9, r4}}, @RTA_VIA={0x14, 0x12, {0x2, "9b3d499caf2c0a6f64d6263f7a55"}}, @RTA_TTL_PROPAGATE={0x8, 0x1a, 0x80}, @RTA_VIA={0x14, 0x12, {0x5, "d8283e2077780b55e4fbc348e339"}}]}, 0x18c}, 0x1, 0x0, 0x0, 0x800}, 0x1) getdents64(r0, &(0x7f0000000000)=""/186, 0xba) 10:10:23 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e600ff006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:10:23 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f00000002c0)='systemem0md5sum$\x00', 0x0) ioctl$SIOCGIFHWADDR(r1, 0x8927, &(0x7f0000000100)) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r2, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, {0x4000001}, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000040)='coredump_filter\x00*\x0e\xc3=.\x13\xcbx\x95*\xeeX\x9fcy\xa49\xf6\x8f\x82^\x19\xa9\xcd+\b\x9f\xc6,\xa0\xf0\xff\x9dO\x06\xc9\x15\xda\xa4\x7fh\xd4\xe8C\xdeKUrR\xf4\x9c\x87\xee\xd2\xfb\xdfs\xd0G\x91\x02\x15Z\xa8\x1ad\xadY\x13\x14mg\xc9\x00\x16\xa4\xc48\x06u\x1e:\xd4Y?\xd8P\xe8reP\xffv\xd6\x12\x85N1\n\f\xb0\x1e\xe7\xffD\x1aS\xbf0\x80\xff\xff7V\xcc5\x96W\x14J\xe2\x93\xe3\xc6A7\xd8\xec\xb2m\xf5\x16-\x1b\xbd\x11\x1aYg\xe0\xa7\xd19\a') prctl$PR_SET_DUMPABLE(0x4, 0x0) r3 = getpgrp(0xffffffffffffffff) prlimit64(r3, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) syz_open_procfs(r3, &(0x7f00000000c0)='net/mcfilter\x00') syz_open_procfs(r3, &(0x7f00000001c0)='net/sockstat\x00') 10:10:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f00000005c0)=""/168, 0xa8}, {0x0}], 0x2}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)=""/189, 0x3a6}, {0x0}], 0x8}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0xbf9d, 0x0, 0x0, 0x800e0053e) shutdown(r2, 0x0) r4 = socket$inet6_sctp(0x1c, 0x5, 0x84) recvmsg(r4, &(0x7f0000002700)={0x0, 0x0, &(0x7f0000002640)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4}, 0x0) shutdown(r3, 0x0) shutdown(r1, 0x0) 10:10:23 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000009c0)=0x14) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={0xffffffffffffffff, 0xc0, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a00)=0x3, 0x0, 0x0, 0x0, &(0x7f0000000a40)={0x7, 0x1}, 0x0, 0x0, &(0x7f0000000a80)={0x4, 0xf, 0x10000, 0x5}, &(0x7f0000000ac0)=0x7896, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b00)=0x81e}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x938988b445700438, 0x0, 0x0, 0x0, 0x1, 0x4a, 0x0, 0x41000, 0x8, [], 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, r0}, 0x78) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r1, r1, &(0x7f0000000000), 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x4e21, 0x64, @loopback, 0x101}, @in6={0xa, 0x4e22, 0x1e76, @rand_addr="37fc1f76bf57de0de320cfefc5b92dbd", 0x1000}, @in6={0xa, 0x4e22, 0x4, @empty, 0xffff}], 0x54) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:10:23 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300ff0100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:10:23 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f00000002c0)='systemem0md5sum$\x00', 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) ioctl$sock_inet_sctp_SIOCINQ(r3, 0x541b, &(0x7f0000000140)) ioctl$SIOCGIFHWADDR(r1, 0x8927, &(0x7f0000000100)) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r2, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, {0x4000001}, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000040)='coredump_filter\x00*\x0e\xc3=.\x13\xcbx\x95*\xeeX\x9fcy\xa49\xf6\x8f\x82^\x19\xa9\xcd+\b\x9f\xc6,\xa0\xf0\xff\x9dO\x06\xc9\x15\xda\xa4\x7fh\xd4\xe8C\xdeKUrR\xf4\x9c\x87\xee\xd2\xfb\xdfs\xd0G\x91\x02\x15Z\xa8\x1ad\xadY\x13\x14mg\xc9\x00\x16\xa4\xc48\x06u\x1e:\xd4Y?\xd8P\xe8reP\xffv\xd6\x12\x85N1\n\f\xb0\x1e\xe7\xffD\x1aS\xbf0\x80\xff\xff7V\xcc5\x96W\x14J\xe2\x93\xe3\xc6A7\xd8\xec\xb2m\xf5\x16-\x1b\xbd\x11\x1aYg\xe0\xa7\xd19\a') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 10:10:23 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r0 = socket$xdp(0x2c, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f00000002c0)='systemem0md5sum$\x00', 0x0) ioctl$SIOCGIFHWADDR(r1, 0x8927, &(0x7f0000000100)) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r2, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, {0x4000001}, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00*\x0e\xc3=.\x13\xcbx\x95*\xeeX\x9fcy\xa49\xf6\x8f\x82^\x19\xa9\xcd+\b\x9f\xc6,\xa0\xf0\xff\x9dO\x06\xc9\x15\xda\xa4\x7fh\xd4\xe8C\xdeKUrR\xf4\x9c\x87\xee\xd2\xfb\xdfs\xd0G\x91\x02\x15Z\xa8\x1ad\xadY\x13\x14mg\xc9\x00\x16\xa4\xc48\x06u\x1e:\xd4Y?\xd8P\xe8reP\xffv\xd6\x12\x85N1\n\f\xb0\x1e\xe7\xffD\x1aS\xbf0\x80\xff\xff7V\xcc5\x96W\x14J\xe2\x93\xe3\xc6A7\xd8\xec\xb2m\xf5\x16-\x1b\xbd\x11\x1aYg\xe0\xa7\xd19\a') prctl$PR_SET_DUMPABLE(0x4, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) write$P9_RAUTH(r3, &(0x7f0000000080)={0x14, 0x67, 0x1, {0x40, 0x2, 0x8}}, 0x14) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') [ 1714.674718][ T3302] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1714.705623][ T3302] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1714.752290][ T3302] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1714.767289][ T3322] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1714.777638][ T3302] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 1714.790603][ T3322] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1714.828995][ T3322] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock 10:10:24 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60102006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1714.910735][ T3322] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 10:10:24 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmsg$key(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="021483081400000029bd7000ffdbdf2505001a00ac1e000100"/40], 0x28}}, 0x0) recvmsg$kcm(r4, &(0x7f00000005c0)={&(0x7f0000000080)=@sco, 0x20000100, &(0x7f0000000580)=[{&(0x7f0000000480)=""/143, 0xfffffdde}], 0x8}, 0x0) 10:10:24 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4c00000000000000, 0x80, &(0x7f0000000000)=@nat={'nat\x00\x00\x00\x00h\x00', 0x3c1, 0x1, 0x1f8, [0x200006c0], 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]}, 0x270) [ 1715.140284][ T3363] xt_ipvs: protocol family 7 not supported 10:10:24 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netstat\x00') perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'sha384\x00'}, 0x58) r2 = accept4$alg(r0, 0x0, 0x0, 0x0) sendfile(r2, r1, 0x0, 0x5000) [ 1715.289637][ T3360] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1715.434467][ T3360] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1715.465461][ T3360] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1715.509446][ T3360] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 10:10:28 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x800000805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000880)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_SET_SNDBIT(r0, 0x4004556a, 0x0) 10:10:28 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60200006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:10:28 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0xebda55e1cbf10315, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000880)=ANY=[@ANYBLOB='~'], 0x1) sendfile(r1, r1, &(0x7f0000000000), 0x0) connect$rose(r1, &(0x7f0000000180)=@full={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, 0x1, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x40) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:10:28 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x11, 0x80a, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) r7 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r7, 0x9204, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x1a4, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x11) sendmsg$nl_route(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_MASTER={0x8, 0xa, r8}]}, 0x28}}, 0x0) 10:10:28 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60103006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:10:28 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') getdents64(r0, &(0x7f00000000c0)=""/152, 0x98) r1 = semget$private(0x0, 0x3, 0x0) connect$nfc_llcp(r0, &(0x7f0000000200)={0x27, 0x0, 0x0, 0x7, 0x4, 0x40, "a82f9733c4d583f6a02d9b8ad70618b801e3b3777a3a05bfc729429c8c8b0f6f585527e0d0e2b812af528bc450fcfefc0e0812802766390c6a4771f61ac855", 0x26}, 0x60) semctl$SETALL(r1, 0x0, 0x10, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000280)) semctl$IPC_INFO(r1, 0x3, 0x3, &(0x7f0000000180)=""/124) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000002c0)=0x1, 0x4) getdents64(r0, &(0x7f0000000000)=""/186, 0xba) [ 1719.636742][ T3623] input: syz0 as /devices/virtual/input/input9 [ 1719.640883][ T3621] bridge10: port 1(team0) entered blocking state [ 1719.658510][ T3621] bridge10: port 1(team0) entered disabled state [ 1719.668564][ T3621] device team0 entered promiscuous mode [ 1719.674231][ T3621] device team_slave_0 entered promiscuous mode [ 1719.683921][ T3621] device team_slave_1 entered promiscuous mode [ 1719.708245][ T3631] input: syz0 as /devices/virtual/input/input10 10:10:29 executing program 5: unshare(0x20600) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) flock(r0, 0x8) [ 1719.854433][ T3634] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1719.868722][ T3632] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 10:10:29 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netstat\x00') perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'sha384\x00'}, 0x58) r2 = accept4$alg(r0, 0x0, 0x0, 0x0) sendfile(r2, r1, 0x0, 0x5000) [ 1719.935821][ T3632] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1719.947387][ T3634] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1719.978053][ T3634] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1719.998859][ T3632] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1720.026180][ T3634] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 1720.026878][ T3632] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 10:10:29 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r1, r1, &(0x7f0000000000), 0x0) r2 = dup2(r0, r1) open_tree(r2, &(0x7f0000000040)='./file0\x00', 0x100) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:10:29 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60300006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:10:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000780)=[{&(0x7f0000000140)=""/127, 0x7f}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x6) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x8164, 0x0, 0x0, 0x800e00547) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000016c0)=[{&(0x7f00000001c0)=""/71, 0x47}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x6}, 0x0) r3 = dup(r2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0xfd1d, 0x0, 0x0, 0x800e0053d) shutdown(r3, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r5, &(0x7f0000000040)=[{&(0x7f0000000640)=""/4096, 0x1000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x6) shutdown(r4, 0x0) shutdown(r1, 0x0) 10:10:29 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60104006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:10:29 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netstat\x00') perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'sha384\x00'}, 0x58) r2 = accept4$alg(r0, 0x0, 0x0, 0x0) sendfile(r2, r1, 0x0, 0x5000) 10:10:29 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=ANY=[@ANYBLOB="340000001000010400000000000041806b098cea", @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100627269646765000004000200"], 0x34}}, 0x0) stat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000140)='\x00', 0x9, 0x8, &(0x7f0000000a00)=[{&(0x7f0000000240)="3f9bf5290d7a209a66447ca0b521788141cc1067e88e0bae3a98c4e36b35178b5aeaccbf8ef67df9e0df57c1d58ac1a4e975e61b8ab2ea102669d5c0be6973c5ab9d31", 0x43, 0x2}, {&(0x7f00000002c0)="8cb5a8fee40014f59e11092772809073cb177cbec181028e4add502aa420a2eb95d91a10eed82539c50fd0793a965e437147bd52042612803b0e84d04ffbf73f1716928e4a942f758569fae541ddd697f3502459fe3653285e99002abe0a3370c429304a759594db39849a67ab6b1d3527d05eac257d22a7ccf97c1efe83797e8db87e17f9ef67fef32e21c625c6def19ac0cd433c8c89914d05f1dbf620d67ef6c4cf3ae141cb725aa166b50f064d739907f0d8c0eed2bf2e499de28f9933656ef518", 0xc3, 0x1f}, {&(0x7f00000003c0)="10f3369e436c99762ee96be9aa5c0b895066dc4688678d56666517e303eac0e5914b4d252586820a948f5a2f07af9e7a4ba1b27a53205a57cb75f64effba037c5989e8b67e8506c70c9f7b19a4d03ccc8bc91088029c79f7f84d76a711df081ab7e817ba77a29c9ca587d4325fa90b0452b9f585b597199bbed5e934d464e5593d6697e4fe32767046fbf01e573e8de1e3649bc40b31f29c15f1a40357fd5a64d4a9811c3493ac7a0f4d2c9147be504104d40302ca2de72760146c478bb7a84e3eb518aa3a301fcce26cf4b9b674b1cdeff87f71dc74ff2e4a569c49269270cfc3a1fe5c148393e1f265cfd0643ef8db1327cb25f1514a0238", 0xf9, 0x8}, {&(0x7f0000000500)="2ac43b80727178e91f621e6f1aae1845cee49530526d35939f1e41", 0x1b, 0x9}, {&(0x7f00000006c0)="03c9e0cae7f860f350bdcb745b6370eb0e00b53894d3e37d502db048bb3d747647099da13e959a0b10ec770d342317bfcd655733a77f494d6b8c818d5f477bc561d56b6ed19082533742669fd5851497c76e7c4d2c5e408efdba4eea5cf6147922cb4573008d6169731bb163c41b72b22a2499a6305a705bf08f2f6165006273d867dc88f0b31e187feee1a827fe85779517f54ea39a523486f1a117388ad762177549887fec4e7395a7560f88f84a36f530c1ccbf6a6111e27922b15af2abc68f73c100cefe64", 0xc7, 0x20}, {&(0x7f0000000800)="11c38645ce087787400954fea6a446315df2f54ffe6f7f5b8dbcb51d42589fa343c939f18872d98660129e3b753e0cacd630f01fb0712028af8e718ceaa4425446f98db005c83a2b65aa5e312a6b6abe5fa708a61055c1b53d7f774e2b4bd7a8dbb5ffb5c6bfa0d85294adc70645174e5d11d2f0aad668b53716e98c17afad580cea3cf9c538f69a363b2c268567d061bcecf5ff57c1ed9abd0569ec65a898c7f376eba0cbcc0258b873d5b4e01da45a68a9aa9f6e3cfaec7595606c2ef0c972fcdb035580e90094bf91cee9c2dee69c320db992eb49222667e69bad1b8a43cde8cc0c63233dc138a7690c3c68c55fe21af362373c05", 0xf6, 0x10000}, {&(0x7f0000000900)="478b9ba5b49de3ef08a1d6f73c8b92d85b12465632bfdd55a31887c8a540ab784933281fdc775e84eca218745d6c810eb84e7df958bd6bdece3f17874f0964368c1db2a4f04dfbc8bd72d521e15bad4541b15a7d2091", 0x56, 0x9}, {&(0x7f0000000980)="0c3d9235e350f852a9493bb271dda3d16a550f12284e27789fe522be486d42c50cd529ad7eaf7e078449f4a921d22597ae9477b121edb424f2252b465801b0888af653de62722489d23a3f3ec86d4e252ada1edfd09117", 0x57, 0x20}], 0x1000000, &(0x7f0000000bc0)={[{@nodatacow='nodatacow'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@smackfsdef={'smackfsdef', 0x3d, 'ext4\x00'}}, {@hash='hash'}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', r4}}, {@appraise_type='appraise_type=imasig'}, {@subj_role={'subj_role', 0x3d, 'ext4\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@permit_directio='permit_directio'}]}) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x7, 0x5}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:10:29 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)={0x0, 0x0, 0x7, 0x0, 0x3fd}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'nlmon\t\x00\x7f\xed\xb1[\xe5\xa3\xcd\xb6\x00'}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000380)={0x0, 0x0, @pic={0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdb}}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000480)={[0x0, 0x3, 0x0, 0x20, 0x0, 0x0, 0x4cb], 0x100000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1720.559212][ T3879] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 10:10:29 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netstat\x00') perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_MSRS(0xffffffffffffffff, 0xc008ae88, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'sha384\x00'}, 0x58) r2 = accept4$alg(r0, 0x0, 0x0, 0x0) sendfile(r2, r1, 0x0, 0x5000) [ 1720.601585][ T3879] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1720.637883][ T3990] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1720.651982][ T3879] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1720.711414][ T3879] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 1720.747072][ T3995] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 10:10:29 executing program 5: [ 1720.795452][ T3995] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1720.855513][ T3995] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1720.896352][ T3995] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 1721.009969][ T4114] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 10:10:35 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/ip6_tables_matches\x00') setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x488, &(0x7f00000000c0)={{0x89, @broadcast, 0x4e24, 0x3, 'lblc\x00', 0x20, 0x2, 0x16}, {@loopback, 0x4e23, 0x0, 0x3, 0xd10, 0x5}}, 0x44) getdents64(r0, &(0x7f00000005c0)=""/153, 0x99) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000280)=ANY=[@ANYRESOCT=r0], 0x17) renameat(r0, &(0x7f0000000140)='./file0\x00', r1, &(0x7f0000000180)='./file0\x00') getdents64(r0, &(0x7f0000000000)=""/186, 0xba) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000880)=ANY=[@ANYBLOB='\x00'], 0x1) sendfile(r2, r2, &(0x7f0000000000), 0x0) ioctl$IMGETDEVINFO(r2, 0x80044944, &(0x7f0000000200)={0x6}) 10:10:35 executing program 5: 10:10:35 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60400006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:10:35 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x100) getsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f00000001c0), &(0x7f0000000200)=0x4) uselib(&(0x7f0000000040)='./file0\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r1, 0x0, 0x48f, &(0x7f0000000140)={0x0, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e20, 0x1, 'dh\x00', 0x13, 0x124246b9, 0x21}, 0x2c) 10:10:35 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60105006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:10:35 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netstat\x00') perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_MSRS(0xffffffffffffffff, 0xc008ae88, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'sha384\x00'}, 0x58) r2 = accept4$alg(r0, 0x0, 0x0, 0x0) sendfile(r2, r1, 0x0, 0x5000) 10:10:36 executing program 5: [ 1726.987073][ T4135] IPVS: set_ctl: invalid protocol: 0 172.20.20.17:20000 10:10:36 executing program 5: 10:10:36 executing program 0: [ 1727.167945][ T4147] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1727.205402][ T4136] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 10:10:36 executing program 5: [ 1727.235415][ T4136] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1727.256142][ T4147] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1727.289741][ T4136] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1727.311311][ T4136] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 10:10:36 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x200002, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000200)={0x1f, 0x3b, 0x8, 0x9, 0x8, 0x9, 0x1, 0xab}) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r1, r1, &(0x7f0000000000), 0x0) getsockopt$inet6_dccp_int(r1, 0x21, 0xa, &(0x7f0000000040), &(0x7f0000000140)=0x4) [ 1727.388320][ T4147] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock 10:10:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000400)=""/151, 0x97}], 0x1}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x91b75d8e, 0x0, 0x0, 0x800e00519) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r2, &(0x7f0000001740)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {0x0}, {0x0}, {0x0}], 0x4}, 0x2) r3 = dup(r2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0x1de, 0x0, 0x0, 0x800e0050e) shutdown(r3, 0x0) r5 = socket$inet6_sctp(0x1c, 0x5, 0x84) readv(r5, &(0x7f00000004c0)=[{&(0x7f0000000180)=""/146, 0x92}, {0x0}], 0x2) shutdown(r4, 0x0) shutdown(r1, 0x0) [ 1727.557625][ T4147] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 10:10:43 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60106006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:10:43 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) 10:10:43 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0xfff, 0x200000) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r0, 0xc08c5335, &(0x7f0000000140)={0x8001, 0xffffffff, 0x3ff, 'queue0\x00'}) 10:10:43 executing program 5: fanotify_init(0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) epoll_create(0x9) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, &(0x7f00000002c0)='./file0/file0\x00') io_setup(0x0, 0x0) r3 = epoll_create1(0x0) r4 = epoll_create1(0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r6 = openat$cgroup_procs(r5, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) r7 = dup3(r6, r4, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r7, &(0x7f0000000000)) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00') ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40046602, 0x0) io_submit(0x0, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40046602, &(0x7f00000003c0)=0x9404b) open(0x0, 0x0, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r8) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x86c, 0x0, 0x0, 0x0, 0x0, 0x1c0000}, 0x0, &(0x7f0000000280)={0x1ff, 0x0, 0x0, 0x6, 0x0, 0x4, 0xfffffffffffffffc, 0x100000000}, &(0x7f00000001c0)={0x0, r9+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac06}], 0x1, 0x0) 10:10:43 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60500006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:10:43 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') getdents64(r0, &(0x7f00000005c0)=""/153, 0x99) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) fcntl$getown(r0, 0x9) write$P9_RREADLINK(r1, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x80100, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x0) getsockopt$XDP_STATISTICS(r1, 0x11b, 0x7, &(0x7f00000000c0), &(0x7f0000000100)=0x18) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)={0x2, 0x16, 0x5, 0x0, 0x1f, 0x0, 0x70bd2c, 0x25dfdbfe, [@sadb_key={0x7, 0xb49d576587083111, 0x168, 0x0, "9f7a6c353829690537ce973da43b58733affc0ee42fa39a4f76de6bbbea359979be0fb524e8635349cf11d0a1f"}, @sadb_x_sec_ctx={0x11, 0x18, 0x4, 0x9, 0x7e, "faf10e9687d1d7cb644a42165d20c5e6316620fbf52963967fec7cb8261297fe6f7d3204d1b97150ed933c8a5c4089a1c43c6dbbd8609b6b4c4484826d5528e912f5dbf287f51a4d977bced99d0c6d25b5502654ff37e91276b6eb03076a75676f054b53b54ff6cc97382cb56a8e829c8d169e543db65af2cf1dd738afc3"}, @sadb_x_filter={0x5, 0x1a, @in=@loopback, @in=@multicast2, 0x1c, 0x3c, 0x3e2e1f0ff63878b6}]}, 0xf8}}, 0x24010000) getdents64(r0, &(0x7f0000000000)=""/186, 0xba) 10:10:43 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f00000001c0)) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4a480ca0}, 0xc, 0x0}, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 10:10:43 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x11, 0x80a, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x1a4, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x11) sendmsg$nl_route(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_MASTER={0x8, 0xa, r7}]}, 0x28}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 1734.325408][ T4332] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1734.360618][ T4295] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1734.465522][ T4332] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1734.524667][ T4295] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1734.534677][ T4332] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1734.549589][ T4295] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock 10:10:43 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60105006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:10:43 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0), 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) sendfile(r0, r0, &(0x7f0000000000), 0x0) ioctl$KVM_SET_DEVICE_ATTR(r0, 0x4018aee1, &(0x7f0000000480)={0x0, 0xfffffe00, 0x1dcb, &(0x7f0000000440)=0x1ff}) r1 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmctl$IPC_SET(r1, 0x1, &(0x7f00000001c0)={{0x6, 0x0, 0xee01, 0x0, 0xee01, 0x80}, 0x0, 0x4, 0x0, 0x20, 0x0, 0x0, 0x200}) shmctl$SHM_STAT(r1, 0xd, &(0x7f0000000100)=""/19) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) r3 = dup2(r2, r2) ioctl$SNDCTL_DSP_GETIPTR(r3, 0x800c5011, &(0x7f0000000180)) write$UHID_CREATE(r3, &(0x7f0000000300)={0x0, 'syz1\x00', 'syz1\x00', 'syz1\x00', &(0x7f0000000240)=""/158, 0x9e, 0x9, 0xe55, 0x1, 0x9, 0x2}, 0x120) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 1734.583914][ T4332] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 1734.609572][ T4295] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 10:10:43 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x100) getsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f00000001c0), &(0x7f0000000200)=0x4) uselib(&(0x7f0000000040)='./file0\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r1, 0x0, 0x48f, &(0x7f0000000140)={0x0, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e20, 0x1, 'dh\x00', 0x13, 0x124246b9, 0x21}, 0x2c) 10:10:43 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60107006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:10:44 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60600006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:10:44 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x100) getsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f00000001c0), &(0x7f0000000200)=0x4) uselib(&(0x7f0000000040)='./file0\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r1, 0x0, 0x48f, &(0x7f0000000140)={0x0, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e20, 0x1, 'dh\x00', 0x13, 0x124246b9, 0x21}, 0x2c) 10:10:44 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60105006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1735.349304][ T4653] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1735.427033][ T4653] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors 10:10:44 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60105006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1735.553844][ T4656] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1735.602710][ T4653] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1735.698580][ T4656] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1735.785991][ T4653] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 1735.794504][ T4656] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock 10:10:44 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60104006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1735.915908][ T4656] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 10:10:52 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') getdents64(r0, &(0x7f00000005c0)=""/153, 0x99) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000180)=0x0) r2 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x7, 0x90000) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000100)={r4, 0x0, 0x1}, 0x8) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000200)={r4, 0x1f, 0x10}, &(0x7f0000000240)=0xc) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f0000000500)={&(0x7f0000000380)=[0x0, 0x0], &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000480)=[0x0], &(0x7f00000004c0)=[0x0], 0x2, 0x6, 0x1, 0x1}) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000280)={r5, 0x1}, &(0x7f00000002c0)=0x8) r6 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r6, &(0x7f0000000880)=ANY=[@ANYBLOB='$'], 0x1) sendfile(r6, r6, &(0x7f0000000000), 0x0) setsockopt$inet6_MRT6_DEL_MFC(r6, 0x29, 0xcd, &(0x7f0000000300)={{0xa, 0x4e24, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x9}, {0xa, 0x4e23, 0x3, @dev={0xfe, 0x80, [], 0x17}, 0x8}, 0x281, [0x4, 0x7f, 0x2, 0x7, 0x80, 0x8, 0x1, 0xef9]}, 0x5c) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0xfd, 0x1, 0x8, 0x0, 0x0, 0xfffffffffffffffa, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0xe1b, 0x4, @perf_config_ext={0x9, 0xff}, 0x20000, 0x2, 0x7, 0x2, 0x2f1e, 0x5, 0x8001}, r1, 0xb, r2, 0x8) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f00000000c0)=[0x10001, 0x3]) getdents64(r0, &(0x7f0000000000)=""/186, 0xba) 10:10:52 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60104006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:10:52 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=ANY=[@ANYBLOB="340000001000010400000000000041806b098cea", @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100627269646765000004000200"], 0x34}}, 0x0) stat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000140)='\x00', 0x9, 0x8, &(0x7f0000000a00)=[{&(0x7f0000000240)="3f9bf5290d7a209a66447ca0b521788141cc1067e88e0bae3a98c4e36b35178b5aeaccbf8ef67df9e0df57c1d58ac1a4e975e61b8ab2ea102669d5c0be6973c5ab9d31", 0x43, 0x2}, {&(0x7f00000002c0)="8cb5a8fee40014f59e11092772809073cb177cbec181028e4add502aa420a2eb95d91a10eed82539c50fd0793a965e437147bd52042612803b0e84d04ffbf73f1716928e4a942f758569fae541ddd697f3502459fe3653285e99002abe0a3370c429304a759594db39849a67ab6b1d3527d05eac257d22a7ccf97c1efe83797e8db87e17f9ef67fef32e21c625c6def19ac0cd433c8c89914d05f1dbf620d67ef6c4cf3ae141cb725aa166b50f064d739907f0d8c0eed2bf2e499de28f9933656ef518", 0xc3, 0x1f}, {&(0x7f00000003c0)="10f3369e436c99762ee96be9aa5c0b895066dc4688678d56666517e303eac0e5914b4d252586820a948f5a2f07af9e7a4ba1b27a53205a57cb75f64effba037c5989e8b67e8506c70c9f7b19a4d03ccc8bc91088029c79f7f84d76a711df081ab7e817ba77a29c9ca587d4325fa90b0452b9f585b597199bbed5e934d464e5593d6697e4fe32767046fbf01e573e8de1e3649bc40b31f29c15f1a40357fd5a64d4a9811c3493ac7a0f4d2c9147be504104d40302ca2de72760146c478bb7a84e3eb518aa3a301fcce26cf4b9b674b1cdeff87f71dc74ff2e4a569c49269270cfc3a1fe5c148393e1f265cfd0643ef8db1327cb25f1514a0238", 0xf9, 0x8}, {&(0x7f0000000500)="2ac43b80727178e91f621e6f1aae1845cee49530526d35939f1e41", 0x1b, 0x9}, {&(0x7f00000006c0)="03c9e0cae7f860f350bdcb745b6370eb0e00b53894d3e37d502db048bb3d747647099da13e959a0b10ec770d342317bfcd655733a77f494d6b8c818d5f477bc561d56b6ed19082533742669fd5851497c76e7c4d2c5e408efdba4eea5cf6147922cb4573008d6169731bb163c41b72b22a2499a6305a705bf08f2f6165006273d867dc88f0b31e187feee1a827fe85779517f54ea39a523486f1a117388ad762177549887fec4e7395a7560f88f84a36f530c1ccbf6a6111e27922b15af2abc68f73c100cefe64", 0xc7, 0x20}, {&(0x7f0000000800)="11c38645ce087787400954fea6a446315df2f54ffe6f7f5b8dbcb51d42589fa343c939f18872d98660129e3b753e0cacd630f01fb0712028af8e718ceaa4425446f98db005c83a2b65aa5e312a6b6abe5fa708a61055c1b53d7f774e2b4bd7a8dbb5ffb5c6bfa0d85294adc70645174e5d11d2f0aad668b53716e98c17afad580cea3cf9c538f69a363b2c268567d061bcecf5ff57c1ed9abd0569ec65a898c7f376eba0cbcc0258b873d5b4e01da45a68a9aa9f6e3cfaec7595606c2ef0c972fcdb035580e90094bf91cee9c2dee69c320db992eb49222667e69bad1b8a43cde8cc0c63233dc138a7690c3c68c55fe21af362373c05", 0xf6, 0x10000}, {&(0x7f0000000900)="478b9ba5b49de3ef08a1d6f73c8b92d85b12465632bfdd55a31887c8a540ab784933281fdc775e84eca218745d6c810eb84e7df958bd6bdece3f17874f0964368c1db2a4f04dfbc8bd72d521e15bad4541b15a7d2091", 0x56, 0x9}, {&(0x7f0000000980)="0c3d9235e350f852a9493bb271dda3d16a550f12284e27789fe522be486d42c50cd529ad7eaf7e078449f4a921d22597ae9477b121edb424f2252b465801b0888af653de62722489d23a3f3ec86d4e252ada1edfd09117", 0x57, 0x20}], 0x1000000, &(0x7f0000000bc0)={[{@nodatacow='nodatacow'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@smackfsdef={'smackfsdef', 0x3d, 'ext4\x00'}}, {@hash='hash'}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', r4}}, {@appraise_type='appraise_type=imasig'}, {@subj_role={'subj_role', 0x3d, 'ext4\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@permit_directio='permit_directio'}]}) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x7, 0x5}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:10:52 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60108006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:10:52 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60700006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:10:52 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0/file0\x00', 0x6, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="010000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) statfs(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000140)=""/75) r1 = syz_open_dev$mouse(&(0x7f00000001c0)='/dev/input/mouse#\x00', 0x6, 0x100) fcntl$getownex(r0, 0x10, &(0x7f0000000200)={0x0, 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r7 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r7, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r7, r7, &(0x7f0000000000), 0x0) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000008c0)=ANY=[@ANYPTR64=&(0x7f0000000840)=ANY=[@ANYRES32=r7], @ANYRES32=r6, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f00000003c0)={0x0, @vsock={0x28, 0x0, 0x4e22}, @isdn={0x22, 0x81, 0xb7, 0xb3, 0x6}, @xdp={0x2c, 0x2, r6, 0x16}, 0x40, 0x0, 0x0, 0x0, 0x200, &(0x7f0000000380)='veth1_to_bridge\x00', 0x8, 0x477, 0x400}) r9 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r9, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r9, r9, &(0x7f0000000000), 0x0) r10 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r10, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r10, r10, &(0x7f0000000000), 0x0) r11 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r11, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r11, r11, &(0x7f0000000000), 0x0) r12 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r12, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r12, r12, &(0x7f0000000000), 0x0) r13 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r13, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r13, r13, &(0x7f0000000000), 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000c80)=ANY=[@ANYPTR64=&(0x7f0000000bc0)=ANY=[@ANYPTR64=&(0x7f0000000b40)=ANY=[@ANYRESDEC=r1, @ANYRES32, @ANYRESOCT=r10, @ANYPTR], @ANYRESOCT=r11, @ANYRES64=r12], @ANYRESDEC=r13, @ANYRES64], 0x24) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xc0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x1000, 0x0, 0x0, 0x0, &(0x7f0000000300)={0x0, 0x2}, 0x0, 0x0, &(0x7f0000000340)={0x0, 0xc, 0x2, 0x14}, &(0x7f0000000380)=0x94, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=0x15}}, 0x10) r15 = syz_open_dev$mouse(&(0x7f0000000780)='/dev/input/mouse#\x00', 0x0, 0xc6f4f18884bf296d) ioctl$KVM_GET_VCPU_EVENTS(r15, 0x8040ae9f, &(0x7f0000000800)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000640)=r14, 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000500)=""/29, 0x1d, r14}}, 0x10) r17 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r17, &(0x7f0000000a40)=ANY=[@ANYBLOB="2a604910d4ecfb"], 0x1) sendfile(r17, r17, &(0x7f0000000000), 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x15, 0xe, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0xc10d}, [@initr0={0x18, 0x0, 0x0, 0x0, 0xfffffff7, 0x0, 0x0, 0x0, 0xfff80000}, @call={0x85, 0x0, 0x0, 0x35}, @ldst={0x2, 0x2, 0x1, 0x7953a3896e62e3a0, 0xb, 0xfffffffffffffff8, 0x10}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @alu={0x4, 0x0, 0x0, 0x5, 0xa, 0x0, 0x4}, @ldst={0x2, 0x6, 0xe, 0xb, 0x7, 0xfffffffffffffff4, 0x8}, @alu={0x7, 0x0, 0xc, 0x1, 0x0, 0xc, 0xffffffffffffffd7}, @initr0={0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x6dc73a2e}]}, &(0x7f00000002c0)='syzkaller\x00', 0x200, 0x67, &(0x7f0000000300)=""/103, 0x41000, 0x8, [], r8, 0xa, r9, 0x8, &(0x7f0000000440)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000480)={0x1, 0x1, 0x6, 0xffffffff}, 0x10, r16, r17}, 0x78) ioprio_set$pid(0x2, r2, 0x1) [ 1743.527647][ T4811] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1743.642844][ T4812] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1743.705440][ T4795] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1743.755607][ T4812] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1743.770043][ T4812] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1743.790558][ T4812] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 1743.813920][ T4795] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1743.824986][ T4795] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1743.867928][ T4795] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 10:10:53 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60109006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:10:53 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60104006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:10:53 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60102006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:10:53 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x3, 0x820200) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYRESHEX], 0x12) sendfile(r1, r1, &(0x7f0000000000), 0x0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r2, r2, &(0x7f0000000000), 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000140)={0x0, 0x4, 0x4, 0xe3}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000001c0)={r3, 0x81, 0x40, 0x6, 0xffffffff, 0x8001}, 0x14) mmap$snddsp_control(&(0x7f0000ffc000/0x4000)=nil, 0x1000, 0x2000000, 0x8010, r0, 0x83000000) 10:10:53 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60800006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1744.403104][ T4850] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 10:10:53 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r0, r0, &(0x7f0000000000), 0x0) setns(r0, 0x20000) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1744.485387][ T4850] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1744.506519][ T4850] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1744.675834][ T4850] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 1744.745229][ T4856] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1744.755112][ T4856] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1744.766144][ T4856] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1744.786794][ T4856] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 10:11:01 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') getdents64(r0, &(0x7f00000005c0)=""/153, 0x99) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f00000000c0)={0x81, 0xe5}) getdents64(0xffffffffffffffff, &(0x7f0000000100)=""/198, 0xc6) 10:11:01 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0), 0x2080000, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000880)=ANY=[@ANYBLOB="13"], 0x1) sendfile(r0, r0, &(0x7f0000000000), 0x0) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x420080) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000180)=0xffe, 0xfffffffffffffeca) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r1, r1, &(0x7f0000000000), 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f00000002c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r6 = socket$packet(0x11, 0x2, 0x300) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0xc) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000002380)={{0x0, 0x0, r7, 0xffffffffffffffff}}) setgid(r7) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000140012000c00010062726964676500000300020092ab29e6bc90313f5c14a8d5d4534e466f18e7a665b4fd2a0e0ffabd5f884b8215627962f7a4aab6691329692afb3fdcc3e7378871f430fe0e63a139f8432b7c88d952fec2b4b0543063914575e89dce08917ef4c83982304f91f231dc1ecf62c4bf0541ff2b5060b6a4d69b9403c96422fd8632e43e946636599dedd725bcd83c8971198e43a29e4b1c15388e01dee5bf7c4e128ff5b5c146c15db0684e76186c004209d8b4158f7b359d8efa69231277e09c47884e9fb0b010687409fc6fa73c91c9504b4460a91a865e0897f10dc1c1e0edc0d560f18478d67cc5cf8dbb0ee5000200000000000000bcb9eb76abba12076a8d076c853092edf73f4224c4e770006630b3a7e43c7e4c90ce6a20fac946584d406aa1cc75103f746d1f026456e44c9a39c62eecdb8bb82ca275e24c5c9095cbc8a6701a2447f9f6e6e4a372717366f176f0e4df46e9e28ede8a00e2a8b3dc"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) r8 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r8, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r8, r8, &(0x7f0000000000), 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x6, &(0x7f0000000240)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3}, @generic={0x40, 0x0, 0x7, 0x4, 0x9}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3}, @exit], &(0x7f0000000280)='syzkaller\x00', 0x9, 0x37, &(0x7f0000000300)=""/55, 0x40f00, 0x8, [], r5, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000380)={0x5, 0x3, 0x4, 0x7fffffff}, 0x10, 0x0, r8}, 0x78) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, r9}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000140)='./bus\x00', 0x4, 0xbc, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0xffffffffffffff61, 0x400}], 0x4801, 0x0) ioctl$FS_IOC_FSGETXATTR(r10, 0x801c581f, &(0x7f0000000200)={0xfffffff7, 0x8, 0x81, 0x2, 0x1ff}) ioctl$KVM_SET_LAPIC(r1, 0x4400ae8f, &(0x7f00000008c0)={"7fa910fcff9009aeca4a047f56e487dbe49a0bc61abb0d711ad784057cc596002793dc7c4baf0ebe3d38ab128ce2a1fb1e28f95b8a3e4bd2217fc58176c72f49946de3591de9fa51ab02f3db1dd666c22876baa377716536d1e40a836adbe2253737feaa074ad6ccdf7cb1872827f3f041779b4b9877c0a887eb4662be5c624afaee1f1469a2e241e561d8f7306cb4587f2bcb51ee2a7a05f1999d94db1962ea21ecc7682ca020f363acd2230c0ccd4a3943e0c18d2175adc5471e5f6491e4e104f8e75a7b595c307b19871d24373faeb6939551d3608a7e6b9ae0ac1e54e2bdc320d71a5a3b6e5b37ba69c6b0f4d5748cfb92baeffa5b82abb3accf817e7554db2f08aa303467ac192594a866a399bca338a3837c9145600be82ab7ee449dbe99990ee13b49b2269aad92865f13cfe8ec20731d3b2283cb1283c516381d5d331b27f63d683c5339e69e14488d935435fd24de58cb9994a044900e9593ec10be98a53cb696aa26011f4f61a5e85b9f639601bf7a1d8dd2177b1b3aeef94c3f1d123a1ae9c042529299576a31bc3e4599f60621649a3a5d6cd6cef31ee36c24a1a97fceb8f004e243f130772e46455e40929dceaf4181acc86074498cd2658beb236d82160274cd2fbbbadd1cc54ba1a8d61bebf270c30a5f1050227f9aff23e8097d24b63494ccf740c3f7e4faaf19e47f2c0741e7a2a2b8a59bfbce8b491e1eafd1c93c1726aa9284ad3378d246a53ef967f27a0a171364fbcfab12a91308d8f3ed20a9a61739fce2ba47d06ed6803006451dec22784bd3994cc50e2a1c15455499495f39264c78ef169ec0fd0ef6444f9ce00320300e3788d555c2d16839d3de0d21dde8d4485fea480f647a1ac8f458a36b5672a41c40d8a354dd6b7f5cc6f7727e0b2a2b4c0f4f262dc7d09a475d460b96a5270b1573125ed8e1f9eb88d906da5f3f4d948b096ecaaa10f4492f4c176422452a553bb427fbb3e109296a95789048d5fa184e8c4512fc72b3c656cd62beb81b8dc31d551b011d9c7828969b97f53055945204f0c1e84852eb4e58a313d4cf12e1af9abe90de58d3fd5d993bd0479533e20896066478bf07da589357628f93565e8cd36fd9a20d9809b727aa36e1c26dd467478f7d82edcf49e8c1be6c893ef40a3195a597c267662451944351dd60772891d3828e031376020091a241e753395994a8f82c9ce51f3e7363d1735847103787dd285d1c7ebc656a25dc0c82909d6e2e3553481400fea817d9628e6785a79f24cab6ee6b2ab4f13a6748e76a90b92eaef75e93153d66e42ecd62853c49fee17a45fb1226a766744d2085fee5322ad9e234d0997d5f3efd0407c7f1541bb9f050575a0389a09b3ca88d0197380b6563cc2fc9a78000f5bef3e468077da7795de056b6ad8633d9dabec18ca1b959ca8ff2bedabfb5062bbe0fef02"}) 10:11:01 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60102006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:11:01 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='systemem0md5sum$\x00', 0x0) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000100)) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, {0x4000001}, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000040)='coredump_filter\x00*\x0e\xc3=.\x13\xcbx\x95*\xeeX\x9fcy\xa49\xf6\x8f\x82^\x19\xa9\xcd+\b\x9f\xc6,\xa0\xf0\xff\x9dO\x06\xc9\x15\xda\xa4\x7fh\xd4\xe8C\xdeKUrR\xf4\x9c\x87\xee\xd2\xfb\xdfs\xd0G\x91\x02\x15Z\xa8\x1ad\xadY\x13\x14mg\xc9\x00\x16\xa4\xc48\x06u\x1e:\xd4Y?\xd8P\xe8reP\xffv\xd6\x12\x85N1\n\f\xb0\x1e\xe7\xffD\x1aS\xbf0\x80\xff\xff7V\xcc5\x96W\x14J\xe2\x93\xe3\xc6A7\xd8\xec\xb2m\xf5\x16-\x1b\xbd\x11\x1aYg\xe0\xa7\xd19\a') prctl$PR_SET_DUMPABLE(0x4, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000880)=ANY=[@ANYBLOB="18"], 0x1) sendfile(r2, r2, &(0x7f0000000000)=0x1000, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="f0883571000000020000000000000000"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r4, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x0) write$P9_RREADLINK(r3, &(0x7f0000000400)=ANY=[@ANYBLOB="fe72b1c968f84cbf628c36ba456a723c7d0957a36dafc61d5b1ea5c50b2a18329a99b560d1ce13092b27f8d8b1ecaec68140e11fc502ecbb531d5ead6baf342e739a11c593e619eb2c8b9ca4912d61a12a41c871a307e954eaf4bace8861515032907ceef43cf1dea7358ee08a4749dd07d4fd843fb572e4aadd880245543e3fe8cccbc4aadd17d45a10156716f99b8936ad16fa489b75631501af299a961956012a2032fbde4206e9ee68086a44409cacdaff4a0563debb1c270f6b489f9bbc"], 0xc0) sendfile(r1, r1, &(0x7f0000000000), 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000140)=0x0) syz_open_procfs(r5, &(0x7f0000000180)='net/ip_tables_targets\x00') 10:11:01 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e6010a006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:11:01 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60900006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:11:01 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e63404006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1752.973326][ T4890] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1752.994419][ T4903] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1753.008733][ T4900] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1753.018999][ T4903] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1753.033264][ T4900] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1753.044418][ T4903] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1753.055924][ T4900] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1753.066272][ T4903] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 10:11:02 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60102006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1753.111730][ T4900] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 10:11:02 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e63304006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:11:02 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e6010c006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:11:02 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e63404006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:11:02 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60a00006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1753.565357][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1753.565364][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1753.565388][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1753.571166][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1753.866138][ T4937] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1753.937972][ T4937] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1754.025381][ T4937] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1754.052379][ T4937] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 1754.078925][ T4940] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1754.105491][ T4940] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1754.151258][ T4940] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1754.172199][ T4940] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 10:11:11 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e63404006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:11:11 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e63304006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:11:11 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000100)={r0, 0x0, 0x1}, 0x8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000040)=@assoc_value={r0, 0x9}, &(0x7f0000000140)=0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:11:11 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60123006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:11:11 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') getdents64(r0, &(0x7f00000005c0)=""/153, 0x99) io_setup(0x8, &(0x7f0000000280)=0x0) r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r2, 0x0, 0x0, 0x200, 0x0, 0x1}]) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x3}, 0x4) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x8888, &(0x7f0000000640)=ANY=[@ANYBLOB="66643de025273dbe3351ad96004e273e70488041c2d0d2c91bd60635770972b468c45804fccd6c618bbcf177aec0cbf5d7d2103f06d77216a3674a442ca1949568b8980fb301c533263bd709f0481060e41b4aa2d0c1d6787ee73457988e794a80c743aa242c7a3951e6253e11fab20e90ba98f627ff700c6a25550ff3191b9d28cb4e9eb5b0d32a1121f9d658cc07e362085e47c02889488068c5f7f1818e26f350ddd090b6575c01412023cc3200b6777edf209ecc86bb2066f39fc15af99bf2981b56cab20c80cedb4a64bfe114613e53e1c89aea4b8c5d4f1b83633665e38d7761d566688da606038b2902c6e26419d9f6a7f6c84fcd5b21a03979f12b06fdc5e0566c00e72cb9571cb0899bc00291869f21e6966bc368d58c2f5e285d7db535a6070eba66a5826843f58bfef711e40db4074bf32224b87dbfee947a9bd915d79eacbcdd6255cce3285adf5e90650eab546d5e5f449dc85f81ea20bbb22e8a03ef8b5afba8fc9480554fddec8d4a0d", @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653f30303030303030303030303030303030fd0034303030202c65725f69643da0eeb119a266777b39b23b2c7e448c8bca65a257474332e95588ff4b0ae83d8e4a2489c1833dfb5ea28429ff7c39ca9f5b5bfb347faff1f6478a46b897ac3ac6b2cc1b7b600bf4a8dc853afe30541f32c8b485883165b5c46b982d13e11aeae6ddbda0e29c76630000cf7b4f7d8c1d25db1d3dbb3f730f952a8d13df7aa9842061fc1a4ba836cc286f813ac645acddee4fde3ab4f57c7b2799923684a5af7dd4c4d766d9392bc88a", @ANYRESDEC=r3, @ANYBLOB="2c5039cb51705f69643d", @ANYRESDEC=r4, @ANYBLOB="2c15616c6c6f775f6f746865722c66756e633d43524544535f434845434b2c"]) r5 = getegid() fchownat(r0, &(0x7f00000000c0)='./file0\x00', r3, r5, 0x1000) getdents64(r0, &(0x7f0000000000)=""/186, 0xba) 10:11:11 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60b00006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:11:11 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e63304006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:11:11 executing program 5: clone(0x0, &(0x7f00000024c0), 0x0, 0x0, 0x0) waitid(0x0, 0x0, 0x0, 0x8000000c, 0x0) [ 1762.438236][ T4976] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1762.519784][ T4976] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1762.534323][ T4984] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 10:11:11 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0), 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f0000000280)='/dev/bsg\x00', 0x1, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r1, r1, &(0x7f0000000000), 0x0) ioctl$KVM_GET_XSAVE(r1, 0x9000aea4, &(0x7f00000008c0)) write$P9_RREADLINK(r0, &(0x7f0000000880)=ANY=[@ANYBLOB='>'], 0x1) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioperm(0x200, 0x6, 0x3) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r3, 0x0, 0x486, &(0x7f0000000540), &(0x7f0000000580)=0xc) sendmsg$tipc(r2, &(0x7f0000000500)={&(0x7f0000000300)=@nameseq={0x1e, 0x1, 0x1, {0x40, 0x1, 0x3}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)="f825fdc4152af1860613dd64485eef34551c8f6c4b9d740277b751654f92efae0de627b55ab6fb2aed0783f216e368d7bd1688bb68c938b06f46945d34812069f10364015d59661d471c5372ef3231401de3d5dcaf41eeb35243be397787b30dafae10e0dcf98c860ffb98be6c14eb7d14ec3dd8909394a29e0bd2e3c10313893309fbea405347630a4a8e286ada49e0b6dfaf81c373a879b8a52053cc7ce8fc034cb83d6e341d8380dc936c0944a313a65db60419b9af7cc761f88c7e6c", 0xbe}, {&(0x7f0000000400)="a968112d51c3497181cbd701a15c35028c28501ebcb3ee2b5fa11c382f79911ce275646a78ee33510888a467e7dd0f7fc07b6ebe159b90e6eaf48822cf36229645ee6951b4a10495b3f48df230d7feb323570fae91eb893246b235f9b3b0", 0x5e}], 0x2, 0x0, 0x0, 0x800}, 0x4080050) sendfile(r0, r0, &(0x7f0000000000), 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e22, 0x8ad, @local, 0x4}}, 0x1ff, 0x80}, &(0x7f0000000040)=0x90) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000200)={r4, 0x1f}, &(0x7f0000000240)=0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1762.571602][ T4976] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1762.582066][ T4984] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1762.647353][ T4984] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1762.667839][ T4976] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 1762.699981][ T4984] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 10:11:11 executing program 0: socket$kcm(0x10, 0x1, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000980), 0x0, 0x0, 0x0, 0x20000001}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000780)={0x0, 0x70, 0xfb, 0x9a, 0x3, 0x8, 0x0, 0x3, 0xc049, 0xa, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xffff74af, 0x2, @perf_bp={&(0x7f0000000480), 0x5}, 0xb6c79b46ff34523e, 0x9, 0x2, 0x7, 0x0, 0x7fffffff}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) socket$kcm(0x29, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'\xf6\xff\xff\xff\xff\xff\xff\xff\x00\xe9\xd5\x00', 0x200091}) socketpair(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000001040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f2, &(0x7f0000000080)='ip6tnl0\x00') socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext, 0x0, 0x0, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$kcm(0x29, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x0, 0x7, 0xfe7, 0x0, 0xed, 0x48c0, 0x2, 0x0, 0xa, 0x0, 0xa7, 0x0, 0x1f, 0x8, 0x6, 0x0, 0xfffffffffffff89d, 0x6, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x7, 0x0, 0x80, 0x0, 0x0, 0x10001, 0x7, 0x80, 0x0, 0xc5, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x7}, 0x4080, 0x3fe, 0xfffe, 0x5, 0x48f, 0x9, 0x5}, 0x0, 0x8, r2, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000000c0), 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c80)) gettid() r3 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000680)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00, 0x9, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x7fff, 0x5, @perf_bp={0x0, 0x6}, 0x14c2, 0x1, 0xfb46, 0x14, 0x0, 0x80, 0x1}, r3, 0x0, 0xffffffffffffffff, 0x8) r4 = socket$kcm(0xa, 0x5, 0x0) close(0xffffffffffffffff) recvmsg$kcm(r4, &(0x7f0000000440)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000500)=""/246, 0xf6}], 0x1, &(0x7f0000000940)=""/214, 0xd6}, 0x40002020) socket$kcm(0x29, 0xa, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) 10:11:12 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60f00006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:11:12 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e6012d006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:11:12 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r1, r1, &(0x7f0000000000), 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, &(0x7f0000000300)={'icmp\x00'}, &(0x7f0000000340)=0x1e) write$P9_RREADLINK(r0, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000140)={0x0, 0x3ff, 0x10}, &(0x7f0000000180)=0xc) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f00000001c0)={r3, 0xb07}, &(0x7f0000000200)=0x8) lsetxattr$security_capability(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='security.capability\x00', &(0x7f00000002c0)=@v2={0x2000000, [{0x80, 0x80}, {0x401, 0xfffffffb}]}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:11:12 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)={0x0, 0x0, 0x7, 0x0, 0x3fd}) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'nlmon\t\x00\x7f\xed\xb1[\xe5\xa3\xcd\xb6\x00'}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000380)={0x0, 0x0, @ioapic={0xd000, 0x0, 0xc5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, [], 0x3}, {0x0, 0x8}, {}, {0xff}, {}, {0x0, 0x37}]}}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000480)={[0x0, 0x3, 0x0, 0x20, 0x0, 0x0, 0x4cb], 0x100000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 10:11:12 executing program 0: socket$kcm(0x10, 0x1, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000980), 0x0, 0x0, 0x0, 0x20000001}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000780)={0x0, 0x70, 0xfb, 0x9a, 0x3, 0x8, 0x0, 0x3, 0xc049, 0xa, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xffff74af, 0x2, @perf_bp={&(0x7f0000000480), 0x5}, 0xb6c79b46ff34523e, 0x9, 0x2, 0x7, 0x0, 0x7fffffff}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) socket$kcm(0x29, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'\xf6\xff\xff\xff\xff\xff\xff\xff\x00\xe9\xd5\x00', 0x200091}) socketpair(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000001040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f2, &(0x7f0000000080)='ip6tnl0\x00') socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext, 0x0, 0x0, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$kcm(0x29, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x0, 0x7, 0xfe7, 0x0, 0xed, 0x48c0, 0x2, 0x0, 0xa, 0x0, 0xa7, 0x0, 0x1f, 0x8, 0x6, 0x0, 0xfffffffffffff89d, 0x6, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x7, 0x0, 0x80, 0x0, 0x0, 0x10001, 0x7, 0x80, 0x0, 0xc5, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x7}, 0x4080, 0x3fe, 0xfffe, 0x5, 0x48f, 0x9, 0x5}, 0x0, 0x8, r2, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000000c0), 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c80)) gettid() r3 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000680)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00, 0x9, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x7fff, 0x5, @perf_bp={0x0, 0x6}, 0x14c2, 0x1, 0xfb46, 0x14, 0x0, 0x80, 0x1}, r3, 0x0, 0xffffffffffffffff, 0x8) r4 = socket$kcm(0xa, 0x5, 0x0) close(0xffffffffffffffff) recvmsg$kcm(r4, &(0x7f0000000440)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000500)=""/246, 0xf6}], 0x1, &(0x7f0000000940)=""/214, 0xd6}, 0x40002020) socket$kcm(0x29, 0xa, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) 10:11:12 executing program 0: socket$kcm(0x10, 0x1, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000980), 0x0, 0x0, 0x0, 0x20000001}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000780)={0x0, 0x70, 0xfb, 0x9a, 0x3, 0x8, 0x0, 0x3, 0xc049, 0xa, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xffff74af, 0x2, @perf_bp={&(0x7f0000000480), 0x5}, 0xb6c79b46ff34523e, 0x9, 0x2, 0x7, 0x0, 0x7fffffff}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) socket$kcm(0x29, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'\xf6\xff\xff\xff\xff\xff\xff\xff\x00\xe9\xd5\x00', 0x200091}) socketpair(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000001040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f2, &(0x7f0000000080)='ip6tnl0\x00') socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext, 0x0, 0x0, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$kcm(0x29, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x0, 0x7, 0xfe7, 0x0, 0xed, 0x48c0, 0x2, 0x0, 0xa, 0x0, 0xa7, 0x0, 0x1f, 0x8, 0x6, 0x0, 0xfffffffffffff89d, 0x6, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x7, 0x0, 0x80, 0x0, 0x0, 0x10001, 0x7, 0x80, 0x0, 0xc5, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x7}, 0x4080, 0x3fe, 0xfffe, 0x5, 0x48f, 0x9, 0x5}, 0x0, 0x8, r2, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000000c0), 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c80)) gettid() r3 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000680)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00, 0x9, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x7fff, 0x5, @perf_bp={0x0, 0x6}, 0x14c2, 0x1, 0xfb46, 0x14, 0x0, 0x80, 0x1}, r3, 0x0, 0xffffffffffffffff, 0x8) r4 = socket$kcm(0xa, 0x5, 0x0) close(0xffffffffffffffff) recvmsg$kcm(r4, &(0x7f0000000440)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000500)=""/246, 0xf6}], 0x1, &(0x7f0000000940)=""/214, 0xd6}, 0x40002020) socket$kcm(0x29, 0xa, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) [ 1763.308162][ T5128] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1763.326506][ T5128] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1763.352458][ T5128] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1763.370578][ T5128] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 1763.472019][ T5134] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1763.481978][ T5134] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1763.493081][ T5134] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1763.513845][ T5134] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 10:11:19 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') getdents64(r0, &(0x7f00000005c0)=""/153, 0x99) getdents64(r0, &(0x7f0000000500)=""/179, 0x10000020b) 10:11:19 executing program 0: socket$kcm(0x10, 0x1, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000980), 0x0, 0x0, 0x0, 0x20000001}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000780)={0x0, 0x70, 0xfb, 0x9a, 0x3, 0x8, 0x0, 0x3, 0xc049, 0xa, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xffff74af, 0x2, @perf_bp={&(0x7f0000000480), 0x5}, 0xb6c79b46ff34523e, 0x9, 0x2, 0x7, 0x0, 0x7fffffff}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) socket$kcm(0x29, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'\xf6\xff\xff\xff\xff\xff\xff\xff\x00\xe9\xd5\x00', 0x200091}) socketpair(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000001040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f2, &(0x7f0000000080)='ip6tnl0\x00') socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext, 0x0, 0x0, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$kcm(0x29, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x7, 0x0, 0x7, 0xfe7, 0x0, 0xed, 0x48c0, 0x2, 0x0, 0xa, 0x0, 0xa7, 0x0, 0x1f, 0x8, 0x6, 0x0, 0xfffffffffffff89d, 0x6, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x7, 0x0, 0x80, 0x0, 0x0, 0x10001, 0x7, 0x80, 0x0, 0xc5, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x7}, 0x4080, 0x3fe, 0xfffe, 0x5, 0x48f, 0x9, 0x5}, 0x0, 0x8, r2, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000000c0), 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c80)) gettid() r3 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000680)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00, 0x9, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x7fff, 0x5, @perf_bp={0x0, 0x6}, 0x14c2, 0x1, 0xfb46, 0x14, 0x0, 0x80, 0x1}, r3, 0x0, 0xffffffffffffffff, 0x8) r4 = socket$kcm(0xa, 0x5, 0x0) close(0xffffffffffffffff) recvmsg$kcm(r4, &(0x7f0000000440)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000500)=""/246, 0xf6}], 0x1, &(0x7f0000000940)=""/214, 0xd6}, 0x40002020) socket$kcm(0x29, 0xa, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) 10:11:19 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60148006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:11:19 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e61000006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:11:19 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r2, 0xc0c0583b, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, [], [{}, {0x0, 0x0, 0x0, 0x80}]}) 10:11:19 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x2, 0xfffffffffffffffb, 0x8000, 0x6}) write$P9_RREADLINK(r0, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r0, r0, &(0x7f0000000000), 0x0) setsockopt$packet_buf(r0, 0x107, 0xd, &(0x7f0000000040)="9899b65a7eb161e7daaab7fb240fa26a811d8f8a679f", 0x16) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) syz_mount_image$nfs4(&(0x7f0000000180)='nfs4\x00', &(0x7f0000000200)='./bus\x00', 0x7, 0x1, &(0x7f0000000300)=[{&(0x7f0000000240)="b9efbb3838e1ab998dffa52d36c2383494f4555402644a54e019455c1d856b76b668be48ae0a0a53b4ff801b119a76ad152991c1476602ddd6e5ccb437368c17774904e5433c10d05e80beac145bc351d6cf7834840039bea39439c618093bb3ea5d95896e5d4c005848284fe5850256f0cca80096220404da16504daceaf33ba026adfae30b5e5d66e684fe7e9d2b28280b4ded7c223188116086ed43c0c10f012764b58e8adb94638ea425e90cd0e1d27056f21e0d10a931", 0xb9, 0xaff}], 0x0, &(0x7f0000000340)='ext4\x00') 10:11:19 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1040], 0x410) 10:11:20 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x1}, 0x0) r0 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xdf\xc4\xd1\an\xfb\x99,\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) write(r0, &(0x7f00000004c0)="3161d417452c8f6d46edb3b1077f2abaa85e3489c66107ab7d9aeb42aa515f23c9150bfd105fa1be4e0415cb2c2d4a1cdff5ab24d3676cc093ea0ffa364b7e", 0x3f) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) sendfile(r0, r0, &(0x7f0000000200), 0xff8) r1 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000180)='Z\x00') [ 1770.943375][ T5380] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1770.963697][ T5380] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1770.991706][ T5275] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1771.015463][ T5380] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1771.043735][ T5380] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 1771.059950][ T5275] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors 10:11:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000400)=""/151, 0x97}], 0x1, 0x0, 0x23e}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x91b75d8e, 0x0, 0x0, 0x800e00519) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) readv(r3, &(0x7f0000000380)=[{&(0x7f0000000100)=""/76, 0x4c}, {0x0}, {0x0}, {0x0}], 0x4) shutdown(r1, 0x0) [ 1771.114720][ T5275] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1771.135722][ T5275] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 10:11:20 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e6014c006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:11:20 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$SNDCTL_DSP_GETTRIGGER(r0, 0x80045010, &(0x7f0000000140)) getsockopt$inet6_udp_int(r1, 0x11, 0xc6, &(0x7f0000000280), &(0x7f00000002c0)=0xf16768efe7fb28d3) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) r2 = open_tree(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x1000) fstat(r2, &(0x7f0000000300)) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) utime(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x2a9c, 0x6}) 10:11:20 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e61400006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1771.639937][ T5415] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1771.650034][ T5419] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1771.650098][ T5415] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1771.671242][ T5415] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1771.673693][ T5419] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1771.695797][ T5419] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1771.716086][ T5415] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 1771.732425][ T5419] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 10:11:30 executing program 4: getdents64(0xffffffffffffffff, &(0x7f00000005c0)=""/153, 0x99) getdents64(0xffffffffffffffff, &(0x7f0000000000)=""/186, 0xba) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="3abb7519b17f0bb547ebfaddbb7a26ba7e92dd9cde445a0f9ae7a27ec77a5e84b0cb9611e32ea169bb36a371f0117282fc5d6b6fb9a084c3da182c1bd4c210ad77c495adf2fded13a3a1e578cd30505fe33d8c1563dd9c2cd03d3da14e8bc4e26c13868e01dbb8441b725839d43bebed9a34e36e6efc9b15284665c10c975cc65685dc9a8839043b5319da991f6e18c5f65c"], 0x1) sendfile(r0, r0, &(0x7f0000000000), 0x0) accept$packet(r0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) io_setup(0x8, &(0x7f0000000400)=0x0) r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r2, 0x0, 0x0, 0x200, 0x0, 0x1}]) io_cancel(r1, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x26bcb375659154c7, 0xfff, 0xffffffffffffffff, &(0x7f0000000140)="98a035bf9b4ee0d170e426fa28c4a0d5346326247734a89f2da2e3331af26f3c9f3a38f7c3950ba0e0874c726ef548ec2dabecd68de3247fc62ce8b0626a6522aea986d1614bbf8fb16b497e2837e2f1280cfb4ef14973", 0x57, 0x2, 0x0, 0x1}, &(0x7f0000000240)) 10:11:30 executing program 5: 10:11:30 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e63c00006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:11:30 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000880)=ANY=[@ANYBLOB="01"], 0x1) sendfile(r0, r0, &(0x7f0000000000), 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) ptrace$pokeuser(0x6, r1, 0x388, 0xffffffffffffffff) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000040)=r1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:11:30 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60160006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:11:30 executing program 0: 10:11:30 executing program 5: 10:11:30 executing program 0: [ 1781.279785][ T5452] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1781.357581][ T5452] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1781.372020][ T5452] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock 10:11:30 executing program 5: 10:11:30 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000ec0)=ANY=[]}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r3, @ANYBLOB="0000003ac3904a3a75dbef000c000100627069646765000004002200"], 0x34}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0xd6, 0x0, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1781.441902][ T5452] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 1781.470258][ T5467] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 10:11:30 executing program 0: [ 1781.503305][ T5467] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1781.563092][ T5467] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock 10:11:30 executing program 5: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x4, 0xa00000, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x94d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext={0xc78e, 0x3}, 0x0, 0xae, 0x0, 0x0, 0x5, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) socket$nl_generic(0x10, 0x3, 0x10) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000000), 0x200) ftruncate(r0, 0xe901) mmap(&(0x7f0000200000/0x400000)=nil, 0x400002, 0x1, 0x2011, r0, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, r1) ftruncate(r0, 0xe901) r2 = dup(0xffffffffffffffff) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40046602, &(0x7f0000000200)=0x4060) r3 = socket$inet6(0xa, 0x400000000001, 0x0) r4 = dup(r3) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$P9_RFLUSH(r4, &(0x7f00000001c0)={0x7}, 0xfffffe99) [ 1781.645983][ T5488] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1781.672530][ T5467] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 1781.811611][ T5488] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 10:11:39 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') getdents64(r0, &(0x7f00000005c0)=""/153, 0x99) ioctl$VIDIOC_G_OUTPUT(0xffffffffffffffff, 0x8004562e, &(0x7f00000000c0)) getdents64(r0, &(0x7f0000000000)=""/186, 0xba) 10:11:39 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60168006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:11:39 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/fuse\x00', 0x2, 0x0) io_setup(0x7, &(0x7f0000000100)=0x0) io_submit(r1, 0x1, &(0x7f0000001a40)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) 10:11:39 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x8, &(0x7f00000006c0)=[{&(0x7f00000000c0)="c3feacfd385ba1c5b587155322f87ab735d027bb9728005346a9f837f5f63eb3ca46f9e7c9b3d9882843e92301d64f4ce621ba8c853ba26afad0095309f425f30e4ca4b467bd5c3e4c323b51638eb316b7428c1ea3185057ff0f", 0x5a, 0x8000000000007}, {&(0x7f0000000140)="9068f712608003e38eafd355d7e01fa9e98eac386abc541a938ac4b0e86fcd638e7db02e52b901e38b308ba0d74122661ffd836a7ac1574ad6c80feff1c7b24d08d6c4f440da3bd6ad77ccf53a90c124878ffafae13222afcc8c180839a7479c03d58dfc12a7841e8152799c07f0017b344118bf50e9e9e022", 0x79, 0xffffffff}, {&(0x7f0000001800)="98e640e1ff4ced0f29de0a1e96e66b81d3fdf95bde0fc11f80479de58e2cf4b5906f2df7b7197068f75e272b0e7c819cc9f20f35217f11f3f6df02901611bb65f4a08d18830eddc746149da969b79ae923ef8f19f2a9ad50997b844b6942c9aec930ad8f9afb80bd0e9ce32b807437e55905f3877f59766a537056182023448531e73133d4", 0x85, 0x8}, {&(0x7f0000000240)="7e342e1d083096ab8fd16460cc07329e47a645d5f5d20fe2b91241ed3422a5198f2215f4808672d8b20f4180fd99cb19b42dd07f45fb9865b6b08492f1b020729b1a33aafd13fda9c10d6e1f1d2b3467a54d24a901578e9695afa6c10aff01ae09e6515a8ae41eeea5da145b2e3d3608b36fdc304d60fcbfd2cd8e861250919763690776cda935b15f250430a69a61e35bae9bfdb64c54e4e6f150655eeddd73ae258c3f462a347a470d308b92de71bc0b37684a55c500b6f0c22b74", 0xbc, 0x3}, {&(0x7f0000000300)="3139bf824d8101010000906bbbd208f8ad897d0000001ed3bef85a10d54e6480de", 0x21, 0x40}, {&(0x7f0000000800)="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", 0x1000, 0x6}, {&(0x7f0000000300), 0x0, 0x11}, {&(0x7f0000000340)="a8dd81e068fec97a6072dde598de846eef42d3b072ebab993df333a5a1b538b5ca2c4af0fd4678a3661110adabfe6c13c5dc7fedca5e769d9b7b6353db6edd6d15d015c3f5d4f1dc7e35bd0e5a673b70305c493e6702c4463a90ddacd74b501362a9ef948c7f3fcddd5acc49706e8e73c72e84d7c6bbf8c288ee4bad933383cff9361c35e8638e4c970210c6f719c50b1217f0a9f3f67cfa566ce6a928061c9652390a74812c71f8d3ed764fd7f51a1607c55c4cfe1b48d6e657900248d9dd645626ac3cbe0b628051158d38e52b78f695e2c5fa710d9a1c5913436ffbb5a5a01b2394e9b5", 0xe5, 0x8}], 0x4801, 0x0) 10:11:39 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e66300006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:11:39 executing program 5: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x4, 0xa00000, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x94d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext={0xc78e, 0x3}, 0x0, 0xae, 0x0, 0x0, 0x5, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) socket$nl_generic(0x10, 0x3, 0x10) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000000), 0x200) ftruncate(r0, 0xe901) mmap(&(0x7f0000200000/0x400000)=nil, 0x400002, 0x1, 0x2011, r0, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, r1) ftruncate(r0, 0xe901) r2 = dup(0xffffffffffffffff) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40046602, &(0x7f0000000200)=0x4060) r3 = socket$inet6(0xa, 0x400000000001, 0x0) r4 = dup(r3) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$P9_RFLUSH(r4, &(0x7f00000001c0)={0x7}, 0xfffffe99) [ 1790.793906][ T5613] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1790.824508][ T5613] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors 10:11:39 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x4c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x2c, 0x12, @ip6gretap={{0x10, 0x1, 'ip6gretap\x00'}, {0x18, 0x2, [@IFLA_GRE_LOCAL={0x14, 0x6, @rand_addr="52104499a3570bfeced8abdd06955420"}]}}}]}, 0x4c}}, 0x0) 10:11:40 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1790.923486][ T5613] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1790.957622][ T5617] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1790.979672][ T5613] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 1791.025553][ T5617] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1791.055020][ T5641] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1791.067464][ T5617] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1791.133687][ T5617] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 10:11:40 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e6016c006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:11:40 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioprio_set$uid(0x3, 0x0, 0x0) r3 = socket$unix(0x1, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socket$inet6_udp(0xa, 0x2, 0x0) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) mmap$usbfs(&(0x7f0000ff2000/0xb000)=nil, 0xb000, 0x2000001, 0x90, r5, 0x3) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000040)) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[], 0x0) r6 = socket(0x3, 0x5, 0x2) connect$inet6(r6, &(0x7f0000000000)={0xa, 0xfffd, 0x3, @empty, 0x10000000000004}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffbffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='cpuset.cpus\x00', 0x2, 0x0) r7 = socket$unix(0x1, 0x2, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) setsockopt$TIPC_GROUP_JOIN(r8, 0x10f, 0x87, &(0x7f0000000500)={0x41, 0x1, 0x1}, 0x10) ioctl$IMGETDEVINFO(0xffffffffffffffff, 0x80044944, &(0x7f00000001c0)={0x1}) r9 = socket$l2tp(0x18, 0x1, 0x1) r10 = socket$rxrpc(0x21, 0x2, 0x2) connect$l2tp(r9, &(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, r10, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x4}}, 0x2e) [ 1791.173934][ T5647] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 10:11:40 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e66d00006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:11:40 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @rand_addr=0xdd}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) r2 = socket$inet6(0xa, 0x3, 0x6) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x8, 0x810, r2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) connect$inet6(r2, &(0x7f0000000500)={0xa, 0x0, 0x40f7, @mcast2, 0x7ff}, 0x9) r3 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r2, r3, &(0x7f0000000240)=0x202, 0x4000000000dc) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') ioctl$KVM_S390_UCAS_UNMAP(r3, 0x4018ae51, &(0x7f00000000c0)={0x8000, 0x7ff, 0x2}) sendmsg$NBD_CMD_RECONFIGURE(r3, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1ce, r4, 0xc05, 0x70bd29, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x84) sendmsg$NBD_CMD_STATUS(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000540)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="100025bd7000fbdbdf25050000002c00060005000000000000080800010000080000cad1827523e53cff9ed8"], 0x28}, 0x1, 0x0, 0x0, 0x8b29ba74f3c49941}, 0x4044) sendmsg$NBD_CMD_STATUS(r0, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8008}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x38, r4, 0xe68ef15a5cf8e17e, 0x70bd28, 0x25dfdbfc, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x1}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x3c}]}, 0x38}, 0x1, 0x0, 0x0, 0x6000c040}, 0x4040840) syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f0000000140)='./file0\x00', 0xef2, 0x4, &(0x7f0000000340)=[{&(0x7f0000000180)="e0fd7362724981af49f03422a2f4de52a0c04c04737171c9ed12c3d93e1181c0450e2943a2d44971c864bf7bcf05c8cf19027d86a5670cb887bd53a980f2243cc710335f4cf19421ce3a40181483e735cd202df8b2d4111fb1eb58f5581982a5", 0x60, 0x9}, {&(0x7f0000000200)="ef2adbc5715eae6a38a5b3866aa764dd425c72b974f6518f", 0x18, 0x65}, {&(0x7f0000000240)="f6962d2a7338672d16ed65aca0ade5e00b28a1725caafd00e15982562e5e60e13834ff5e2911a148856aca08bf464d11e3b268e65e645f81ec291fdf3924f7b56a8557fa470e3a3f2688a6b885f79f666c934f813574ce333d869263d942e67affacea909530a74b0c0eca525d7d50a33195ab05ede3ca49aee4eaeeb219db2cff68c929aea71e193a45d5b701c107eb259ae1e1b073bbd88d2d2246e7989549f4a5444300ebb6b656edfa885875463b53836f0578f9992ea8", 0xb9, 0x3}, {&(0x7f0000000300)="ef7afd7b8ed0da3d8b9b8db945e3f0fcb7c8b01d9b9507c52c541912174aed520c4f745894cb5b9759d98d27", 0x2c, 0xb}], 0x2000814, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1791.509040][ T5657] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1791.524411][ T5657] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1791.541377][ T5657] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1791.565389][ T5657] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 1791.694807][ T5663] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1791.718776][ T5663] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1791.730099][ T5663] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1791.754801][ T5663] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 10:11:49 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') getdents64(r0, &(0x7f00000005c0)=""/153, 0x86) getdents64(r0, &(0x7f0000000000)=""/186, 0xba) 10:11:49 executing program 0: clone(0x84007bf7, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() mknod(&(0x7f0000000180)='./file0\x00', 0x113e, 0x0) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) ptrace(0x10, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) shmget(0x1, 0x3000, 0xfffffffffffffee0, &(0x7f0000ffd000/0x3000)=nil) ptrace(0x11, r0) 10:11:49 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x2, 0xfffffffffffffffb, 0x8000, 0x6}) write$P9_RREADLINK(r0, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r0, r0, &(0x7f0000000000), 0x0) setsockopt$packet_buf(r0, 0x107, 0xd, &(0x7f0000000040)="9899b65a7eb161e7daaab7fb240fa26a811d8f8a679f", 0x16) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) syz_mount_image$nfs4(&(0x7f0000000180)='nfs4\x00', &(0x7f0000000200)='./bus\x00', 0x7, 0x1, &(0x7f0000000300)=[{&(0x7f0000000240)="b9efbb3838e1ab998dffa52d36c2383494f4555402644a54e019455c1d856b76b668be48ae0a0a53b4ff801b119a76ad152991c1476602ddd6e5ccb437368c17774904e5433c10d05e80beac145bc351d6cf7834840039bea39439c618093bb3ea5d95896e5d4c005848284fe5850256f0cca80096220404da16504daceaf33ba026adfae30b5e5d66e684fe7e9d2b28280b4ded7c223188116086ed43c0c10f012764b58e8adb94638ea425e90cd0e1d27056f21e0d10a931", 0xb9, 0xaff}], 0x0, &(0x7f0000000340)='ext4\x00') 10:11:49 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60174006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:11:49 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000040)='\x00', 0xffffffffffffffff}, 0x30) r1 = getpgrp(0xffffffffffffffff) prlimit64(r1, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) syz_open_procfs(r1, &(0x7f00000000c0)='net/mcfilter\x00') r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000880)=ANY=[@ANYBLOB], 0x1) sendfile(r2, r2, &(0x7f0000000000), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r1, r2, 0x0, 0x5, &(0x7f0000000180)='ext4\x00'}, 0x30) setpgid(r0, r3) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:11:49 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e69600006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1800.192892][ T5691] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1800.203784][ T5691] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1800.215222][ T5691] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1800.225985][ T5697] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1800.239563][ T5691] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 10:11:49 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) getxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='trusted.overlay.opaque\x00', &(0x7f0000000080)=""/243, 0xf3) [ 1800.285671][ T26] audit: type=1800 audit(1576836709.356:79): pid=5692 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="bus" dev="sda1" ino=17042 res=0 [ 1800.295384][ T5697] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1800.346845][ T5697] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1800.377613][ T5697] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 10:11:49 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e6017a006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:11:49 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) getcwd(&(0x7f0000000140)=""/88, 0x58) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:11:49 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60003006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:11:49 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @rand_addr=0xdd}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) r2 = socket$inet6(0xa, 0x3, 0x6) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x8, 0x810, r2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) connect$inet6(r2, &(0x7f0000000500)={0xa, 0x0, 0x40f7, @mcast2, 0x7ff}, 0x9) r3 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r2, r3, &(0x7f0000000240)=0x202, 0x4000000000dc) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') ioctl$KVM_S390_UCAS_UNMAP(r3, 0x4018ae51, &(0x7f00000000c0)={0x8000, 0x7ff, 0x2}) sendmsg$NBD_CMD_RECONFIGURE(r3, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1ce, r4, 0xc05, 0x70bd29, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x84) sendmsg$NBD_CMD_STATUS(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000540)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="100025bd7000fbdbdf25050000002c00060005000000000000080800010000080000cad1827523e53cff9ed8"], 0x28}, 0x1, 0x0, 0x0, 0x8b29ba74f3c49941}, 0x4044) sendmsg$NBD_CMD_STATUS(r0, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8008}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x38, r4, 0xe68ef15a5cf8e17e, 0x70bd28, 0x25dfdbfc, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x1}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x3c}]}, 0x38}, 0x1, 0x0, 0x0, 0x6000c040}, 0x4040840) syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f0000000140)='./file0\x00', 0xef2, 0x4, &(0x7f0000000340)=[{&(0x7f0000000180)="e0fd7362724981af49f03422a2f4de52a0c04c04737171c9ed12c3d93e1181c0450e2943a2d44971c864bf7bcf05c8cf19027d86a5670cb887bd53a980f2243cc710335f4cf19421ce3a40181483e735cd202df8b2d4111fb1eb58f5581982a5", 0x60, 0x9}, {&(0x7f0000000200)="ef2adbc5715eae6a38a5b3866aa764dd425c72b974f6518f", 0x18, 0x65}, {&(0x7f0000000240)="f6962d2a7338672d16ed65aca0ade5e00b28a1725caafd00e15982562e5e60e13834ff5e2911a148856aca08bf464d11e3b268e65e645f81ec291fdf3924f7b56a8557fa470e3a3f2688a6b885f79f666c934f813574ce333d869263d942e67affacea909530a74b0c0eca525d7d50a33195ab05ede3ca49aee4eaeeb219db2cff68c929aea71e193a45d5b701c107eb259ae1e1b073bbd88d2d2246e7989549f4a5444300ebb6b656edfa885875463b53836f0578f9992ea8", 0xb9, 0x3}, {&(0x7f0000000300)="ef7afd7b8ed0da3d8b9b8db945e3f0fcb7c8b01d9b9507c52c541912174aed520c4f745894cb5b9759d98d27", 0x2c, 0xb}], 0x2000814, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1800.668929][ T5727] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1800.751687][ T5727] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1800.775483][ T5727] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock 10:11:49 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e6012d006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1800.818763][ T5738] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1800.829325][ T5727] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 1800.848451][ T5738] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1800.920528][ T5738] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1800.978024][ T5738] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 10:11:56 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000880)=ANY=[], 0xffffffffffffffbe) sendfile(r1, r1, &(0x7f0000000000), 0x0) getdents64(r1, &(0x7f00000000c0)=""/150, 0x5b8542ed) getdents64(r0, &(0x7f0000000000)=""/186, 0xba) 10:11:56 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e6012d006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:11:56 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e66c03006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:11:56 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e6013f016c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:11:56 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r0, r0, &(0x7f0000000000), 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f00000001c0)={0x9c0000, 0x2fd, 0x0, [], &(0x7f0000000180)={0xa10906, 0xfffffe01, [], @value=0xbe4}}) chroot(&(0x7f0000000140)='./file0\x00') syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x401, 0x200400) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, r1, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c00000000400000010000000100000000400000f93f000080000000101308006d5ebe5a00422fff53ef", 0x3a, 0x400}], 0x4801, 0x0) 10:11:56 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0), 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f0000000280)='/dev/bsg\x00', 0x1, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r1, r1, &(0x7f0000000000), 0x0) ioctl$KVM_GET_XSAVE(r1, 0x9000aea4, &(0x7f00000008c0)) write$P9_RREADLINK(r0, &(0x7f0000000880)=ANY=[@ANYBLOB='>'], 0x1) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioperm(0x200, 0x6, 0x3) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r3, 0x0, 0x486, &(0x7f0000000540), &(0x7f0000000580)=0xc) sendmsg$tipc(r2, &(0x7f0000000500)={&(0x7f0000000300)=@nameseq={0x1e, 0x1, 0x1, {0x40, 0x1, 0x3}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)="f825fdc4152af1860613dd64485eef34551c8f6c4b9d740277b751654f92efae0de627b55ab6fb2aed0783f216e368d7bd1688bb68c938b06f46945d34812069f10364015d59661d471c5372ef3231401de3d5dcaf41eeb35243be397787b30dafae10e0dcf98c860ffb98be6c14eb7d14ec3dd8909394a29e0bd2e3c10313893309fbea405347630a4a8e286ada49e0b6dfaf81c373a879b8a52053cc7ce8fc034cb83d6e341d8380dc936c0944a313a65db60419b9af7cc761f88c7e6c", 0xbe}, {&(0x7f0000000400)="a968112d51c3497181cbd701a15c35028c28501ebcb3ee2b5fa11c382f79911ce275646a78ee33510888a467e7dd0f7fc07b6ebe159b90e6eaf48822cf36229645ee6951b4a10495b3f48df230d7feb323570fae91eb893246b235f9b3b0", 0x5e}], 0x2, 0x0, 0x0, 0x800}, 0x4080050) sendfile(r0, r0, &(0x7f0000000000), 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e22, 0x8ad, @local, 0x4}}, 0x1ff, 0x80}, &(0x7f0000000040)=0x90) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000200)={r4, 0x1f}, &(0x7f0000000240)=0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1807.575389][ T5785] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1807.601003][ T5774] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 10:11:56 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1807.654894][ T5785] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1807.688354][ T5774] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1807.724212][ T5774] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1807.768725][ T5785] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1807.780589][ T5774] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 10:11:56 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0), 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f0000000280)='/dev/bsg\x00', 0x1, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r1, r1, &(0x7f0000000000), 0x0) ioctl$KVM_GET_XSAVE(r1, 0x9000aea4, &(0x7f00000008c0)) write$P9_RREADLINK(r0, &(0x7f0000000880)=ANY=[@ANYBLOB='>'], 0x1) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioperm(0x200, 0x6, 0x3) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r3, 0x0, 0x486, &(0x7f0000000540), &(0x7f0000000580)=0xc) sendmsg$tipc(r2, &(0x7f0000000500)={&(0x7f0000000300)=@nameseq={0x1e, 0x1, 0x1, {0x40, 0x1, 0x3}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)="f825fdc4152af1860613dd64485eef34551c8f6c4b9d740277b751654f92efae0de627b55ab6fb2aed0783f216e368d7bd1688bb68c938b06f46945d34812069f10364015d59661d471c5372ef3231401de3d5dcaf41eeb35243be397787b30dafae10e0dcf98c860ffb98be6c14eb7d14ec3dd8909394a29e0bd2e3c10313893309fbea405347630a4a8e286ada49e0b6dfaf81c373a879b8a52053cc7ce8fc034cb83d6e341d8380dc936c0944a313a65db60419b9af7cc761f88c7e6c", 0xbe}, {&(0x7f0000000400)="a968112d51c3497181cbd701a15c35028c28501ebcb3ee2b5fa11c382f79911ce275646a78ee33510888a467e7dd0f7fc07b6ebe159b90e6eaf48822cf36229645ee6951b4a10495b3f48df230d7feb323570fae91eb893246b235f9b3b0", 0x5e}], 0x2, 0x0, 0x0, 0x800}, 0x4080050) sendfile(r0, r0, &(0x7f0000000000), 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e22, 0x8ad, @local, 0x4}}, 0x1ff, 0x80}, &(0x7f0000000040)=0x90) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000200)={r4, 0x1f}, &(0x7f0000000240)=0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1807.845935][ T5785] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 10:11:57 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e6012d006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:11:57 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60148016c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:11:57 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e67903006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:11:57 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e6010c006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1808.328103][ T5922] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1808.365851][ T5922] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1808.395531][ T5922] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1808.434981][ T5922] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 1808.625428][ T5930] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1808.655923][ T5930] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1808.698066][ T5930] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1808.729157][ T5930] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 10:12:00 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc8\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4(\xdd\xc4sx\x94\x9d\x87\xac\xad\x80\xa3P\\\xefJ;x\x03\x99k#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq') getdents64(r0, &(0x7f00000005c0)=""/153, 0x99) getdents64(r0, &(0x7f0000000000)=""/186, 0xba) 10:12:00 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e63204006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:12:00 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e6010c006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:12:00 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100036c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:12:00 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e62804006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:12:00 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0x256, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x10001, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x2}, 0x0, 0x0, &(0x7f0000000340)={0x0, 0xc, 0x2, 0x14}, &(0x7f0000000380)=0x94, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=0x19}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000640)=r0, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x4, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0, 0xfffffffffffffdd9, r0}, 0xffab) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 10:12:01 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r0, r0, &(0x7f0000000000), 0x0) ioctl$RTC_AIE_OFF(r0, 0x7002) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1812.158573][ T5963] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1812.170840][ T5969] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1812.188670][ T5969] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1812.201981][ T5963] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1812.213222][ T5963] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1812.246053][ T5963] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 1812.275405][ T5969] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1812.304980][ T5969] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 10:12:01 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e63204006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:12:01 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e6010c006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1812.384807][ T26] audit: type=1800 audit(1576836721.456:80): pid=5986 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="bus" dev="sda1" ino=17041 res=0 10:12:01 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x6, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4809, 0x0) 10:12:01 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e64804006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:12:01 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60110046c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1812.930330][ T6011] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1812.978273][ T6011] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1813.009136][ T6011] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1813.021117][ T6017] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1813.049506][ T6017] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1813.070621][ T6011] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 1813.080177][ T6017] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1813.109125][ T6017] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 10:12:08 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) 10:12:08 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e63204006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:12:08 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100036c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:12:08 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e64904006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:12:08 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') getdents64(r0, &(0x7f00000005c0)=""/153, 0x99) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f00000000c0)={0x28, 0x2, 0x0, {0x3, 0x101, 0x1}}, 0x28) getdents64(r0, &(0x7f0000000000)=""/186, 0xba) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cuse\x00', 0x82, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}, 0x3180, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0xb) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) r3 = syz_open_dev$dmmidi(0x0, 0x188, 0x0) ioctl$VHOST_SET_FEATURES(r3, 0x4008af00, &(0x7f00000002c0)=0x3a) ioctl$VIDIOC_ENUMAUDIO(r3, 0xc0345641, &(0x7f0000000080)={0x80000000, "f92179888098cae73f52a6bdf23764f5a0541e5083dbaf290c4929ae970d9929", 0x1, 0x3}) ioctl$DRM_IOCTL_GEM_OPEN(r3, 0xc010640b, &(0x7f0000000040)) r4 = syz_open_dev$dmmidi(0x0, 0x188, 0x0) ioctl$VHOST_SET_FEATURES(r4, 0x4008af00, &(0x7f00000002c0)=0x3a) ioctl$VIDIOC_ENUMAUDIO(r4, 0xc0345641, &(0x7f0000000080)={0x80000000, "f92179888098cae73f52a6bdf23764f5a0541e5083dbaf290c4929ae970d9929", 0x1, 0x3}) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f00000000c0)) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x1182, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(r5, 0xc008640a, &(0x7f0000000200)={0x0}) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)={0x0, r6}) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) socket$tipc(0x1e, 0x0, 0x0) write$P9_RRENAME(0xffffffffffffffff, &(0x7f0000000300)={0xfffffffffffffcdb, 0x15, 0x1}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(0x0, 0x0, 0x0, r2, 0x0) ioctl$KVM_SET_BOOT_CPU_ID(0xffffffffffffffff, 0xae78, 0x0) close(0xffffffffffffffff) 10:12:08 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60138046c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1819.377899][ T6049] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1819.388851][ T6049] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1819.410022][ T6061] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 10:12:08 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x200, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1819.431163][ T6049] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1819.451839][ T6061] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1819.464937][ T6061] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock 10:12:08 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100036c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1819.493187][ T6049] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 1819.502915][ T6061] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 10:12:08 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0xf) 10:12:08 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100056c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:12:08 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e64a04006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:12:08 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:12:08 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100036c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:12:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000400)=""/151, 0x97}], 0x1}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x91b75d8e, 0x0, 0x0, 0x800e00519) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r2, &(0x7f0000001740)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5}, 0x2) r3 = dup(r2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0x1de, 0x0, 0x0, 0x800e0050e) shutdown(r3, 0x0) recvmsg(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000300)=""/130, 0x82}, {0x0}, {0x0}, {0x0}], 0x4}, 0x40102) shutdown(r4, 0x0) shutdown(r1, 0x0) [ 1820.168303][ T6193] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1820.238027][ T6196] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1820.265230][ T6193] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1820.265490][ T6196] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1820.299432][ T6196] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1820.302651][ T6193] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock 10:12:09 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0xf) ioctl$TIOCSETD(r0, 0x5412, &(0x7f00000000c0)) [ 1820.348437][ T6193] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 1820.350536][ T6196] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 10:12:09 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e64b04006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1820.717084][ T6319] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1820.738624][ T6319] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1820.749643][ T6319] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1820.760140][ T6319] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 10:12:17 executing program 1: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ttyS3\x00', 0x1b93204cdff4e961, 0x0) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f0000000200)=0xfffffffe) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdec, 0x0, 0x2b63042d58f23fb3, 0x0, [], 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$KDSETMODE(r0, 0x4b3a, 0x1) write$P9_RREADLINK(r1, &(0x7f0000000880)=ANY=[@ANYBLOB='\b'], 0x1) sendfile(r1, r1, &(0x7f0000000000), 0x0) r2 = dup2(r1, 0xffffffffffffffff) getsockopt$netrom_NETROM_T1(r2, 0x103, 0x1, &(0x7f0000000040), &(0x7f0000000140)=0x4) 10:12:17 executing program 0: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18, 0xffffffa7}}], 0x40000000000037b, 0xc000) 10:12:17 executing program 5: r0 = syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, 0xfffffffffffffffe) 10:12:17 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100066c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:12:17 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') getdents64(r0, &(0x7f00000005c0)=""/153, 0x99) creat(&(0x7f00000000c0)='./file0\x00', 0x1) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r1, r1, &(0x7f0000000000), 0x0) write$FUSE_LSEEK(r1, &(0x7f0000000080)={0x18, 0x0, 0x1, {0x80000000}}, 0x18) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r4, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x0) r5 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r5, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r5, r5, &(0x7f0000000000), 0x0) write$P9_RREADLINK(r2, &(0x7f0000000180)=ANY=[@ANYRESDEC=r3, @ANYRES16=r4, @ANYRES16=r5], 0x18) sendfile(r2, r2, &(0x7f0000000000), 0x0) getdents64(r0, &(0x7f00000001c0)=""/198, 0xfffffffffffffe87) ioctl$ASHMEM_GET_PROT_MASK(r1, 0x7706, &(0x7f0000000040)) 10:12:17 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e64c04006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:12:17 executing program 5: r0 = syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, 0xfffffffffffffffe) 10:12:17 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000738ff0)={0x2, 0x4e21, @multicast1}, 0x10) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) shutdown(r1, 0x2) 10:12:17 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x803, 0x300) r1 = socket$inet(0x2, 0x80003, 0x4) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x10) recvmmsg(r0, &(0x7f0000002e00), 0x386, 0x22, 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) [ 1828.756837][ T6364] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 10:12:17 executing program 5: r0 = syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, 0xfffffffffffffffe) [ 1828.823745][ T6364] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors 10:12:18 executing program 5: r0 = syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, 0xfffffffffffffffe) [ 1828.905382][ T6364] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1828.908180][ T6363] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1828.949541][ T6364] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 1828.983463][ T6363] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors 10:12:18 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x1226843, 0x0) r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_SUBDEV_G_SELECTION(r0, 0xc040563d, &(0x7f0000000140)={0x0, 0x0, 0x207, 0x1, {0x100, 0x4a2, 0x0, 0xe2}}) [ 1828.995502][ T6363] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1829.034748][ T6363] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 10:12:18 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) shmat(0xffffffffffffffff, &(0x7f0000ffd000/0x1000)=nil, 0x4000) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000001c0)={@in6={{0xa, 0x4e21, 0x6, @dev={0xfe, 0x80, [], 0x27}, 0x6}}, 0x0, 0x3, 0x0, "9473a339ca9c0977052221aa73a091d8c1732740381bd93a89f1c6eeef52c4d14b0cbf1196780fc2b93361cfb1530e7f87ab98e37060b622fe7be6fd6f5786620fde28b08374751b3e62607a576a625a"}, 0xd8) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaacb3, &(0x7f0000000100), 0x40, 0x0) lsetxattr$security_smack_transmute(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000180)='TRUE', 0x4, 0x3) 10:12:18 executing program 5: ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, 0xfffffffffffffffe) 10:12:18 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e64d04006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:12:18 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100076c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1829.612531][ T6410] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1829.625465][ T6410] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1829.657137][ T6410] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1829.673106][ T6417] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1829.690650][ T6410] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 1829.700503][ T6417] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1829.765312][ T6417] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1829.813280][ T6417] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 10:12:26 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r0, r0, &(0x7f0000000000), 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r0, 0x8008ae9d, &(0x7f0000000540)=""/112) r1 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') getdents64(r1, &(0x7f00000005c0)=""/153, 0x99) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000380)) getdents64(r1, &(0x7f0000000000)=""/186, 0xba) readv(0xffffffffffffffff, &(0x7f0000000300)=[{&(0x7f0000000140)=""/125, 0x7d}, {&(0x7f0000000680)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/126, 0x7e}, {&(0x7f0000000240)=""/182, 0xb6}, {&(0x7f0000000440)=""/196, 0xc4}, {&(0x7f0000001680)=""/248, 0xf8}], 0x6) socket$key(0xf, 0x3, 0x2) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000001780)=ANY=[@ANYBLOB="4309c79678ab0d6de45803f7ba6cab98fb562668ee7ba21787515bc8dff4f56a7a8530b8aba88af5ea23ff27ffa807c5a07b87d6db9dc791b1f3b45db5dfd78c741f5cc2e9dfd72e1ae9698a0119eb5a63268fe4f40f6ae060a3798d752982592359b3362111f2f44c60cf527a"], 0x1) sendfile(r2, r2, &(0x7f0000000000), 0x0) preadv(r2, &(0x7f0000001b40), 0x100000000000008f, 0x7) 10:12:26 executing program 5: ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, 0xfffffffffffffffe) 10:12:26 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100096c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:12:26 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x803, 0x300) r1 = socket$inet(0x2, 0x80003, 0x4) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x10) recvmmsg(r0, &(0x7f0000002e00), 0x386, 0x22, 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) 10:12:26 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e64e04006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:12:26 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x19, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x82000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x293) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:12:27 executing program 5: ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, 0xfffffffffffffffe) [ 1838.045361][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1838.051242][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1838.057051][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1838.062916][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1838.068728][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1838.074466][ C0] protocol 88fb is buggy, dev hsr_slave_1 10:12:27 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000200}, 0xc, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="5800000032e12d2b854f32803c65f78dbd6f93e831845e62c3e43aac3f8d0aa5462699c5b4292af5e7268d8f852025009cee22372c13d2cef146ddc3", @ANYRES16=r1, @ANYBLOB="06012bbd7000fedbdf250700000044000100080005000000000008000800000400000c0006006c626c630000000008000800e503000014000300ac1414aa0000000000000000000000000800010002000000"], 0x58}, 0x1, 0x0, 0x0, 0x4000004}, 0x40) write$P9_RREADLINK(r0, &(0x7f0000000880)=ANY=[@ANYBLOB='\x00'], 0x1) sendfile(r0, r0, &(0x7f0000000000), 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000040)=[@mss={0x2, 0x3b4}, @window={0x3, 0xfff, 0x1}, @mss={0x2, 0x80}, @timestamp, @window={0x3, 0x9, 0x7}, @sack_perm, @sack_perm], 0x7) [ 1838.091912][ T6444] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1838.105382][ T6444] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1838.173294][ T6449] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1838.197480][ T6444] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1838.272615][ T6449] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1838.303723][ T6444] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 10:12:27 executing program 0: 10:12:27 executing program 5: r0 = syz_open_dev$sndtimer(0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, 0xfffffffffffffffe) [ 1838.317589][ T6449] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock 10:12:27 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x350, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @rand_addr=0xdd}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r5, @ANYBLOB="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"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) bind(r1, &(0x7f0000000340)=@ll={0x11, 0x1b, r5, 0x1, 0x0, 0x6, @dev={[], 0x2b}}, 0x80) r6 = socket$inet6(0xa, 0x3, 0x6) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x8, 0x810, r6, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r6, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r6, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r6, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) connect$inet6(r6, &(0x7f0000000500)={0xa, 0x0, 0x40f7, @mcast2, 0x7ff}, 0x9) r7 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r6, r7, &(0x7f0000000240)=0x202, 0x4000000000dc) r8 = syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') ioctl$KVM_S390_UCAS_UNMAP(r7, 0x4018ae51, &(0x7f00000000c0)={0x8000, 0x7ff, 0x2}) sendmsg$NBD_CMD_RECONFIGURE(r7, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1ce, r8, 0xc05, 0x70bd29, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x84) sendmsg$NBD_CMD_STATUS(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x28, r8, 0x10, 0x70bd25, 0x25dfdbfb, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x5}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x28}, 0x1, 0x0, 0x0, 0x8b29ba74f3c49941}, 0x4044) sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x34000020}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x34, r8, 0x200, 0x70bd2d, 0x25dfdbfb, {}, [@NBD_ATTR_BLOCK_SIZE_BYTES={0xc}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x4041881) [ 1838.355789][ T6449] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 10:12:27 executing program 0: [ 1838.661685][ T6489] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 10:12:36 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') ioctl$KVM_GET_NR_MMU_PAGES(0xffffffffffffffff, 0xae45, 0x2) getdents64(r0, &(0x7f0000000240)=""/165, 0xa5) getdents64(r0, &(0x7f0000000000)=""/186, 0xba) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000200)={0x1c, 0x0, &(0x7f00000000c0)=[@acquire_done={0x40106309, 0x3}, @release={0x40046306, 0x3}], 0xc7, 0x0, &(0x7f0000000100)="6f753f593fb7238ba4c0d7f0e889a76b4f5e649f69e8e8784c7d2b3ff35031ea23f7e9743327ead57819f4288ea515389936dd6ccf3cea9194475a9ebd385360eeb919d20bc14467c1957c77f908e8d2d7c2ef7751c0c291ba61cd5729b9afa841e07579fa872b0bd6119c8a3a8388cb39821a76386423d7663831bc6cc61cb5253f09fe8e296bc65b1b19365e26fa05690239e3416c2c70d6c19401f58b6a200a2bdacbfc3b2dc2fd3d642419e7aa32a98ff227e6d4017edd46c3cc9c2b9a77fc67c3e4151e88"}) 10:12:36 executing program 0: 10:12:36 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e601000a6c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:12:36 executing program 5: r0 = syz_open_dev$sndtimer(0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, 0xfffffffffffffffe) 10:12:36 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e64f04006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:12:36 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000100)={0x0, 0x0}) sched_setaffinity(r0, 0x8, &(0x7f0000000500)=0xa000000000000005) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0}, 0x0) setreuid(0x0, r1) r2 = getpgrp(0x0) setpriority(0x0, r2, 0xffff) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000900)={r2}, 0xc) r3 = getpgrp(0xffffffffffffffff) prlimit64(r3, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) ioprio_set$pid(0x2, r3, 0x7) shmctl$IPC_SET(0x0, 0x1, &(0x7f00000001c0)={{0x6, r1, 0xee01, 0x0, 0xee01, 0x10, 0x319a}, 0x81, 0xe86b, 0x0, 0x10000020, r2, r0, 0x201}) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x80, 0x5, &(0x7f0000000440)=[{&(0x7f0000000180)="f70f23cd64f59db8dbd11c8a13b765e61daedae8b198380e598e5a563441c2c93084e4c44d36c411ac67c1462abc6681ea93ea51a9ce30d94396", 0x3a}, {&(0x7f00000001c0)="faed9881379f2e6f60eff356370c67062d0bf7f4e4ffa4b73b2a27daa21bc0f4584c1796da591270e87214d4fffdd9d64790ea8ba89c2d8807ad663887b3eab7c4db63360d8a94f70cec3af012b118a7f9fe036911eb7c287a4f293d7d761aa6f7e33ff1e231bc575c2edfcd84aa26afe2227c92e2657bd766d9a90fe9cdd64704eb7dbfc31b5b6305467eaeed01d542b6b46f612b087217bad646f640ecab8cbc140dd908c32e8045cba78b9e6443ec603c143ad6f9332ac1a0ea6f0735cd7f040c65d5f10284bfc863010d3b3a6b13f681f0", 0xd3, 0x3}, {&(0x7f00000002c0)="5ec33bcc94092c178f152e4cb2c82a9f4276b41bb91b15a2d96781bf2518fa5f87e4f34a87a2a738d7b6951b72d60791cc7ee0183ab98101f822f094f0a1978ab40a8b011ddeec564b9b9f3d09d9de7591cbaa18051c2f5d095463957117ce93d8d99cf2799dbde92a4b249da53b895871890c0f00e6b884952c1d14162b1cbfb595cf9bff4b854e2fd622bf5029b4c0c9f6405ff98650ca3d0b5c8f01ef6c9a418d06f61a2aa56362c65d498be4e5b886024d858f4afa56ebe0aae16ba6bb53d6f15b83a0e69471ca315eaa249af5238d60f8dc6229fdd469e344416a92a0d2d1679e7c082c5446389d20054b3d8711cdedfbd9e848d04e5a1ce2", 0xfb, 0x400}, {&(0x7f00000003c0)="ccf5a11a5d40d1f9e9833625984130f5d02843044d0b6d40effca29b7eafbf527ad077d5ed8792fe3d3efd03c60da6edcd1ad6864f599eaafc7ae5e589f4601b104add4e66eebfa86fc1be219e6c6f711ecbb9d507e4d3ad96", 0x59, 0x1f}, {&(0x7f00000006c0)="01f3ab3f197541d8d914be953f1ddc0c870f92f97bfde13cc0cda02d1f36e2fbd45106cdcb4c83761a1016eda237a22d577c4214d5c7778c54db9b6b11015452d2686017656effe961816e408bdfcd62ba90ef0a638ad293914cf10db5373d53255d8df96b3fd97792f644e9a3742a99e597dadb1cdad39eea1e600bd712835a0d3cc54c150198c7c1", 0x89, 0x708000}], 0x800, &(0x7f0000000800)=ANY=[@ANYBLOB='grpquota,nobh,barrier=0x00000000000001ff,usrquota,grpid,test_dummy_encryption,audit,smackfsroot=ext4\x00,euid>', @ANYRESDEC=r1, @ANYBLOB=',Obj_user=,\x00']) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:12:36 executing program 0: 10:12:36 executing program 5: r0 = syz_open_dev$sndtimer(0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, 0xfffffffffffffffe) [ 1847.379458][ T6513] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 10:12:36 executing program 0: 10:12:36 executing program 5: syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, 0xfffffffffffffffe) [ 1847.500421][ T6513] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1847.528293][ T6517] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 10:12:36 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f0000000140)={0x1000000}) [ 1847.624589][ T6517] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1847.636026][ T6513] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1847.663700][ T6517] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock 10:12:36 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x2, 0x0, &(0x7f00000007c0), 0x44c00, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x3ce}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xfffffffffffffffe, 0x9, &(0x7f0000000880)=[{&(0x7f0000000140)="6cf0d0792e04dc97487d4a1769fdf824e0d43593a76a4e3c0e8d415a4f548f175105131fabef867af2bb019e8510533a76da6e88b08c47631c67b0c1e0deac6406cb2cc0dafaa527f587e79e7e2185b48ab79c5978d45b54fe36acdb8323c12635c2534b0babf44c95e364dbf33c64fa76a7e29da3a862a04270c370ab063c55bb8b4d1dd9d26b278f925fc9bd0add215c0dc0ad3c6f7f52fb0ec2b3aa6ad6ce69b37a48b1f99931fe1edf94ffcfe62529f6b603500666cc3e21ddc226c21b371fdf00b402f2cc874fcdb7e6160a391e0971b9c9466818ca59878b7ec35b007bf720bf09d4", 0xe5, 0x75}, {&(0x7f0000000240)="cd23951b0a1f76b37fc82f3b156eaf07d13931ee7147d858f9ca75658cf42ad1000d4b89d28d8d01bb3d0b2ad83aec78395e3694a7920456002a561c9e654d137cf1b2553243c1e3a3fb4dc5c2eecd64bc71064f9b6c7dd82b7b1e6b9786b91da1965cd0eb895c320f274fe53612cf52d0327d170c303692ff87dd881424bfe308c6f864f36400d3f290b3241f8b7fba92f4b7e9a587866a3a2539a28bc590fe91a1be4d89f89e86c448a8f05d2de58a28537b0e6b2caa9a", 0xb8}, {&(0x7f0000000980)="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", 0xf2, 0x7}, {&(0x7f0000000400)="aebad08f8fdc4e6a3eb20a1868e30105ef2810afe7e1a1b4a5655321a554a31fc8dfcbdbc017383a4e3d5e193342476e4743196b72e247459e1754df3b37acad836e8c", 0x43, 0x7}, {&(0x7f0000000040)="bbe4f7e065f7af5e7f615afa711ec2900b5346a2a3e0cf3475565983c45e71f88775", 0x22, 0x202}, {&(0x7f0000000500)="be1aa25b9c3c0bff701d1c9faa4f4d9299a6606f8cb7413d209f9580a6ed377944e2a443ddec505c392c5439347f25fd77b0b451dfb21d9bedc2cb85994bd16d12e96d2cfffcbdfdf23f71f1b21f59cf3e2e9af64e9759bad71b4976d6827cd4ea194927ae45ad46b00a9ab0242ab3843077f440adaffe504583f7839baa0da3900a5945fa58", 0x86, 0x5}, {&(0x7f00000006c0)="c224701e8946d3bf6858736a96026afea007a25f2f1e9dbcca17489e76008dccb025d3a7c5a97a9ec94785a62796af7c03eb673fd1ca2f062603a0baad819381e6a53102e0d8e65c65ddd8d9be71762c5fea0a7ccf0517ca312710a17b8fd1b26adedf4d79a1b090ea544a711eedc7451899522ed78b15a88e2614bff349061d8aaac38e08766bedba9ae5c2ccfd161d79d62178c76c0e93d65b36b57d02061f4c3d3ec13809fb1cdbddfba3d762abb1f8031974c37e46108faf5e91950c1d295de329f43566ca374a6ae84d099bf3875ea1f5f690b1e17ec37190368d67af22d1030478b3ff15b801aa8e22", 0xffffffffffffff95, 0x1}, {&(0x7f00000007c0)="6b5fc18c5229250d9c01ed073f9a0dee3f83d86690b072510a156cf815c6d78109078c555aebb27201a261590e989ea7b227a6cfa37075cbe224440ea1eb93894cf6c00345aa4de6d92e767afa31c6900312c6d3fe2c9859b4877bd8206a4b11d63f437154467342cb1c6d2b47bceec659e70eb821e2990b11a76ab8e26251bf80011f0603b190a8ee91e7cc9320d8b18b6925c873c1c2695b2d3b8d2088fd8c0ad3a68ebfcdf5d291f050", 0xab, 0x1}, {&(0x7f0000000480)="168fca77ce3c9bad2d618681a737b0e0fb9a077022809e83a69620075186ded33577ce8542fca5ef0a9490ace3a14397910307434ada066aa84542d5", 0x3c, 0x40000}], 0x4801, 0x0) [ 1847.688292][ T6513] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 1847.754938][ T6517] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 10:12:45 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') getdents64(r0, &(0x7f00000005c0)=""/153, 0x99) socket(0x1d, 0x0, 0x2) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r1, r1, &(0x7f0000000000), 0x0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r2, r2, &(0x7f0000000000), 0x0) renameat(r1, &(0x7f00000000c0)='./file0\x00', r2, &(0x7f0000000100)='./file0\x00') getdents64(r0, &(0x7f0000000000)=""/186, 0xba) 10:12:45 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000300)="1400000013000507ed0a8064d200100013000080", 0x14}], 0x1}, 0x0) 10:12:45 executing program 5: syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, 0xfffffffffffffffe) 10:12:45 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e601000c6c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:12:45 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e65004006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:12:45 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x3fd}], 0x4801, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r1, r1, &(0x7f0000000000), 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000100)) write$P9_RREADLINK(r0, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r0, r0, &(0x7f0000000000), 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x1, &(0x7f0000000040)=0xa0, 0x4) 10:12:45 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400c582f24186cf0d", @ANYRES32=r2, @ANYBLOB="00000001ffffffff"], 0x3}}, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000180)={0x0, @sco={0x1f, {0x0, 0x0, 0x4, 0x0, 0x2}}, @can, @rc={0x1f, {0x0, 0x80, 0x0, 0x1}}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)='erspan0\x00', 0xd1, 0x0, 0x1}) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x72, @empty, 0x80000}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 10:12:45 executing program 5: syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, 0xfffffffffffffffe) [ 1856.678348][ T6662] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1856.712157][ T6662] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors 10:12:45 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000380)={0x0, 0x0, @ioapic={0xd000, 0x0, 0xc5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x8}]}}) [ 1856.845404][ T6664] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1856.855277][ T6664] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors 10:12:46 executing program 1: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x400, 0x0) ioctl$BLKIOMIN(r0, 0x1278, &(0x7f0000000140)) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1856.909769][ T6662] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1856.923439][ T6664] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1856.933603][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1856.960896][ T6662] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 1856.970363][ T6664] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 10:12:46 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e65104006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:12:46 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x20) [ 1857.568523][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1857.581577][ T6808] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1857.598261][ T6808] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1857.645466][ T6808] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1857.680080][ T6808] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 10:12:55 executing program 4: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r0, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)=ANY=[@ANYBLOB="c0000000", @ANYRES16=r1, @ANYBLOB="080026bd7000fcdbdf250b0000001400090008000100fcffffff080002003f0000003c0006000800010009000000040002000800010003000000080001000000000004000200080001000900000008000100ff0f000008210001000104000028000100240002000800010007000000080001001a000000080003000008000008000300050000003400090008000100010000000800010006000000080002000100008008000100ffffffff080002000200000008000100f20000"], 0xc0}, 0x1, 0x0, 0x0, 0x8084}, 0x44000) r2 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') getdents64(r2, &(0x7f00000005c0)=""/153, 0x99) getdents64(r2, &(0x7f0000000000)=""/186, 0xba) 10:12:55 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60104106c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:12:55 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="3adac4a267eaf6d497064f8086bdb8915e4d5067a812d26b2464a65816a0a2d82bf4a98d8db8406051a7f5fdfb1e3eef80eab52db41409ceef03e763c1355cab4a5c51a9bec1de5b9ed3899fe36fe35c2c73593d1be64d508d1617a6e529a723ab026db1f12aafd78431d4f7ab5c73e81d82c407468e9c336faeeb76c0991e27f8d29ba999be6c745e3e2f6b0ac7fce3cea12bb47fa5bde9923e85cdffe5e670dba764cc2807a1d78c931c0d66d729cecb3ba9fb"], 0x1) sendfile(r0, r0, &(0x7f0000000000), 0x0) ioctl$NBD_SET_SIZE_BLOCKS(r0, 0xab07, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe54, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:12:55 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f00000005c0)=""/168, 0xa8}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)=""/189, 0x3a6}, {0x0}], 0x8}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0xbf9d, 0x0, 0x0, 0x800e0053e) shutdown(r2, 0x0) r4 = socket$inet6_sctp(0x1c, 0x5, 0x84) recvmsg(r4, &(0x7f0000002700)={0x0, 0x0, &(0x7f0000002640)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5}, 0x0) shutdown(r3, 0x0) shutdown(r1, 0x0) 10:12:55 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400c582f24186cf0d", @ANYRES32=r2, @ANYBLOB="00000001ffffffff"], 0x3}}, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000180)={0x0, @sco={0x1f, {0x0, 0x0, 0x4, 0x0, 0x2}}, @can, @rc={0x1f, {0x0, 0x80, 0x0, 0x1}}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)='erspan0\x00', 0xd1, 0x0, 0x1}) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x72, @empty, 0x80000}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 10:12:55 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e65204006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1866.079334][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 10:12:55 executing program 5: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400c582f24186cf0d", @ANYRES32=r2, @ANYBLOB="00000001ffffffff"], 0x3}}, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000180)={0x0, @sco={0x1f, {0x0, 0x0, 0x4, 0x0, 0x2}}, @can, @rc={0x1f, {0x0, 0x80, 0x0, 0x1}}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)='erspan0\x00', 0xd1, 0x0, 0x1}) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x72, @empty, 0x80000}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 1866.275572][ T7049] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1866.299123][ T7050] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1866.315561][ T7050] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1866.329791][ T7049] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1866.418501][ T7049] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1866.428963][ T7050] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1866.470082][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1866.528173][ T7050] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 1866.537361][ T7049] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 10:12:55 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e65304006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:12:55 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60120106c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:12:55 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60110046c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1867.267963][ T7082] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1867.295344][ T7078] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 10:12:56 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') getdents64(r0, &(0x7f00000005c0)=""/153, 0x99) r1 = accept(r0, &(0x7f00000000c0)=@nfc, &(0x7f0000000140)=0x80) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r2, r2, &(0x7f0000000000), 0x0) sendfile(r1, r2, &(0x7f0000000180)=0x9, 0x3) getdents64(r0, &(0x7f0000000000)=""/186, 0xba) [ 1867.347854][ T7082] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1867.359459][ T7078] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1867.373047][ T7078] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1867.385535][ T7082] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1867.416896][ T7078] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 1867.426389][ T7082] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 10:12:56 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r0, r0, &(0x7f0000000000), 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000140)={{0x2, 0x4e22, @broadcast}, {0x6}, 0x2, {0x2, 0x4e24, @multicast2}, 'gre0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r1, r1, &(0x7f0000000000), 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(0xffffffffffffffff, 0x4, &(0x7f0000000040)='gre0\x00', &(0x7f0000000200)='./file0\x00', r1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:13:04 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') getdents64(r0, &(0x7f00000000c0)=""/168, 0xa8) ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000000180)={&(0x7f0000ffa000/0x4000)=nil, 0x175a, 0x1, 0xad4c828fd0bdd18b, &(0x7f0000002000/0x3000)=nil, 0x9d}) getdents64(r0, &(0x7f0000000000)=""/186, 0xba) 10:13:04 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60110046c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:13:04 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60226006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:13:04 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100206c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:13:04 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e63104006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:13:04 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setxattr$security_ima(&(0x7f0000000f00)='./bus\x00', &(0x7f0000000340)='security.ima\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040f5650b27adff1b41cae395f640000000077a905"], 0x1, 0x2) r0 = open(&(0x7f00000003c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000002c0)={'veth0_to_bond\x00', 0xc4401d895ac87202}) sendfile(r0, r0, &(0x7f0000000280)=0x20, 0x0) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) getresgid(&(0x7f0000000c00), &(0x7f0000000c40)=0x0, &(0x7f0000000c80)=0x0) stat(&(0x7f0000000cc0)='\x00', &(0x7f0000000d00)) r5 = socket$packet(0x11, 0x2, 0x300) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0xc) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000002380)={{0x0, 0x0, r6, 0xffffffffffffffff}}) r7 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r7, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r7, r7, &(0x7f0000000000), 0x0) r8 = fcntl$getown(r7, 0x9) r9 = getpgid(0xffffffffffffffff) r10 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r10, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r10, r10, &(0x7f0000000000), 0x0) ioctl$sock_proto_private(r10, 0x89ed, &(0x7f0000000e00)="5c280358b413e8b46656b4cf48bac4d365fa8e58958bb70cc393dbcab7742ec51a01c24d32e2930fd808a3e12c756abb19b12c6e506a7dd75bbbfce72cefde08d6c697fe28ff31e5ba6fc24591f645435521839198e91060dbda1708ee4c92e1d6a15114ba34ed61df2d6164b7fa0e6f0deb50dc7eeabdaa91a22e58ac3aa3b8614d7e6ae1eb0b5d6ce7c7e819fc3a7bd66655e92d7c95f7e690a15ced3307259d61ad0051ba42b268864c3dc08407079a15c7666928bc4f2175fb24c542971293aa25d7fb9b42718cffaabaac8116e9d8070b01608268f45bb4d2755760bd2844d4f5ed0629c2f0b0c03a30") fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000100)={0x0, 0x0}) sched_setaffinity(r11, 0x8, &(0x7f0000000500)=0xa000000000000005) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0}, 0x0) setreuid(0x0, r12) r13 = getpgrp(0x0) setpriority(0x0, r13, 0xffff) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000900)={r13}, 0xc) shmctl$IPC_SET(0x0, 0x1, &(0x7f00000001c0)={{0x6, r12, 0xee01, 0x0, 0xee01, 0x10, 0x319a}, 0x81, 0xe86b, 0x0, 0x10000020, r13, r11, 0x201}) r14 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmctl$IPC_SET(r14, 0x1, &(0x7f00000001c0)={{0x6, 0x0, 0xee01, 0x0, 0xee01, 0x80}, 0x0, 0x4, 0x0, 0x20, 0x0, 0x0, 0x200}) shmctl$IPC_SET(r14, 0x1, &(0x7f0000000f40)={{0x98b4, r2, r3, r12, r4, 0x100, 0xf729}, 0x3, 0x40, 0x9, 0x0, r8, r9, 0x8001}) sendmsg$SEG6_CMD_GET_TUNSRC(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x78, r1, 0x200, 0x70bd2a, 0x25dfdbff, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x81}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x7fff}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x40}, @SEG6_ATTR_SECRET={0x10, 0x4, [0x3, 0x10001, 0x3]}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x7, 0x6]}, @SEG6_ATTR_DST={0x14, 0x1, @mcast2}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x78}, 0x1, 0x0, 0x0, 0xc00}, 0x4000000) sendmmsg$sock(r0, &(0x7f0000000b80)=[{{&(0x7f0000000400)=@generic={0x11, "3e38832eb6910c8b0c4b44f36f783bc6dd745b0ab1fd81db39800bc6cc26b6ff33985b37e42c1923b1219b959ef6c5b862d7262a8cf84c7cba67568444f0537d06913e3946fa4bd58ffbf377fb802c9d1a5ea1eacc04e952ee5294b16ab4b38d5d1bd349403fe2b627f5f26362bd5880dbaebda68aaf012a551f85c6439e"}, 0x80, &(0x7f0000000480)=[{&(0x7f00000006c0)="ec92d10ac182173b30c5af7fde23fb5cefaeb91af386242b878db4a2d5a21c3f3b35160466ed4dde6b3d4f668c0795ba02d02eff33c1597f26f47d4c2be8ea69b927029c186902012a4e59007bd1d1a0207336f70d69d342b05c2bd4780a35af292729c3d3c2144fb3794d7a51a0089efe95fe9da4753e7ea5c7172cf72df4565fc39ba1800d4b851729b7ba404414b7c350737c9e1f32f6f4334d3ae74e14f233ba0bc1ea2bcf3dc2d9583f32fbfc311a24cbb089f2eea644279326323966770608e808d55220371ba5a22b9788b9e28c2de44b4ef295ffb45a5f443c9f2bd25e9cbeca567836771fc6cd981c", 0xed}], 0x1, &(0x7f0000000500)=[@timestamping={{0x14, 0x1, 0x25, 0x7}}, @mark={{0x14, 0x1, 0x24, 0x5}}, @txtime={{0x18, 0x1, 0x3d, 0x7fff}}], 0x48}}, {{&(0x7f0000000800)=@nfc={0x27, 0x1, 0x0, 0xa}, 0x80, &(0x7f0000000b40)=[{&(0x7f00000008c0)="d9b373d28e0f09085b0cfd399925b029732bf32c6080905609c5398db5ece531de0cee9b6189a6b8154b7474d61a414a9245ffb18c83d0645154f27743f8ef4859c74268314e2cab3ab3ae88a10b7977a9e6b9cb94c56facf90566223254cc2123c741ddb49c56c45cfe4356c63eb5a4e00e396456184524a75c2684d3008b60e37efbe452cf33d3eed2add6e5e869e821ad7898965f57389330b566932beda683483131aac2b291031ac25900e13710394d45f2bd07bd84b681f281fdf83a69cf0be8981d3970589936896f2d962521b1fb36835b1d9a03d784fc43", 0xdc}, {&(0x7f00000009c0)="ccb4751eaaa10429e6e20474476c7484f142998595625e71f4fcae4fbe7d661d1c7fd0613aad55ed7973a89eafbe0ac6cd3a7b9d3fd77762f85aefbe67ed4cb30d454675346c4237b74bfc289c4b0d6cc0df9bb2794a63b4fcd79b11b713ab5af3b57f3291829645537c8d85b827c3d61244b6b7f0224c42b2d0653a3c3c44e11c94e921eee1992b5cfad771a47199e1d4b7ddc9120cb4cf171edb2538d3126a9d8f4ac86167f230af26a98674ddd37b5c31849f6f1a4add9da631820901ba60741ed0d7a0c15a331a4de3e32f", 0xcd}, {&(0x7f0000000ac0)="8dae2247c630476727d082bf89702cd9640490ac098e5f87cbcf3c991b38b8397e7d86ce390c99d8908a902bbdbc687d7435a32ef18e1c07c5d31546d69c85afc8c9e6904375518e1cd488499cda92a7bd57b99f8e7e6b33c41533c9f561a8fda6d6625c8e1ff9a3e00f735df90e034766f90cd939fea2ceda2fd10f", 0x7c}], 0x3}}], 0x2, 0x4000000) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1875.685261][ T7137] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1875.698368][ T7138] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1875.738881][ T7138] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1875.750723][ T7138] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1875.779454][ T7138] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 10:13:04 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e63104006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1875.819655][ T7137] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors 10:13:05 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60110046c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1875.885385][ T7137] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1875.911367][ T7137] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 10:13:05 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60110206c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:13:05 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) r1 = dup(r0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000040)=@sack_info={0x0, 0x8, 0x100000}, &(0x7f0000000140)=0xc) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$SNDRV_PCM_IOCTL_WRITEI_FRAMES(r1, 0x40184150, &(0x7f0000000240)={0x0, &(0x7f0000000180)="9614116f46cb94870942f69f79233aeabd7587a97b120d7bd7d2bc36cb41252ad8238bb894ca23f16dafe38063f33b86327e9e90a5868a0a50b9d1763a283b0d20e6f805b174f042e2ec85c5f749f3802946806c49f49d7177ff852138089c521975847df50f5572f660fa0ede016cc21ae11e59677c773e166ea3afec80bf0234e9dddeeb5da1ffde22209c2b1119c5c3", 0x91}) 10:13:05 executing program 0: socket$kcm(0x10, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000980), 0x0, 0x0, 0x0, 0x20000001}, 0x0) socket$kcm(0x29, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'\xf6\xff\xff\xff\xff\xff\xff\xff\x00\xe9\xd5\x00', 0x200091}) socketpair(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f2, &(0x7f0000000080)='ip6tnl0\x00') socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 10:13:05 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60326006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1876.450975][ T7170] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1876.483290][ T7170] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1876.498831][ T7170] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1876.519633][ T7170] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 1876.641406][ T7187] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1876.665431][ T7187] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1876.685443][ T7187] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1876.715783][ T7187] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 10:13:13 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') getdents64(r0, &(0x7f00000005c0)=""/153, 0x99) getdents64(r0, &(0x7f00000000c0)=""/191, 0x100000261) 10:13:13 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e63104006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:13:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000400)=""/151, 0x97}], 0x1}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x91b75d8e, 0x0, 0x0, 0x800e00519) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r2, &(0x7f0000001740)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5}, 0x2) r3 = dup(r2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0x1de, 0x0, 0x0, 0x800e0050e) shutdown(r3, 0x0) recvmsg(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000300)=""/130, 0x82}, {0x0}, {0x0}], 0x3}, 0x40102) shutdown(r4, 0x0) shutdown(r1, 0x0) 10:13:13 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) 10:13:13 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100236c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:13:13 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e6005c006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:13:14 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000004e40)=0x0) lchown(&(0x7f0000004c00)='./file0\x00', r0, 0xee01) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r1, r1, &(0x7f0000000000), 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x5, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x40210100cd93f700, 0x0, r1}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x1) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r2, r2, &(0x7f0000000000), 0x0) r3 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000004b80)='/dev/adsp1\x00', 0x18200, 0x0) ioctl$SNDCTL_DSP_STEREO(r3, 0xc0045003, &(0x7f0000004bc0)=0x1) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r4, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x0) ioctl$SIOCGETLINKNAME(r2, 0x89e0, &(0x7f0000004dc0)={0x1, 0x1}) r5 = accept4$unix(r4, 0x0, &(0x7f0000000140), 0x1000) sendmmsg$sock(r5, &(0x7f0000004c40)=[{{0x0, 0x0, &(0x7f0000000c80)=[{&(0x7f0000000200)="1ce74630b1d5307185ee0476181d562b3f450b625b176760b85b1d58d2a0602c840db4abdd6265638738832ef911eeb5bd2359c2c1075d80b66ff7e35cc531b14199df37289fa9f1795385fc3ed8db43c073f79ac598daebed4869e71cb624794c4b6e42a5754c437e548028849ca32e1590f2f4122a425d51824ca5fc7999", 0x7f}, {&(0x7f0000000180)="eefae031973f8983", 0x8}, {&(0x7f0000000280)="594acee8f293632afc892e403fce04f998355f9cfc8cac12ca5473f7725098ee51436a432f715efbc5f8f0dc3d57cde2573fdd227768bf7d5623c0a24b59787c70f8e91de399bdf9970bd8a930b3a0bc6d6b8dc7e91395705f1f7a559efae46f0c894de18cce267d4da61549a62de6f0508e886202e5bccc5265ef414b541a5aa3a1794834872a70fb72f79f0496545fe17ff85483237ba90f57789da4213a5b38c91f160502caebc882452d79922df42d6e5e553e4332e42e4cfccf48cbeb0d1c4571219dec5d0df696bcd7", 0xcc}, {&(0x7f0000000380)="95ab77f0c3d88b787eb5fdfdeca90e7ee53188b19c6bb0c0ae552653de08676f2116aeba3ab778f145de365abcae989b67821629609ff89c37cba853e3bb6429ec8169d8f44e96ffa73a4ecad604d3cf245bbe7e5f1ae2acaf904ea8662c35c4a8ef94517b0e4a94e8434b096992d4f2382cba4cb0c375d24fe75425d64721caa1c4731e2a06f45794ed5fbe3d3bdc48f337ca09ace9d17a583d476007e4671185f6fd80412bdb127bcbf3eac3cbbb859082199d6ac1a3f87d22333ee24f03037e8b", 0xc2}, {&(0x7f00000006c0)="bca9d90e89fde07d79305f85f273b859bf61aef50abe50b668a958f41b20e2f321a2f7945ef7702d53ff81c5e067a9c9a76fe8c5d1d510ef325182bbff9b615868cd9d333e671baadc4acae0ecd7b735cf3be68fe616b6580902e01e465d0cbf51178d2313b9ad8b623661800fcc6cdd93793af9a35eecc9b492f460983357c33fd6203ce0bd22a668b8a301c8c4294cece85b9782263b133febf08548d50bc9ce5c8721fbd4cdfde755b9604b1daae26e025cbe2aa1", 0xb6}, {&(0x7f00000008c0)="37d06bd1196c559fbe5504e726dda82795ed24eb935c10be691e541d1c9ffd0c40d5e0289667063895e344acb03ed2587c5562c86041afb28ad6d774bbd0281a989dddcf5f3c14d380204ea0e3d5893cc780737674c56c507aa2711a61a610301aeccdf0803aa26d55d20d148414efb04d18647e69016ec24720443a7340175a39efd25469c9acaf633c3b2bc1175b444cac265d79e496e0923e99a53506204130aaac5fe42b3b594be4f6e75eb45a7a445e19e865", 0xb5}, {&(0x7f0000000980)="1b0356a559e6261d902a8eef6e22ab20c55d68469f2d34959f9f10a60954f5af9de316d29d95f6582b4d4f79b88802d7646711947f13e521bdd0210df972767a8e0add474eb3d5655676d00f0657615a60483af5845d4a23519e5281fb790b4d3cf521ac3a0a990d51816f8dc387aaa6bd1159a2e8f2a3d1db64319fa6f681e8e545739254176b081d2445f61adb50f946721a237d2562fc0cd0c9971c10ff8aa6d007a3c5ba1caa076944e7949fcc60a70e8fd0d89fe1ec780d2497fa2c2373e8", 0xc1}, {&(0x7f0000000500)="748cf857c1d20e62ffaa2d4ad4c3eb3825360cd2e0c972ebf1d38b4fa8e05e6e69a4675e47ca37cfe530a13fb9a0c79685b27f50a1b59c1f173eeb9c0740eeb538151d03d2387939ca5995b5b9af614e168639269e", 0x55}, {&(0x7f0000000a80)="9838c91b088b2f3e568f6086175b9fab0762bcc24dd1227dee477241230b392630ed583dbef44d284ad81de702dc177f1ab9c38e08b11e96f4da150cc6d7869c7ce3ebdb9559eb98e14e12dd17b23685d9beb9e26d78d5dfcee17251b1534a33b71074930254937fddfb318ec261ac07aa70c5de700740476051fec0c27e7063a1fc4a5256059cbbbf09da99cd78a1e30471afbde0aab72e816ee1b2982b54d743a55d367efb2bab6fd6ac21c25935bbff0065b9562c5ac09347e574ad249b6fa4af5cb821ac37a7084e50a46fbd99d12706a60c70f7814243f3e02fdebb41ac9551801be22aba293c96e3993d6ea61d59b9ac416f15", 0xf6}, {&(0x7f0000000b80)="27c56a1c36b7e33b391cdcd5fdead48e2de1731670aa74bf44e72d5744b7f055b2d3ac323db818909e434e01e67757840e89a3ebcf6a1e526b46a322b4dbacdda55261451bc47cf32d7ade915e57777c1bf8a53754c6f4bf2803b039fda08ac616e3b17c285840dace6e57c5844a7375c53a9d9f00cc02bcb9e7d9fa14e91392c21def5fe36fa67921ea53e84d4e8ffb35b75537928d76bb0257aa9b91fa21190a2d2c3820f99c5d0fbeecb20256f2381a7b323407b8185fee4b1a47d79d149d13a88785f3f9dcb280", 0xc9}], 0xa, &(0x7f0000000480)=[@timestamping={{0x14, 0x1, 0x25, 0xf8b2}}, @mark={{0x14, 0x1, 0x24, 0x1000}}], 0x30}}, {{&(0x7f0000000800)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f00000021c0)=[{&(0x7f0000000d40)="dd789a46fc609de79823a2d64b61b1282971fa93c81d825ba66106a04a7d2d94ef7f6ac900c27e863d2a99b78e6983f19fc036100a9bffc13c885c9b474b948f0db6b22095bc101b776a0d9e", 0x4c}, {&(0x7f0000000dc0)="fdefc87dfd09035e2a5988ee825d3d084ee4106a14c1fba9259abf558fd688e3338ef2ac6dfdb54196fa424a5e2c88430c3c683bf71a269dfb0d1bd460a39691bb29e80238bbe7065da8d826fcef14f7a6ce483d33ebafaa1fcc76638a5f3cb0f20506e3436a10427d2cbd2f0a5aa6deec04862adb6f2be745de6ea5d35b16f12b6488e125d4aa6c2c867e3b6f28d4814e6fdb567b0fcfa16ae932faa44c775e58513f111f01d6c012810a55bcb2954700a8c7f68fbfa70418d5161c592691e571f694a61bb5de123613ecfbe67ba9973024551d6a6a743f44b5dc1d05", 0xdd}, {&(0x7f0000000780)="83c14a3ffe11e6372baad99a3d66eb21a49dd7683f5e5b3f6f7fd65984a2ed5704868ef8f61375ebefd7b916a2efc94cbf27aaf1b993", 0x36}, {&(0x7f0000000ec0)="98ffa5483c097f77643884343b8766c55b51a391c8f265b83179c63b9ade295807a4b60aa314b59a50f35991a9edd2cf39c53464fee7e592a2a03f8647448af22c13f7786836b8195baaf51ad93d10f03b90f356b7da1b41515d7e605f62b579d2f2b2ee325e5717e9a411f0f253dd646d37af80a1c96eb7b0aefc56ea0e480b2c5280f72910ae7c6258eee93e2dbf014e58d874c537cb47a6a0ce", 0x9b}, {&(0x7f0000000f80)="2cf7a40f8111bf093fe291a2e8109aecd33c39cfb37969e47d98734d87df363011463ecb045bd4c7c4df07c169bb7d12fcc538aeb9cf858afa344d80f918fe61e9d11ec58fe5310f8e4bdf6d8c34aaaab8b4a8d48b3aab333a347c21d5f556b15d8313798f6203a1f27531223ebad7154844fd9ea0f0c5699d6ff7cf0285f6ba0da3f0f50831fa4be305796889d1d69aa065e06340fe5537a3c3500313ee4eba094a3a46637e95dbe4d55b209d498aa66fe37b1a9554b671", 0xb8}, {&(0x7f0000001040)="c5beb6168263aaaf9120c9df9a0ea933feca7c16a1f8b0bb1c51de77766a937f259c2b168f4eea804197", 0x2a}, {&(0x7f0000001080)="8597a0b2e7b73ef06bf0e4534f700c21b67cc49f8cd999e84d8b78b1e238b0752ad14e89e4381d973558b5d319dbb89df54468bb7e583b8132b2abdfa20e905b10e12154725b8aa25d97c4793b2c30551533ba5e3d788b1f7ce5f733520647e4e34b745fa0fbefbe736adb7482417a780f3613d6fd4cdbaec38ecbc52eb2cc91a430c9233c8bd369e770700e5f0b0b9bd116ca4e8da82f175afe211ba4419ffcec5fb937ce136b2ee6b87d8a326f1c1bef81dde1a7e82c1609203c39e8e3ecad3b2a5248fa27643aa9e00451e85347e19b0c804cda3036274208e22063d15e36e9e9d4aef9f93d7c48bffc5322e8bb45534022fa3a655b3ff900547227f4f22c10bb87d9b74518e95f87afb5a6963afcc52838df382ffcc8e39803dbcbb7a6c43a1126baba6517a9d8881c6b089a13ccb77b2eccea449bd210074b67c24c3a0fb4dfe979ab70ab19e6a0ea5b5f44d8ff13c0901dab5c69d2ad89e94571653dded2778ba8477ba64a21cb3ed0a7183d132c89ec426cf6b31bb617795d85414aba5aa1d9fce69738afebfc5d7f3e97964929177d500273bbe5b0253c756a33d2cf7ad9d8330a0bbb2bdc93acdaeb2acb99313adfb34fcc7554ff057e0c6f637faa67cfef6a165192e5cbb2f4c774941626e2b84b283e51d9c1bebd5a93b3ecf53a56cc2ebe07b2467f6b3fa78310283afca5e0b8d734f0b44b2038b405841c349f4bcca8accb11fffba5d96495717d2b96f061bf9bc705ff223399ce13333b721ed22048d529c2d56bab5eb3993082292b6065d7e470d0e87a54881a3c35e8352175ea7af84800e59382cc249c4639c2a5a3340485a4c1fffa0366e281ae76775e96b37378d4e94dd5c391dd39b57d86f35a97171782e063f3d6997c2109588e68e47a13d07b898de9736beb92393dde3ffec35c585422196b6297db008ecff2a72b4a6cefab8c15187c749f78a19a89e703353715ac952a3811d4c6ffe0320eaee5a59980af3e8be8bedb79004deadc8fe17aa5ecb6f1ff55749777237a4025bb57abdb88b311bac1322eccb99ebf87c650211bbc6736c9a07d8d5a4bc4b024275b5f1787eb9f1f9b049dc3e674a037232028ae4f94f827091be1134c785d2a67c142aab9c22b40a90237eab6667b1c0d2a526d23065fea17748e7f166a8eb812153514d1deae4c303951db3c25f12d886198e5b45da33fdf94d73f4c903966d2602a0dbbcbbdaa5e82b31b8818e9733c86ce92aca7d0b2306ec76da9f15b41c1058151d17d9a8a3c7cf20485bb1c2545e41247fd14165b9ef1bed3aedf734d921ee73d08c9003bff0b4cf23a4466ce0568bb67184c155ec3a266ba10dddf785b5f8edd7e9052e04b034fa56e171e453b37d1e70576625941003839ff4197a43730bb768c84efa1eb52d116b6ba108a4ed2d5fcddfb6ef76ae76fa336ed718f029f295526c72261a634296745758f4955613b12665360f41ea083a93349f34b9ff21092c4a127ddf3bb10a987e08f840d1f0c6ae80b9cedfe665ccb9ea35cb573da591174d54cde56571b12903fa48b5df2ce0c48c193fa6c68ed566058599079550a45b0c55d9fe5b9f96db1c9bccf563420c5d4c1cbe0def850c74ec38a07455dcfa4bb6f7c3c5e8f21609d2b1a87a226dd66c2a26515dfc5962f3a6df13e9b305e0b90fefaaade6b165a19e7a118f0c6236de1c9c8fb3f66edcea1b1bcc464b9db343c0299eb21557fa06f8e64d2d3f376a6605ff445b6e48071aec7a5862ab64aa2638e044ccdadeccb723d20d7a3fa8d14cbae9e5a03822dd2a585adb8b6983fc5a869118774df86e845d177589237d63e01bcf25a737afa294878843e2ffbfabbc1a5df49b2fa1983f71d26822d1a98fc49b6a17d518a323323c8054adbb8fa951efac55d202d32166a5e2b220695f61578aa9fed5be3b266d64064cce6bd0955f8e7e02efe0a2cd4ca01907cb1a1045ad9a9ed66bbc6cc45e50ef4239099deda88000174e216e2072ec9e0973298cbf2ab1b5993b0ed0e38ca2ce42c9cd73bae4470ee954f30a0d2542b9a79a033151269343ed93fb5ab63eb524e74791bd3df389f74277df38275e68a24f94b334c88db0db4c95ae8c22891cbcf26d854444724fae930c1a9e9052ccbeceb6b3cfd48b77aeaa33e8b809aaae68ab2f68b3795ddccea9e65507568170b53b32071005711bec7d429db9997c62449d3b7211555cf549c3d5dc31f694066bebf7500e3003224fe2149eb3419c58fc25db3e991248138578ccf23a1e8ee3453541db1b5d7908cf1304490d16904dbed2dc22fea1cdd9a0c4522854af8dc668aba2d21cf70a958dbffce82b35f1dbe4d2f6fc134c8fb0086e021cb705426759301439d03c6e524ee00db3fe181aa8a7f53728ba93fc8f8f9afebccff9f776fb7421e6ae48370d86b5bfe3c86012aadbb13cfaa78c6d8c6d3239238225c2da822a4a89ae1a8a1037f531fcebad139709269571ad808f7574912597b495f54ab53724db6ba06ea8a10c8f658d823731d09871bc9478e46b124c80e55e69a824bff7b7919f8195fa6c72a04531e1719d3d0b86cfca63c59aaa9e929a97b09252af71dc62ec876b4c49a5322de34ce31e6ede875c0a3468e3771cbce35b6a756e566655740fd5cd21f935b0ffcf6466d9bec09ec5c765d40a1146510cb78173a7b348065996eecd8cff47fc01cae937060a4bab527dd911588a18efae805ab7c44417a4a07bd7e7e9c7ed86a54ff931d2cc06fba3d3222c1ab820e2d0e564cdfd6ad85e968a121ea67e655939d33d6e0dc3b9dff28c0dc6b51066a652a105102bb2a6cb5d304526fc52d8fe95f7e086b21ccb33d867469a8a278626902d5e99b1908c402220d832350ebfa0067b4148b38d7ef498864ff77d81f5ff9962a2c4e0e97a9bb31dcb0c2848b647ebab8d2edd0bf78974df830b9d3cd451d87c805a23dcd1cecb88481490d7404d2ebd20cd5f551d0720b76ed719ef55cfd0ce460991dd1582573095ac079dab0574fd0608de1985cf08fd5da29bdbdf8ac85640d52c14f0d7becb4871b08763e41aa633e3b844feca27bef3d41750c5242df86effa2f201aba982810b614a9eb792f01cb3a3ea1f564db2b3fb6d6294dfc0c3ceec77080dd207015c3afb2dcc79efe785a28cd046fb5d3857ebbf6ac08dbde950f3c6a9669bfcf9869354751d5ec198a2e104feb992dea9c0053f6a54e5b59b3a57eff230f50414d5a8e96a353a24b8480731a6d7b4fab61d57b1d00d6c7ff062c83427af65a2d0bd5d7e2341e9c7f9855da0a22675334f8b47796a71e9ca017e57b0f75671278f599343927ed13d858027534a72437c4c07bd99320cd801b4b26b828679e862c1160778167ebb4d630577ea2a5ed226c014f0be541e9053eea53ab8c5d1276e9a83580f1e7c24cca9c7ee12379bc0921290d32c5f2a0e7bcb3886933a1151a6bf1a401dbc92f3176aeb7d5e81795db5edfb64728e078212fd657b0a0a4f8356138fe5f4932384af252aa8ab4796d3a97cd5665c318ec931715b2d65d4e690923c05e4db0756c2589710570e1244b919d61adf1d7d64cbdf2c4067251ca35a1eb681b9cd1cf10a35aedd1d13e6ede4d82630e0510a5d062f898645621a056e4f0cc4b3c62729373fad5e608bfe0791e1a0a7626de4d9949add19a100476d73a5886687aa425917d1aa9820747c2b3ee87e29e3cac9b90f0e9c1f31b7ef9a9464448e4ccc58d2035342fd75f9017b026eb2c893997e06081de027f65164b601fff1dc3d49749bfa3bd11d7236b05f45f6e1a62094e36054915d03ebbae3f66748da2721ba7cac48cb9c9897eba04132190586242f638c63b15d747d5a7403c09e4b89f3022d837c7f18f633949fd95880b3b61bc1c42debdaf00a56bd9c1f55aee1ee95edb015a96f65551362549f1e5f86101d45903b84cab786b3490fbdfe4b9ad17c19bc24f7bbebdfe4514462e10cd2b1ff1c61fcb1ddf49b541521c8e4e624612c1e1d844cfda53c0325a90552a696f8842e96a4d72090a12519f29a049b6833fbe78b339b3d3dbe1eafb9da4c2d758da5e20f380eb31bf27812a5712f53ce17035df003edc7569350e88fa4955a71ac401cd9c54203c60b31ad98672de31c0046c6db57ce01a33dd89877d9f9517b3945a7cb5e660baa38ce699d3176d55084e9b303c4adda217467363d2762a35097c053c744ae0d7e082b1e5588b4032f1d0e3aae1ec9d6c6c56ea7a9563a90b34c485710bdd76b1443bf0965b737e3140bc52a3df8ea95a2de1c8e595ca1683fc51af517be9164a7fbe85d83b645cd69d63dd9d89342ffa624e534c26d63dc370f540a113e37f51166e9fea0d7c8f49cb8a6824fe69be708ad369bbbf56251cb8abd6dace6b5be58d291d81c49a79eac8bc39b8558fd7e30e7bf376ebba3daa64751694c4702b77da4e33b4313e902bf2f5ac2e3196dbd9029166f008a495594be781dbb0623674d9bf56aedfde3921f357267461104ff6236973fb53a58ce8a8e7e2b907ff29b1b444e1005fb8f81b7f2e39800e3201093daad3a94cc19f4ff445fb36c02c339f9632c46c0c19ba731ad541935daa7e10af3f12c9967e776cbc2a67c40b63cba0ebd16d36dbb462c7cf085bcf31af9b878968a6f58bbbe29893490b89a829a37999e990074b0a58b9f617f8791507a3e0d3fd798aec5cf5b539e05a1564c549074238f6948930bbf663a01718d9dbd50fb550b79c7f9588cbab87a6ab03bc18be15f5ac2bb01a4544061786d8346462b037c44f6772a993daec9c163c70a23a504f430bef56cf73ebc22610d8e4402fe87620637ae2420cbb4ae3bbcbfa4e76248e44e3827f5706db6b0cc95a1f803d89340c19e7040948a9aa364090c2d3195a0875089c9b9c5c1028666095f2bad305939e407fa4219050f6de4e2c01fa64c131bfd42abb41fe81c02a25fb749ca29cd5a4bbbeb561c1d5381ba2dde87de6dfc3c919983b75b0387128971d40eb7dff7d7458ebd570cb165b298510b5916a3e146f01790df911eae62e7947d386cbbabf0c4c637d76406135fc536dc4f6df846284e3d1152c8fe6851d8a3c020131b55d2cb28bf8323befbae81122f6508d194ba5e61310fdc6c988fd2b863aac1646a0dddb42f6c69d4195b56802c14bafe16fbd9c8bcbcf7f303dc93a9f70a09d9d9fa39032c59492e4e002c823bc63914557160a70f6728bd745b308ba34b8be00f8f800a3d8a573bf8742e797c57a66cab3528ddd827df31065e3ee962099b728d5fcebf356d846c0863efa24061e32ae54c65371be344c8246a20c80c2ddd3675297b0ddcf519a49684105d65eab107b5c2b529a9def83b42c5e8f03ed38740a4936c46c3dc85e581f53e19e1c699d32435e74b8a4cd8c4a4495a99343b79ba8e8e8184e3bac480530e1653a74062561ed8479587c38ea5a37768fb01742068ec3744e79508c994c10ece195a0cda11c87cb628e3f5afa0af816b843d291d81682f19b72cef2955a129387d4afdd26af2f31e4264c4e7f94588e2f7e0a652b83dee84789e8c084b91098de9e64baa7dfd595381962818af584f71aa2fe917347950eb389067f3e365fec5e0b774d77d3f6a424b0be1ee979d70e1a1bfc282b9e8e03b9ff871557dfad7b205f395aea066ce0eb42c3cac308e79617de643507a8cfb74036b3caef9765026d07ce380162ab36192f34d62d0656319b24579c354587751357a3e5982eea6def52d706927d7f52d35f0999d986bf7fe9d459f06e30d184de19d9341e", 0x1000}, {&(0x7f0000002080)="c1aa8da878cd67bd13d48f392d092f55dddad716a2fa06a8432eba3d0d2275d953772efe22c958dc0d89ef00c40a74a70a21811ecc1e91e0b638fe0a7156337d266ed53cd0ec86836ba86bdfdd7c898cda5a5a7b98e5bc7b94629d8db0b590acfbf374eae98e08c1ba5db577a60ad69ad4e0a0966f050c8820304c9d7045de961a11f28babbeed7c22c387cd48c6348b7298b8", 0x93}, {&(0x7f0000002140)="b1d1e71a775c5f7f2f4010dc66ab099a5c2b8e84cf064595", 0x18}, {&(0x7f0000002180)="90ffd6f889aafc13b1d655aea40bafbad342f67a5ebfd92737a83f", 0x1b}], 0xa, &(0x7f0000002280)=[@txtime={{0x18, 0x1, 0x3d, 0x3}}, @timestamping={{0x14}}], 0x30}}, {{&(0x7f00000022c0)=@pppoe={0x18, 0x0, {0x4, @broadcast, 'team_slave_0\x00'}}, 0x80, &(0x7f0000002400)=[{&(0x7f0000002340)="0fec8e2e", 0x4}, {&(0x7f0000002380)="452938505a5fc5baa4eff28b9ec2f624f59c4e26b6652536138487610fcb64189be2262a82964a352c3c86e792fe265942e01e3ef23a8005dd41afa3096b001c494b524d59e45e5646268b1e50107d06985a068b55b6ebdd106a2571e4b8d49ed1a655b4e50d5eeec74f61", 0x6b}], 0x2, &(0x7f0000002440)=[@txtime={{0x18, 0x1, 0x3d, 0x5}}, @txtime={{0x18, 0x1, 0x3d, 0x3}}, @txtime={{0x18, 0x1, 0x3d, 0x9}}], 0x48}}, {{0x0, 0x0, &(0x7f00000026c0)=[{&(0x7f00000024c0)="4fc3b7f7b73074ae42b2f7d06f16608b46a8695b97d9eda3caa22db088eff0b61c275b5abb5f2276de3ec34996f83469f7f0b70e5ebe1b41922fe783a4b4764454c0562d8786804aa6b5cd1fe2167632614b329c2651b965b63d106d72632db6e7750220a97934f037612f9f7f5c9810be216dc26359c589ca5cf5ec5015dbab2c76a47931383d6ad6959a4864ad09f4fb5941f5dc980924fa336e7a365aa9663ebd1c67933de2bc89c3ba017e47d0b85431d9c7e65a83d8bb2d19743ab0e5c6b76cdda87058b447422088bed37c53e52bd41964472a9f17f94e22945b1f728e250e7e4aac879e129e3e", 0xea}, {&(0x7f00000025c0)="7361e083bd15633bc99e65037be42ead648f4ea8a95dc17f978b125944d08910df2a0baf5a385e01d8b1927a6044d786a7156bfd9cdbe68205ae2973b628b01c315bd09398b0e83516ba9e0fc4fa3edef896c119ac8064095233052b2037a93d016aeeeb5e96f102682716baabc15540136214a3a72ac8b637444510742a8d8f35eafafeaeaa8d934231c284501201869ad3f4703e50add33fbf719365b8207ad5e4e2f0c2208c94c2381362603f975b16845ea39f64f1afb0dbff9f58f347a26e03e80873088a2435fd6ff5831f66dc711c784e087a169048f9403fa5c42fc8cf857cbdb57eb6", 0xe7}], 0x2, &(0x7f0000002700)=[@timestamping={{0x14, 0x1, 0x25, 0x6}}], 0x18}}, {{&(0x7f0000002740)=@nfc_llcp={0x27, 0x1, 0x1, 0x2, 0x4, 0x1, "11c99a8b6319084a8f784f86f702a23d708e83cd40e22a639ec0472e1bc545edd35c32786594b88ea52864d0e38bde4a70e1aea0c0b387b9f7ed2b200e2b8b", 0xffffffff}, 0x80, &(0x7f0000004880)=[{&(0x7f00000027c0)="3013ef921da801d7a0c11c89ae7ed8238de448ecb9b1a2554d21761669c9b17c306ca09fa9bc0c03c1a2a4da0fe73d25b37c7fec0722590866edb6b90f00479aa8faba03cbe5274caf6bef8152a07ae85cd4f01a38a246f0a712140ddec92f8021add248e6aad53b8b436816913dafc565abcf24eb5e0a94b104582635d025229ec37482da9abbcbdd6f56d2c49d34911544a37ab1f3612eb0efeaea1bd811f2fea10cf2b0fd827f766c125a175e24377ba1335eac5661f2c6f240ed99c3dc6a22ace182eebc3ce1efa412500bb31177dced56553a3a1d8b9bbb5308894fa383196a26425d4c7ef8ffb9453f5e1e051f3a6ae26fd4ae3ffd34419500c95e5aa2723ae3a30acdca0532684ee97bb660c4dc95a23d3ac706c257384c2ee2f24e61346d0f549c14ea015726d30991ca0d8902d8810b9c4698f386c751cd4dc50fee41e4d74f7fa0d2413d7ca754c8d4fa8678a0907c1d77658c55029ff4ac73d724265e3ede05973838f210392ac78a8a85c03510e6ec8ed59ef2c287ad2606683d549b96ca2399099827f3351aaa85e326a9389769f218eb689f1d2fc7652955540cea28856b7413eec37227fe4c7b17a84e14266b955062732f274712fa6f516cd9eaa51c671f5eec16fcefafe31de2434793c85ad0f7365272379e538fb0784040ac72d312efb8d4381bff967e33e89787171eca82e7e5510236d66ff61b634ca932d87bb55ee2f45b655094223202bfb33bd56f0724d61595aab8d4e07e589d356a18707d1df26961177f7b4aa7383c35909f88ba30cc79a77f8aa3ec1ca857f9e38721cc50cd51ea73f371db7950d670046be805219772f1c2f4e2d05e022b9a6733ae251f4f064d728b4d72849664096f4af890a8ed86596927a3f47907bbf161d4b9a2f8919741969d9695642b1cb9d4879eed7ca26f85ddac451af21f8b20643c624e1a649bd48e9e8167e012b229fd046127b264bb00d78006c77cfb3955205d0d166b8cedb6983dd950aa35b718a90e907b72b30ff06f22258009408006bc16a2f48bc314c2c80a62f1c3428e84e42724c6741e69c322051a6e9025e7399309cfc804675bbe1491eece1a52dfeedd9084d11650a8e79b53ea57ff9d246b95bec32c4305c6b9a8fbc388f2f6348b8bc053aa9ba88d24b41f09caed2a51a65bd3fcd43929cc32ecbfe9c2f23ce2c1db535bd00c4e02927f74bcd0361bc31154a876b5d027c9db3fab6f983122dec03ca46e752be1a73e9aa16e40c1e6cbd218c4e60c7baa44ad2d72b86d01020994726d70ff3aeb175e9264eb5ca4526d019124073ec0bedfeb2d3275191579972cb0e05adab4a6ba9d73834bf43e04391067db0af960ea57cb3a0247915202bc6e6506499beb097fb03e4663dfb9e78a52ae74312a840bda032689ccaa632fe9b99d2508bbdff46231f1906f8b47184e78ad699298da62e1dcea205296863873fc60ff9f1f2a78978205278b5e20862bc993f9f8a32f0267a5d74b37073a42e4b833ef8ebb639678fe57fc8a74013236e0fe5fd243636fe0a8234a9e3db385b169c52655e4ba8a2b02095bb504253ee614995608bab200a968e31496efd2f5cffee7c3af9a8ce5bc7493148ceef0ce5749d9ad228c679442bebe15eb1578fe1b5c71a17e17d9f451c438d15fd51559fbed1c9439c1cd8cd68b51044064ad7bc3716c792a28d532b0a2df1002d41c4013ff605f05792abbf32d29c0f5d08ba30da85b606cb3e6e644c0f3def7c1980ef41d431fa8422c824b164dd4dbc80ad5a15fd94c61aeccf390b8b06ba4bfcaef504df6007422207bc8f1d073f74f9ef9414b7d0f9145fd9563b95cf1e7cf92bf8e93596d160aac182e2fc0de773593d79ed4d724756a563ff3d6c8fccb4047bb49a0ced6e41a7e77584108baed4eb68fb71a0722254761cd3303ae3eb92e629bbf457295ee5a4b16494094f72acf56052cc3a51d281f0b5be745bbce6c958cf76164bdaaf0f2a0529e646f579c7ee4255ae30a2c58bd35f5b8f7dec8e0d940caa4772f6e75b740a5263d8321935112f81ad7417764450fd01f55ff0ed47680708d1719e32ffa509e0def4d4fa833f6fb0150a3ced4315bd1f98dcf9700b7b65676266c426ce85d2b947233ac4bf8c3a1a2678bb41ee32e44e1de7a3831801a77d63283e08a216dacdfbeea2685ba38621c012e51da29c9db183b741b683654d70aa9278708f23054619ebca48239d14f2ef499a30801142bc86c7624bd301c1d294d49094ff9753142196094a72f6f3174e6c6d792c40ee1a94ad178463467040765849abb00aa42a91e2300d53f67d6971f4512b519d2e3994e671f554a5682cec0bd9dc157227200be90f2d5a6d871b095544b6653891850f661facc9eb11a055842dd6fbb2d169ddc417d05935ff2336a9e855330426ca82f993825b990f80db42e4a311646b938026996fda76c4f6f74dbc97dbcdf0c13a104da3d99024e45dafdc65a3cc59e90b7a3bbad79b5d2b3e8c7eb5945dcaeefcc4393816151bf8fbffbc475ec6f04d033e2bb9ddefbdde943acad0960531d4ebfceedfaa1fb4b617c6034cb04e4bc0942fc6aebf3da62806509943befd87415557cb3651a48c66d711342e534845f41164151ecc805bd7c0399aab81bed06eaf3840554711ec07f6be73bf9b23fd7d379bec8c8e42ea84f857516dfb8960efc050f0bd067fef569f18c5b1c61310112592dde54e822f557a6e4320818961549c8bb5c321c6121117f6c3866e4cbe25a58b04e48822d69340d7b6824d18961194c1bfaac672e1e37a6008cdf9e468bac3c27c3087bbebcbbb2d256693d712efef3d1d52b899fcdb42c1fcbbc1d0e7d7182f9a15921be5c314f0755848f317e956e7f8394ed44594ae2563da39aeb03ec72edd6e593596c97d0365f0a84bc8e59cf41b7311e4e88f50326dca759fe610c9c0e7721f19dfc9b054a356526d6de4ad8dafd21a24a5088eda8757c981a6de64801c8ab29bcea2df82532251379663dbc4f73d10740dcf000e424cb25c8ccc5d4190abf8cd43ac1adbcc165c28e5813479526ff1cbc3851770d7e080f0cf8acb8aa9245a2b62de90394955d308dfa6e887dea0f70064b42a0b0342c7e49d92faa5d628ba24ed608d856fefc75c6742d2bd1f683af8735ceb9a83668cf13327f3d4df03a133ec63d7db8b5a5b182dfda135b7c0e5efd8c7c795093ae8caf72ed8fe6a67c03fa50630878851e45365f74d27cc53f0a3bc4b4732c7711b1a5cf5bd7ec8517f4df77c4e867aa6de507943385aa128f758b6720c51a6876503df491c3663e5f9e6dbefdd0cca3988766120310764b10233fe2d799cba5712ac56696ed948776d675fe3850d801bb5946093929dc8229fde94ca928bc9b1e941749992077ed51cde52a1f9daeee841e42168b93c213acbad836b622e187c6497f979a0fb2811ad97e3c9d5b0b486de184214d296c0fac8d68239efd4579c9e290ce10afda6ab3142e834fdc4a684f198534ccb4afb1d4aa63cd41ef1350b13c4c99eeebf499dbb158d6ba44cf87eefedd10388e481d583808a7b7cad8d517d7b2943907f2b0653053543261ab59ac45a2f93ba8ec19c3dd250ccfcf41de6aea2890b82521c5476c7370d230db51489a12bf1b76d298ec4512171ec4754748b471b3d15a49b28e4d31471af31c84a5e87f3ce8629991c8ff6c22ea1c9b88c1a704d894fcb1cf6dce807131deee4f35a3a95bd516702875ba30bfe08f8d7b9ca65c327c2600c116836a801ce088c71fdb237119dad7a90ba056da2d4579564883804fb39a0ae30449b7733b015747ae9c28c970740cd324652a072946d087e0884e6b6a4ef117396978951bc42f6b8c4348cd8a6022ac71f3f11e843301158d18e54a08e5be6f3ea9e4247afeb178133f9460e18411f3b597eaaa4ec7c2d797fbf689c9e2208ebf0f66f2ab4b5f3605a4d1211db6f201216b7c96f4e295d7d7f61ed1a3980b77bc11b32de426cd3e53305f55bc891ba574cea2422a7a6644205ccd91fc68670cab2b0c5094d77a1af9ca934bc72dd758118cdaaec06b87ca11555b6ccbcf081595c34fcf2b62a1bacef80779ab10c1f1daa99334e45e550001db720432c19b871d5532f5a84839fb61a33b90b827399036a2ea8a463749ff175dd0b4347f193647785e53abfae812ddae95836029e61b06442b8e0d07a7c8727403beb704fc83a99963635701488ce02792879446d11a1522b522bed8604effa48ce1ed014d7479561d10bb32218634d02e71ddcaf96a2916df9b465c8577c293d72f6f93062ccc34d38805591030b91c1d43b335f2cd1c273204f0f1c429189672e2d1f720a5164fefcc733f4be5f15c2aeb85524adf211fdef51cf8767e7a9fca4e40b022f757cda55c86f9025543fd6c05204586bf45b4d2c31a6dac91f2ac5fcd52badd3c8965e10d106cc43310b34e9614b7e9ccf2bacf1f9e6d400ba4f688bf9eccd6095d4d1a6565c0af9d9b139a8e7a045988cd2f6d50b91d9082afd2570ceb01dac8de68e9047e63bbefe79799b917cd11e136b39b496f4682aabae2862a7f12f853ea86b55d6cfc56dc6c1bcfd8d4272d723ed95943f2e57de4333d5a0eae9507e79e7fa3d202479f802a2315a6bcc5aa5815d0304b553589690ab41fe10be8adfeb3e08a1b9d9ea33414ea5c47a37c662a91f73bfcced6e0f0b907878892a44d2c3794bd4ec9205c516c6063fd42f4a39299076d73ff7454d8fdd6a633d144c18988064459f3cd708abe0fffabd252a3d88e4177f32449d19951398735e841d445ceaba77e0e7aa3b235c3cd7d8444bbfea805fbd6f0a5439b292e85f12f1f2fa5dda6e7b4456cab943c044c4449ba724ad8ff9044dfcb05cff968a597f6e11105b3d97f01283438894d431d1f39c25aeb54b816aa6f052ecc44420365881fe3a6a48583c6ac110151a2c15b313b4103d3fc7dbb9abbc2fc58b7de1f019a6faf4ac770ce018c2ce0de886ece1236e8253e89880ae9094c46b7ddfad74a25d5fcf2d17324db453e476618a037800bf103b443df6f9722446616a817a8134ba00010c3f45a92fe1662c1184b8f1cce63bf624eedb67b27296e5cf5f94151ff90681de8b71829a621fa88a82c4884fdcaafeb9f68a18bb57945331d953e6f3ed97e700c62ca7c4d347a8ab66e7d3a6ada0ff06d01b0976fd3a3bb48a8a69e74a5ead24d97d16e153b8b34f853190b447aff51c5bc9b04acbbeb263306528df56cb1ca177e5c173de12148cd666ec6dd7ca156b9869c9a6fd4c52a35ad1070d916fee35036c6261634393e8093d9181d72ecd66174a42233ed1ca6482b81fafe114a612016e3205b6a60986c526c9a06f3f77d7a35c1881e1caf90b0e07bb91410b103a6738d884dc53b2e4e77b3ee1737b732a66cbd9422c8e901489fcab6920445ed3af83cdc937920d23177f07d3b78123eea1c384d777bfb95ff725a3eb1d64a5de2f2bfb9c2c7a9997f0b9ffd17aae87dee19026d5e2f8b053cc80e546dabc963cc29833e2959ad591d7adde2eca5030f67475f98522e2533923df610dfb70746852a507ab7cc25101baca6e992183783dabb0bd1e36914890b9f86ea4f0603885709158fd21c46a93533b125df98443f0b8f7281600e7b7282549b5608b1c26f016104ab141287fbee022a95b59415a6e94c0cb6cc5ad0626c058508384d17ca7c4928e98edf8158aa9470cab4715c2361b15ac2ec603a590011ea637c17f9aa56fa36e9bd56a5fdd4ceffb47b6efb05bcbd1dfd8e", 0x1000}, {&(0x7f00000037c0)="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", 0x1000}, {&(0x7f00000047c0)="2639a4dbd1ad24abd99296c8689d75bd77a60bb83ebc2d9c491a2be0a1f275c4b8f6c2d1b39cd62c417b7016d573bf5787f35fbd052f89853f326a74025ad47e76bcd6414403f162b4ecdb8c1ea9ee817acd15859de7f130d7cbaef47ea37427", 0x60}, {&(0x7f0000004840)="82a44449", 0x4}], 0x4, &(0x7f00000048c0)=[@timestamping={{0x14, 0x1, 0x25, 0xed8d}}], 0x18}}, {{&(0x7f0000004900)=@ipx={0x4, 0xffc1, 0x1, "40c175c06c48", 0x80}, 0x80, &(0x7f0000004b40)=[{&(0x7f0000004980)="f580778cd5cf6b57fffe138371a952a1b6358711a21930891dff0d5be33326f15e096281bdd554f47c1670804fc78914df4914836f14d239a7ac61a0a52c2b811a20958416493ceef9", 0x49}, {&(0x7f0000004a00)="455ff9270d046d143b3ea2bb7c2276a5d4ad1bdb72a528f1d81030e3f89a444a01f02855dd01", 0x26}, {&(0x7f0000004a40)="8dc815a5fce151c45b21bd7e9ef8fca5f425b66d6021fa873421bf68df674afba3f2d4e1ea3df601cadd6107c4a2904d323f1a7d568a67ec776e5fac00f30713f26a29711960f9794afdfbe58abcc634f27cd81503d02846d4268f40fa1413a1ce1ce97a18abb65dc4fdca80b08e65a129798e82250256e08e799072c5565dedb3379ebfac42a266f193b899baa8c7173d2bb767c733782536e1cfa94863be10ee7518c461dca0cad417c36823f3e7dc6cb0620265dd42fb5eeb2cd79a5100e522fd0e79405920e1825678d7f06690276e7c0e923970942720caf78471cf6ae361e780614414d7bd60bae13ee35b", 0xee}], 0x3, &(0x7f0000004b80)}}], 0x6, 0x4) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r2, 0x4010ae74, &(0x7f0000000040)={0x0, 0x8001, 0x220a}) [ 1884.985620][ T7216] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1885.030798][ T7216] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1885.042592][ T7211] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1885.050860][ T7216] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1885.052493][ T7211] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1885.078407][ T7211] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1885.099104][ T7211] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 1885.144395][ T7216] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 10:13:14 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e601002d6c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:13:14 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000005c000/0x18000)=nil, &(0x7f0000000280)=[@text64={0x40, &(0x7f0000000140)="0f01c4b9eb0a0000b800000000ba000000000f30c74424005c000000c744240200300000c7442406000000000f011c24650f01d10f01c5420f215eb95c030000b8f97f0000ba000000000f304c0fc76a0048b800580000000000000f23c835080040000f23f866b85b008ed8"}], 0x1, 0x0, 0x0, 0x16e) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x204}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000049000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0xffffffffffffff11) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 10:13:14 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r0, 0x1275, 0x0) 10:13:14 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r0, r0, &(0x7f0000000000), 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000040)={0x3}) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0xc801, 0x0) 10:13:14 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60067006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1885.583365][ T7247] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1885.623008][ T7247] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1885.652231][ T7247] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1885.744954][ T7368] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1885.754882][ T7368] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1885.766316][ T7368] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1885.768129][ T7247] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 1885.787165][ T7368] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 10:13:22 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') getdents64(r0, &(0x7f00000005c0)=""/153, 0x99) getdents64(r0, &(0x7f0000000000)=""/186, 0xba) r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/d8\x19\x19H\b\x00', 0x8, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000100), 0x39, 0x1}}, 0x20) 10:13:22 executing program 0: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000400)='./file0\x00', 0xfffffffffffffffa, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x0) kcmp(0x0, 0x0, 0x3, 0xffffffffffffffff, 0xffffffffffffffff) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000480)=""/260, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x100000000000011e, 0x0) socket$bt_rfcomm(0x1f, 0x1, 0x3) 10:13:22 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001b00)={0x9, 0x1f, 0x6, 0x9}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) 10:13:22 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) r1 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl(r1, 0x0, &(0x7f0000000300)="621143") sendfile(r0, r0, &(0x7f0000000000), 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000240)={@nfc={0x27, 0x0, 0x0, 0x4}, {&(0x7f0000000140)=""/193, 0xc1}, &(0x7f0000000040), 0x30}, 0xa0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:13:22 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60104386c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:13:22 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60078006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:13:22 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000240)='.\x00', 0xc0000080) ioctl$TIOCSETD(0xffffffffffffffff, 0x5412, 0x0) [ 1893.454955][ T7398] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1893.509820][ T7398] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1893.520838][ T7398] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1893.537971][ T7413] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1893.545612][ T7398] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 1893.548017][ T7413] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1893.583400][ T7413] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock 10:13:22 executing program 0: r0 = socket$inet(0x2, 0x100000000003, 0x400000000001) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000080)="071f070300009dbd0000000027c1cbfe76ce384b1a6a722a3beaf52671", 0x1d) [ 1893.604950][ T7413] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 10:13:22 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) 10:13:22 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f00000003c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) syz_mount_image$gfs2(&(0x7f0000000180)='gfs2\x00', &(0x7f00000001c0)='./file0\x00', 0x8000000000000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000200)="ad10c94a0b658b0f31585d8b0b30d2a094bc6c9a28a94a44fcd2a8c3d6f202247e8ba4ce3138a0aa625a14f7eeda9569070f76c2c9efc9b8b9aca5163bdf3b0079b0f7288d3834fd2adf844f35b853b0af38516a4bb889248f0d80dca9053baa40778cc0327359600f46e3db8596f3a84e8ebdee7bd6dc13", 0x78, 0x40}], 0x800, &(0x7f0000000400)={[{@quota='quota'}, {@hostdata={'hostdata', 0x3d, '&posix_acl_access'}}, {@quota_on='quota=on'}], [{@dont_appraise='dont_appraise'}, {@euid_lt={'euid<', r0}}, {@permit_directio='permit_directio'}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_eq={'euid', 0x3d, r1}}, {@permit_directio='permit_directio'}, {@subj_user={'subj_user', 0x3d, 'ext4\x00'}}]}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000140), 0x9, &(0x7f0000ffd000/0x2000)=nil, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaad51, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:13:22 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/f\xe5\xc3i-\x9al\t\xe4[\x94m\xccra\x05V)\xe2\xfa\x06\f\xebHQ\x0e\v@\x06\x99 w6\x00\x1aR\xcc/y\x9fO\x0fTG\xb8-Z\xa3\x96\xcc\xa3\xc9\x93\x14\x85\xdf\x19|\xf0]\xc7\xd7\xba3<,\xf2\xa1\'\xd3y\xf7ENIM\xddEQoV\xf0\xe8\xb2\x9e\x91)\x93\x17\xbdT#2\x19R]!\x82:%8%\xc9\x00\x88\x85q\xff\xaex\x14\xad\xf6\x11\xd4.}\x96I\x16\xbb2B\xa2\xef-M-\xe0\xf2\x00\xd6\xd5~\x0e\xe9WqJ\xeb\\IT\xb8\a\x97\xb0\xe2\xe9\x13VMWS\xe5#\xce\xa4L\x14\x16\xf6\xdd\xff\xf6\xf3J\x8d\x13\xf0\x0e\xcf9\x0e\x1f\t\xb9|\x1d\xd99\x993\xbe\xc97\xfc\x94/\xdb\xad\xd0\xd9\xe4T\x99\xa8\xcb\xa2H6\x9a4F\xb5\xc8\xb1\xdd\xb9\xa6vv\xff\xbdBa\xea\x18)\xa3\xfc|\xbb}\x1a\xaf\xcc\xd0\xda\x06\x95\x17') write$P9_RVERSION(0xffffffffffffffff, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000040)) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe2(0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_TSS_ADDR(r1, 0xae47, 0xd000) ioctl$KVM_RUN(r2, 0xae80, 0x0) fstat(0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 10:13:22 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)={0x0, 0x0, 0x7, 0x0, 0x3fd}) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'nlmon\t\x00\x7f\xed\xb1[\xe5\xa3\xcd\xb6\x00'}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000380)={0x0, 0x0, @ioapic={0xd000, 0x0, 0x0, 0x0, 0x0, [{0x0, 0x0, 0xfb}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x7}, {}, {0x0, 0x0, 0x0, [], 0x4}]}}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000480)={[0x0, 0x3, 0x0, 0x20, 0x0, 0x0, 0x4cb], 0x100000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1894.021696][ T7549] picdev_read: 59 callbacks suppressed [ 1894.021703][ T7549] kvm: pic: non byte read [ 1894.060340][ T7549] picdev_write: 55 callbacks suppressed [ 1894.060345][ T7549] kvm: pic: non byte write [ 1894.078686][ T7549] kvm: pic: non byte read [ 1894.091775][ T7549] kvm: pic: non byte write [ 1894.102800][ T7549] pic_ioport_write: 50 callbacks suppressed [ 1894.102805][ T7549] kvm: pic: single mode not supported [ 1894.102812][ T7549] kvm: pic: level sensitive irq not supported [ 1894.151193][ T7549] kvm: pic: non byte read [ 1894.186189][ T7549] kvm: pic: non byte write [ 1894.190940][ T7549] kvm: pic: non byte read [ 1894.215550][ T7549] kvm: pic: non byte write [ 1894.220332][ T7549] kvm: pic: non byte read [ 1894.224825][ T7549] kvm: pic: non byte write [ 1894.244491][ T7549] kvm: pic: non byte read [ 1894.259831][ T7549] kvm: pic: non byte write [ 1894.264754][ T7549] kvm: pic: non byte read [ 1894.272890][ T7549] kvm: pic: non byte write [ 1894.307023][ T7549] kvm: pic: non byte read [ 1894.312767][ T7549] kvm: pic: non byte write [ 1894.325986][ T7549] kvm: pic: non byte read [ 1894.334941][ T7549] kvm: pic: non byte write [ 1894.343887][ T7549] kvm: pic: non byte read [ 1894.360173][ T7549] kvm: pic: non byte write [ 1894.393465][ T7549] kvm: pic: single mode not supported 10:13:30 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') getdents64(r0, &(0x7f00000000c0)=""/153, 0xfffffffffffffe11) getdents64(r0, &(0x7f0000000000)=""/186, 0xba) 10:13:30 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e600ff006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:13:30 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e601003f6c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:13:30 executing program 0: ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=""/122, 0x49}) clone(0x28b84900, 0x0, 0x0, 0x0, &(0x7f0000000300)) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) 10:13:30 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)={0x0, 0x0, 0x7, 0x0, 0x3fd}) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'nlmon\t\x00\x7f\xed\xb1[\xe5\xa3\xcd\xb6\x00'}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000380)={0x0, 0x0, @ioapic={0xd000, 0x0, 0x0, 0x0, 0x0, [{0x0, 0x0, 0xfb}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x7}, {}, {0x0, 0x0, 0x0, [], 0x4}]}}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000480)={[0x0, 0x3, 0x0, 0x20, 0x0, 0x0, 0x4cb], 0x100000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 10:13:30 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f00000000c0)={@rand_addr, 0x0}, &(0x7f0000000300)=0x14) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], r0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="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", 0x12a, 0x400}], 0x4801, 0x0) syz_init_net_socket$ax25(0x3, 0x5, 0xcf) 10:13:30 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) select(0x40, &(0x7f0000000140), 0x0, &(0x7f00000001c0)={0xa2a}, 0x0) poll(&(0x7f0000000040)=[{r0, 0xa2}, {r0}], 0x2, 0x4e) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x3b, 0x0, 0x0, 0x800e00b99) select(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000080)={0x7}, 0x0) shutdown(r1, 0x0) [ 1894.393763][ T7549] kvm: pic: single mode not supported [ 1901.812761][ T7682] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 10:13:30 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0xffffffffffff9dfa) [ 1901.859166][ T7682] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1901.890099][ T7682] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock 10:13:31 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)={0x0, 0x0, 0x7, 0x0, 0x3fd}) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'nlmon\t\x00\x7f\xed\xb1[\xe5\xa3\xcd\xb6\x00'}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000380)={0x0, 0x0, @ioapic={0xd000, 0x0, 0x0, 0x0, 0x0, [{0x0, 0x0, 0xfb}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x7}, {}, {0x0, 0x0, 0x0, [], 0x4}]}}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000480)={[0x0, 0x3, 0x0, 0x20, 0x0, 0x0, 0x4cb], 0x100000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1901.924895][ T7680] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1901.954382][ T7680] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1901.978953][ T7682] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 1902.009321][ T7680] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1902.088301][ T7680] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 10:13:31 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)={0x0, 0x0, 0x7, 0x0, 0x3fd}) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'nlmon\t\x00\x7f\xed\xb1[\xe5\xa3\xcd\xb6\x00'}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000380)={0x0, 0x0, @ioapic={0xd000, 0x0, 0x0, 0x0, 0x0, [{0x0, 0x0, 0xfb}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x7}, {}, {0x0, 0x0, 0x0, [], 0x4}]}}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000480)={[0x0, 0x3, 0x0, 0x20, 0x0, 0x0, 0x4cb], 0x100000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 10:13:31 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xc0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xfffffffffffff800, 0x0, 0x0, 0x0, &(0x7f0000000340)={0x9, 0x4}, 0x0, 0x0, &(0x7f0000000380)={0x4, 0xf, 0x3, 0x7}, &(0x7f00000003c0)=0x1, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=0x3f}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, r0}, 0x78) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="6a59e1bd6b6e66bf14a27ae980cd9db0dd8d90305a7fbdf0626536b62b98552f45cef85118d4a7a2f73e7d8d0139c08efcd7f6e74f58245f7d7ee55068df52653eb4d7e526b71f6a8ea29dc499f20800000000000001e71ce19ebd7b27806633335b895fbaf2219c157b79ff3ee23c1c6b8173e03ad14932f0699752e125b678ead599f74c3e855d494ec013bba2"], 0x1) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, r1, 0x7}, 0x10) listxattr(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)=""/88, 0x58) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:13:31 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e601013f6c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1902.674322][ T8080] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1902.702671][ T8080] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1902.728935][ T8080] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1902.752764][ T8080] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 10:13:39 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_SET_MSRS(0xffffffffffffffff, 0x4008ae89, 0x0) open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) r1 = socket(0x10, 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, 0x0, 0x0) write(r1, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0x4008ae89, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0x4008ae89, &(0x7f00000000c0)={0x7a, 0x0, [0x174], [0x3a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x3ce47c9a4b8a4c9e) write$9p(r2, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)}, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100), 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, 0x0) geteuid() r3 = socket(0x0, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, 0x0, 0x0) write(r3, &(0x7f0000000000), 0x0) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0x4008ae89, &(0x7f00000000c0)={0x0, 0x0, [0x174, 0x0, 0x40000084], [0x3a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}) r5 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f00000005c0)=ANY=[@ANYRES64, @ANYPTR64, @ANYRES64, @ANYPTR, @ANYRES16, @ANYRES64, @ANYRESOCT, @ANYRES32], @ANYBLOB="01007366710048000229c6090032d0ed64f3af545aaf6e000085a4e4ebb5ef67000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000008000000000000000000000006e164c097445834d88f20bab6662afd4017d7205c9de1d9ceef00c57769a76bf78a3a85ac88180dd1e62f63baed52b3a2867408ab1f3c9802c8c86589eaf52e19d65d52ab76fbe003c9cf973ea0a5d1c7980d29cb92a1cced246a1b099524d75f8d92db65a1a0b3408c59191844ff49c587785702a0f767c866f39c000"/229], 0x2}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, &(0x7f00000002c0)) geteuid() socket(0x10, 0x3, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) r8 = ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r8, 0x4008ae89, &(0x7f00000000c0)={0x7a, 0x0, [0x174, 0x0, 0x40000084], [0x3a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}) r9 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r9, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=@ipv6_delroute={0x24, 0x19, 0x1, 0x0, 0x0, {}, [@RTA_PRIORITY={0x8, 0x1e, 0x8f3}]}, 0x24}}, 0x0) 10:13:39 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60102006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:13:39 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="3a0baa09f820145d2ff5930f64c89cea9a612c8ec15d1eb414fea41a74b3037df8fb298e44ad71b7fbf45450999f25bdf6d3cd0bf309132741cd7f60a6d3cee3ded45f998d664316985ad7041ac42c65ffa5c118c690bab8cd366d6ec149"], 0x1) sendfile(r0, r0, &(0x7f0000000000), 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r1, r1, &(0x7f0000000000), 0x0) fsconfig$FSCONFIG_SET_PATH(r0, 0x3, &(0x7f0000000040)='-\x00', &(0x7f0000000140)='./file0\x00', r1) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r2, r2, &(0x7f0000000000), 0x0) getresuid(&(0x7f0000000180), &(0x7f0000000280)=0x0, &(0x7f00000002c0)) r4 = socket$packet(0x11, 0x2, 0x300) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0xc) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000002380)={{0x0, 0x0, r5, 0xffffffffffffffff}}) fchown(r2, r3, r5) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:13:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r1, &(0x7f0000001740)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5}, 0x2) r2 = dup(r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0x1de, 0x0, 0x0, 0x800e0050e) shutdown(r2, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000300)=""/130, 0x82}, {0x0}, {0x0}], 0x3}, 0x40102) shutdown(r3, 0x0) shutdown(r0, 0x0) 10:13:39 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r1, r1, &(0x7f0000000000), 0x0) bind$rose(r1, &(0x7f00000000c0)=@full={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x5, [@null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x40) getdents64(r0, &(0x7f00000005c0)=""/153, 0x99) getdents64(r0, &(0x7f0000000000)=""/186, 0xba) 10:13:39 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100406c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:13:40 executing program 0: r0 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup2(r0, r1) mq_timedsend(r2, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x1c9c380}) [ 1911.184390][ T8119] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1911.235904][ T8122] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1911.267764][ T8119] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors 10:13:40 executing program 0: ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00\x14\x01\x03\x03\xf0\x00', @ifru_mtu}) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000080), 0x210, 0x0, 0x0) [ 1911.319270][ T8122] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1911.326944][ T8119] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1911.392462][ T8119] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 1911.468362][ T8122] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock 10:13:40 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_SET_MSRS(0xffffffffffffffff, 0x4008ae89, 0x0) open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) r1 = socket(0x10, 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, 0x0, 0x0) write(r1, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0x4008ae89, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0x4008ae89, &(0x7f00000000c0)={0x7a, 0x0, [0x174], [0x3a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x3ce47c9a4b8a4c9e) write$9p(r2, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)}, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100), 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, 0x0) geteuid() r3 = socket(0x0, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, 0x0, 0x0) write(r3, &(0x7f0000000000), 0x0) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0x4008ae89, &(0x7f00000000c0)={0x0, 0x0, [0x174, 0x0, 0x40000084], [0x3a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}) r5 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f00000005c0)=ANY=[@ANYRES64, @ANYPTR64, @ANYRES64, @ANYPTR, @ANYRES16, @ANYRES64, @ANYRESOCT, @ANYRES32], @ANYBLOB="01007366710048000229c6090032d0ed64f3af545aaf6e000085a4e4ebb5ef67000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000008000000000000000000000006e164c097445834d88f20bab6662afd4017d7205c9de1d9ceef00c57769a76bf78a3a85ac88180dd1e62f63baed52b3a2867408ab1f3c9802c8c86589eaf52e19d65d52ab76fbe003c9cf973ea0a5d1c7980d29cb92a1cced246a1b099524d75f8d92db65a1a0b3408c59191844ff49c587785702a0f767c866f39c000"/229], 0x2}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, &(0x7f00000002c0)) geteuid() socket(0x10, 0x3, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) r8 = ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r8, 0x4008ae89, &(0x7f00000000c0)={0x7a, 0x0, [0x174, 0x0, 0x40000084], [0x3a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}) r9 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r9, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=@ipv6_delroute={0x24, 0x19, 0x1, 0x0, 0x0, {}, [@RTA_PRIORITY={0x8, 0x1e, 0x8f3}]}, 0x24}}, 0x0) 10:13:40 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100486c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1911.548688][ T8122] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 10:13:40 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000140)={0x28, 0x0, 0x2711, @local}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1911.764314][ T8252] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1911.781891][ T8252] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1911.805508][ T8252] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock 10:13:40 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_SET_MSRS(0xffffffffffffffff, 0x4008ae89, 0x0) open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) r1 = socket(0x10, 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, 0x0, 0x0) write(r1, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0x4008ae89, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0x4008ae89, &(0x7f00000000c0)={0x7a, 0x0, [0x174], [0x3a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x3ce47c9a4b8a4c9e) write$9p(r2, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)}, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100), 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, 0x0) geteuid() r3 = socket(0x0, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, 0x0, 0x0) write(r3, &(0x7f0000000000), 0x0) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0x4008ae89, &(0x7f00000000c0)={0x0, 0x0, [0x174, 0x0, 0x40000084], [0x3a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}) r5 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f00000005c0)=ANY=[@ANYRES64, @ANYPTR64, @ANYRES64, @ANYPTR, @ANYRES16, @ANYRES64, @ANYRESOCT, @ANYRES32], @ANYBLOB="01007366710048000229c6090032d0ed64f3af545aaf6e000085a4e4ebb5ef67000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000008000000000000000000000006e164c097445834d88f20bab6662afd4017d7205c9de1d9ceef00c57769a76bf78a3a85ac88180dd1e62f63baed52b3a2867408ab1f3c9802c8c86589eaf52e19d65d52ab76fbe003c9cf973ea0a5d1c7980d29cb92a1cced246a1b099524d75f8d92db65a1a0b3408c59191844ff49c587785702a0f767c866f39c000"/229], 0x2}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, &(0x7f00000002c0)) geteuid() socket(0x10, 0x3, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) r8 = ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r8, 0x4008ae89, &(0x7f00000000c0)={0x7a, 0x0, [0x174, 0x0, 0x40000084], [0x3a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}) r9 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r9, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=@ipv6_delroute={0x24, 0x19, 0x1, 0x0, 0x0, {}, [@RTA_PRIORITY={0x8, 0x1e, 0x8f3}]}, 0x24}}, 0x0) [ 1911.839403][ T8252] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 10:13:41 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60103006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:13:41 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60101486c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:13:41 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) syz_mount_image$nfs(&(0x7f0000000040)='nfs\x00', &(0x7f0000000140)='./file0\x00', 0x6, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="7241ceb6ad1a910c8642dd1fd2bb5b74117d8ebb76e7e049671cde89f0e51f6ca3c23c7bf592b2587bc7fda4c77f721503f27883000f9fca3f1cc5a0103922ca41055c5aea7f47fc3f48fb90044ba09677ec1b064a43e18f52a5d8d80a904d5d05f77ae0c73fed3ebfea199f47c6c4f3b79480d972a7f96a0488a320053294747d8a75d69d4425b42824d22ead471c163bacdcbc6163a9184287e32301665a08f559a0da", 0xa4, 0x50}], 0x2, &(0x7f0000000280)='ext4\x00') 10:13:41 executing program 0: open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0xfffffffe, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x10001, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80046601, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40046602, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) pipe(0x0) socket$alg(0x26, 0x5, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x23) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, 0x0, &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB]) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fanotify_mark(0xffffffffffffffff, 0xa0, 0x0, r2, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x21) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000340)=0xc) socket$netlink(0x10, 0x3, 0x0) splice(r4, &(0x7f0000000280)=0x1, 0xffffffffffffffff, &(0x7f00000002c0)=0x80, 0xffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r3, &(0x7f0000000100)=""/230, 0xe6) [ 1912.332520][ T8479] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1912.342649][ T8479] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1912.354031][ T8479] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1912.369341][ T8441] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1912.407828][ T8479] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 1912.429528][ T8441] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1912.547642][ T8441] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1912.593571][ T8441] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 10:13:48 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60104006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:13:48 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_SET_MSRS(0xffffffffffffffff, 0x4008ae89, 0x0) open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) r1 = socket(0x10, 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, 0x0, 0x0) write(r1, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0x4008ae89, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0x4008ae89, &(0x7f00000000c0)={0x7a, 0x0, [0x174], [0x3a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x3ce47c9a4b8a4c9e) write$9p(r2, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)}, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100), 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, 0x0) geteuid() r3 = socket(0x0, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, 0x0, 0x0) write(r3, &(0x7f0000000000), 0x0) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0x4008ae89, &(0x7f00000000c0)={0x0, 0x0, [0x174, 0x0, 0x40000084], [0x3a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}) r5 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f00000005c0)=ANY=[@ANYRES64, @ANYPTR64, @ANYRES64, @ANYPTR, @ANYRES16, @ANYRES64, @ANYRESOCT, @ANYRES32], @ANYBLOB="01007366710048000229c6090032d0ed64f3af545aaf6e000085a4e4ebb5ef67000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000008000000000000000000000006e164c097445834d88f20bab6662afd4017d7205c9de1d9ceef00c57769a76bf78a3a85ac88180dd1e62f63baed52b3a2867408ab1f3c9802c8c86589eaf52e19d65d52ab76fbe003c9cf973ea0a5d1c7980d29cb92a1cced246a1b099524d75f8d92db65a1a0b3408c59191844ff49c587785702a0f767c866f39c000"/229], 0x2}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, &(0x7f00000002c0)) geteuid() socket(0x10, 0x3, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) r8 = ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r8, 0x4008ae89, &(0x7f00000000c0)={0x7a, 0x0, [0x174, 0x0, 0x40000084], [0x3a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}) r9 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r9, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=@ipv6_delroute={0x24, 0x19, 0x1, 0x0, 0x0, {}, [@RTA_PRIORITY={0x8, 0x1e, 0x8f3}]}, 0x24}}, 0x0) 10:13:48 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r0, r0, &(0x7f0000000000), 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f00000000c0)={0x2, 'syzkaller1\x00', {0x9c2}, 0xffff}) r1 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') getdents64(r1, &(0x7f00000005c0)=""/153, 0x99) getdents64(r1, &(0x7f0000000000)=""/186, 0xba) 10:13:48 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x9, 0x8, 0x400, 0x409, 0x1, 0x7fffffff, [], r3, 0xffffffffffffffff, 0x3, 0x2}, 0x3c) r5 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x400, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r9, @ANYBLOB="0000000000000000140012000c00010062726964676500000300020092ab29e6bc90313f5c14a8d5d4534e466f18e7a665b4fd2a0e0ffabd5f884b8215627962f7a4aab6691329692afb3fdcc3e7378871f430fe0e63a139f8432b7c88d952fec2b4b0543063914575e89dce08917ef4c83982304f91f231dc1ecf62c4bf0541ff2b5060b6a4d69b9403c96422fd8632e43e946636599dedd725bcd83c8971198e43a29e4b1c15388e01dee5bf7c4e128ff5b5c146c15db0684e76186c004209d8b4158f7b359d8efa69231277e09c47884e9fb0b010687409fc6fa73c91c9504b4460a91a865e0897f10dc1c1e0edc0d560f18478d67cc5cf8dbb0ee5000200000000000000bcb9eb76abba12076a8d076c853092edf73f4224c4e770006630b3a7e43c7e4c90ce6a20fac946584d406aa1cc75103f746d1f026456e44c9a39c62eecdb8bb82ca275e24c5c9095cbc8a6701a2447f9f6e6e4a372717366f176f0e4df46e9e28ede8a00e2a8b3dc"], 0x34}}, 0x0) sendmsg$nl_route(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r9, @ANYBLOB="b90000000000e9ff001200fe1a8c59f8216426d75d654c790c000102"], 0x34}}, 0x0) r10 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ubi_ctrl\x00', 0x0, 0x0) r11 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r12 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r12, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r12, r12, &(0x7f0000000000), 0x0) ioctl$TIOCGRS485(r12, 0x542e, &(0x7f0000000400)) write$P9_RREADLINK(r11, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r11, r11, &(0x7f0000000000), 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xd, 0xb, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x80000001}, [@call={0x85, 0x0, 0x0, 0x3e}, @map={0x18, 0x9130274533dcc757, 0x1, 0x0, r4}, @generic={0x3f, 0x5, 0x9, 0x81, 0x4}, @map_val={0x18, 0xb, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x3}, @alu={0x4, 0x0, 0x6, 0x8, 0xa, 0x8}, @alu={0x7, 0x1, 0x8, 0x3, 0xf853c77dab41df84, 0xffffffffffffffc0}]}, &(0x7f0000000200)='syzkaller\x00', 0x3, 0x50, &(0x7f0000000240)=""/80, 0x82300, 0xa, [], r9, 0xf, r10, 0x8, &(0x7f0000000300)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000340)={0x2, 0xa, 0x2, 0x9}, 0x10, 0xffffffffffffffff, r11}, 0x78) 10:13:48 executing program 0: open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0xfffffffe, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x10001, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80046601, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40046602, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) pipe(0x0) socket$alg(0x26, 0x5, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x23) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, 0x0, &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB]) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fanotify_mark(0xffffffffffffffff, 0xa0, 0x0, r2, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x21) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000340)=0xc) socket$netlink(0x10, 0x3, 0x0) splice(r4, &(0x7f0000000280)=0x1, 0xffffffffffffffff, &(0x7f00000002c0)=0x80, 0xffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r3, &(0x7f0000000100)=""/230, 0xe6) 10:13:48 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e601004c6c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1919.398979][ T26] audit: type=1800 audit(1576836828.476:81): pid=8520 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.4" name="bus" dev="sda1" ino=16533 res=0 10:13:48 executing program 0: open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0xfffffffe, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x10001, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80046601, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40046602, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) pipe(0x0) socket$alg(0x26, 0x5, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x23) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, 0x0, &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB]) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fanotify_mark(0xffffffffffffffff, 0xa0, 0x0, r2, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x21) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000340)=0xc) socket$netlink(0x10, 0x3, 0x0) splice(r4, &(0x7f0000000280)=0x1, 0xffffffffffffffff, &(0x7f00000002c0)=0x80, 0xffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r3, &(0x7f0000000100)=""/230, 0xe6) [ 1919.573652][ T8526] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1919.623988][ T8526] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1919.669638][ T8526] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1919.679817][ T8642] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1919.692302][ T8642] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1919.704474][ T8534] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1919.711098][ T8642] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1919.736125][ T8534] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1919.747795][ T8642] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 1919.758667][ T8534] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock 10:13:48 executing program 5: r0 = socket$inet6_sctp(0xa, 0x4000000000000001, 0x84) bind$inet6(r0, &(0x7f0000000200)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x25, &(0x7f00000000c0)={0x0, @in6}, 0x98) [ 1919.780492][ T8534] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 1919.899755][ T8660] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 10:13:49 executing program 0: open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0xfffffffe, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x10001, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80046601, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40046602, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) pipe(0x0) socket$alg(0x26, 0x5, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x23) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, 0x0, &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB]) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fanotify_mark(0xffffffffffffffff, 0xa0, 0x0, r2, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x21) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000340)=0xc) socket$netlink(0x10, 0x3, 0x0) splice(r4, &(0x7f0000000280)=0x1, 0xffffffffffffffff, &(0x7f00000002c0)=0x80, 0xffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r3, &(0x7f0000000100)=""/230, 0xe6) 10:13:49 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100606c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:13:49 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60105006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1919.986680][ T8660] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 10:13:49 executing program 5: [ 1920.115696][ T8526] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 10:13:49 executing program 0: open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0xfffffffe, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x10001, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80046601, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40046602, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) pipe(0x0) socket$alg(0x26, 0x5, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x23) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, 0x0, &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB]) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fanotify_mark(0xffffffffffffffff, 0xa0, 0x0, r2, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x21) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000340)=0xc) socket$netlink(0x10, 0x3, 0x0) splice(r4, &(0x7f0000000280)=0x1, 0xffffffffffffffff, &(0x7f00000002c0)=0x80, 0xffff, 0x0) getdents64(r3, &(0x7f0000000100)=""/230, 0xe6) 10:13:49 executing program 5: 10:13:49 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0xffffffffffffff99, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x40820, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1099b4d289e699c73a5fe21a5b17aebe06c87762d612d2cdc1b85519179bc4ab693ff7ace39afad71adbc6188aac3f91543d3fedcdee8bcf46ba38f7d232ce6072cd34018000003ee49dee99f8619f64a41f185af17c0d38436da1d5747b391bf56068c9be9516aef40a94bd5e51f85ef612d079cc9eccc872aabb46017dd8a86593bde0d9d699950972718165a83eb34c0043aac1ffc8437ef553a479c8ef5ccd3b"], 0x1) sendfile(r0, r0, &(0x7f0000000000), 0x0) getsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f0000000040), &(0x7f0000000140)=0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1920.376875][ T8775] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1920.394335][ T8775] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1920.454292][ T8775] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1920.492522][ T8775] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 1920.528972][ T8779] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1920.568505][ T8779] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1920.635394][ T8779] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1920.670102][ T8779] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 10:13:56 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x8000, 0x0) ioctl$MON_IOCX_GET(0xffffffffffffffff, 0x40189206, &(0x7f00000001c0)={&(0x7f0000000180), &(0x7f0000001680)=""/4096, 0x1000}) getdents64(r0, &(0x7f00000005c0)=""/153, 0x99) getdents64(r0, &(0x7f0000000000)=""/186, 0xba) 10:13:56 executing program 5: 10:13:56 executing program 0: open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0xfffffffe, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x10001, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80046601, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40046602, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) pipe(0x0) socket$alg(0x26, 0x5, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x23) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, 0x0, &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB]) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fanotify_mark(0xffffffffffffffff, 0xa0, 0x0, r2, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x21) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000340)=0xc) socket$netlink(0x10, 0x3, 0x0) getdents64(r3, &(0x7f0000000100)=""/230, 0xe6) 10:13:56 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100686c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:13:56 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="8000f7ffffffffffffff0300e60100006c000000000000000100000001000000004000000040000080000000101308006d5e9f67100ca94095a9", 0x3a, 0x3fd}], 0x4801, 0x0) 10:13:56 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60106006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:13:56 executing program 5: 10:13:57 executing program 5: 10:13:57 executing program 0: open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0xfffffffe, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x10001, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80046601, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40046602, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) pipe(0x0) socket$alg(0x26, 0x5, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x23) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, 0x0, &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB]) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fanotify_mark(0xffffffffffffffff, 0xa0, 0x0, r2, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x21) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000340)=0xc) getdents64(r3, &(0x7f0000000100)=""/230, 0xe6) [ 1928.065047][ T8839] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1928.092050][ T8839] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors 10:13:57 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x4, 0x2232341fba01f690, &(0x7f00000007c0), 0x10880, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r0, r0, &(0x7f0000000000), 0x0) sendto$unix(r0, &(0x7f0000000140)="90175ab2065f442a9714e3db9fa4d1b5a6c68202e151fb6f18d87d19f7852e81d0d78c7def5a5cc09a0fb1d85bddd6d0cd32923214b762425154144c75e8150a7c1157b2fcf54bb25ce2925f943b8fad20afb22ab5f575b73794ccaa", 0x5c, 0x4000000, &(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e) socket$alg(0x26, 0x5, 0x0) [ 1928.113940][ T8839] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1928.145952][ T8839] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 10:13:57 executing program 5: [ 1928.192483][ T8827] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1928.385436][ T8827] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1928.408057][ T8827] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock 10:13:57 executing program 5: perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x803, 0x300) r1 = socket$inet(0x2, 0x80003, 0x4) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x10) recvmmsg(r0, &(0x7f0000002e00), 0x386, 0x22, 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) [ 1928.468097][ T8827] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 10:14:03 executing program 4: eventfd(0xfffffffe) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') getdents64(r0, &(0x7f00000005c0)=""/153, 0x99) getdents64(r0, &(0x7f0000000000)=""/186, 0xba) 10:14:03 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e601006c6c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:14:03 executing program 0: open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0xfffffffe, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x10001, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80046601, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40046602, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) pipe(0x0) socket$alg(0x26, 0x5, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x23) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, 0x0, &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB]) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fanotify_mark(0xffffffffffffffff, 0xa0, 0x0, r2, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x21) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) getdents64(r3, &(0x7f0000000100)=""/230, 0xe6) 10:14:03 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60107006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:14:03 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) 10:14:03 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r0, r0, &(0x7f0000000000), 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r1, r1, &(0x7f0000000000), 0x0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r2, r2, &(0x7f0000000000), 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x13, 0x0, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xd, r2, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0xfffffffffffffff8) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:14:03 executing program 0: open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0xfffffffe, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x10001, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80046601, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40046602, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) pipe(0x0) socket$alg(0x26, 0x5, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x23) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, 0x0, &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB]) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fanotify_mark(0xffffffffffffffff, 0xa0, 0x0, r2, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x21) socket$nl_netfilter(0x10, 0x3, 0xc) getdents64(r3, &(0x7f0000000100)=""/230, 0xe6) 10:14:03 executing program 5: ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00\x14\x01\x03\x03\xf0\x00', @ifru_mtu}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x2, 0x0) sendmsg(r2, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) recvmmsg(r2, &(0x7f0000000080), 0x210, 0x0, 0x0) [ 1934.495547][ T8992] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 10:14:03 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f0000000100)="bb7eb6b30768bffb5e7dd5fedf0f4f425f0b2be18f06ab665c744e173165fed9ba23c8c53c47567583095b13ab8c4d7f03422035e9c0636ff5b839aaa00d38c6c3b2", 0x42, 0xff}, {&(0x7f00000002c0)="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", 0x11b, 0x3}], 0x804805, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x400c40, 0x0) [ 1934.554150][ T8995] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1934.612695][ T8995] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1934.624222][ T8995] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1934.645470][ T8992] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1934.649282][ T8995] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 1934.692315][ T8992] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock 10:14:03 executing program 0: open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0xfffffffe, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x10001, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80046601, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40046602, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) pipe(0x0) socket$alg(0x26, 0x5, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x23) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, 0x0, &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB]) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fanotify_mark(0xffffffffffffffff, 0xa0, 0x0, r2, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x21) getdents64(r3, &(0x7f0000000100)=""/230, 0xe6) [ 1934.755853][ T8992] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 10:14:03 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100746c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:14:03 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) arch_prctl$ARCH_GET_CPUID(0x1011) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1935.179583][ T9143] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1935.193347][ T9143] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1935.226941][ T9143] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1935.247757][ T9143] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 10:14:09 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x40c80, 0x0) getdents64(r1, &(0x7f0000000100)=""/153, 0xffffff33) getdents64(r0, &(0x7f0000000000)=""/186, 0xba) 10:14:09 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60108006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:14:09 executing program 0: open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0xfffffffe, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x10001, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80046601, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40046602, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) pipe(0x0) socket$alg(0x26, 0x5, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x23) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, 0x0, &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB]) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fanotify_mark(0xffffffffffffffff, 0xa0, 0x0, r2, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000100)=""/230, 0xe6) 10:14:09 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000180)="5b59568bfa165fbdbb3f4e14fe0acb65a83c518cbd0d00dd29036d3d9194540cf4f9daab69ca977ff98806ea9fe9cd2d53ef95188f136d7ae1ec9bfc582849ff9273ef7c4a65091619f4d8d6f61192967a7c3928ec631fce3f6428d65aaabd19fd1e2e27", 0x64, 0xfffffffffffffff8) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000100)={0x0, 0x0}) sched_setaffinity(r2, 0x8, &(0x7f0000000500)=0xa000000000000005) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0}, 0x0) setreuid(0x0, r3) r4 = getpgrp(0x0) setpriority(0x0, r4, 0xffff) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000900)={r4}, 0xc) shmctl$IPC_SET(0x0, 0x1, &(0x7f00000001c0)={{0x6, r3, 0xee01, 0x0, 0xee01, 0x10, 0x319a}, 0x81, 0xe86b, 0x0, 0x10000020, r4, r2, 0x201}) r5 = geteuid() getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000380)={{{@in=@multicast1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000480)=0xe8) mount$overlay(0x0, &(0x7f0000000300)='./bus\x00', &(0x7f0000000340)='overlay\x00', 0x14000, &(0x7f00000006c0)={[{@nfs_export_on='nfs_export=on'}], [{@dont_measure='dont_measure'}, {@audit='audit'}, {@euid_gt={'euid>'}}, {@euid_gt={'euid>', r3}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@euid_lt={'euid<', r5}}, {@uid_eq={'uid', 0x3d, r6}}]}) sendfile(r1, r1, &(0x7f0000000000), 0x0) write$P9_RREADLINK(r1, &(0x7f0000000280)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f0000000200)='ext4\x00', &(0x7f0000000240)) r7 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r7, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r7, r7, &(0x7f0000000000), 0x0) ioctl$FITRIM(r7, 0xc0185879, &(0x7f00000002c0)={0xebd0, 0x1, 0x8000}) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:14:09 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e601007a6c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:14:09 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)={0x0, 0x0, 0x7, 0x0, 0x3fd}) syz_open_dev$vcsa(0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200001, 0x31, 0xffffffffffffffff, 0x0) futex(&(0x7f0000004000), 0x400000084, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000240)={0x0, 0x9}, 0x8) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 10:14:09 executing program 0: open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0xfffffffe, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x10001, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80046601, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40046602, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) pipe(0x0) socket$alg(0x26, 0x5, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x23) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, 0x0, &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB]) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fanotify_mark(0xffffffffffffffff, 0xa0, 0x0, r2, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000100)=""/230, 0xe6) [ 1940.760941][ T9271] overlayfs: unrecognized mount option "dont_measure" or missing value 10:14:09 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000000), 0x0) shutdown(0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2600000013003ff1eb14c1f8030322ff0f1000e313000000093903680000000006000300124b", 0x26) [ 1940.810829][ T9382] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1940.824509][ T9269] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1940.824795][ T9382] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1940.848486][ T9382] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1940.869677][ T9382] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 1940.952135][ T9269] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1940.963259][ T9269] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1941.006251][ T9269] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 10:14:10 executing program 0: open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0xfffffffe, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x10001, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80046601, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40046602, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) pipe(0x0) socket$alg(0x26, 0x5, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x23) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, 0x0, &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB]) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fanotify_mark(0xffffffffffffffff, 0xa0, 0x0, r2, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000100)=""/230, 0xe6) 10:14:10 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60109006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1941.168567][ T9400] K: renamed from caif0 10:14:10 executing program 0: open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0xfffffffe, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x10001, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80046601, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40046602, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) pipe(0x0) socket$alg(0x26, 0x5, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x23) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, 0x0, &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB]) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x21) getdents64(r2, &(0x7f0000000100)=""/230, 0xe6) [ 1941.240831][ T9271] overlayfs: unrecognized mount option "dont_measure" or missing value [ 1941.268398][ T9400] device K entered promiscuous mode 10:14:10 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100ff6c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1941.299424][ T9400] A link change request failed with some changes committed already. Interface K may have been left with an inconsistent configuration, please check. [ 1941.519245][ T9411] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1941.560912][ T9411] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1941.584219][ T9519] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1941.585381][ T9411] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1941.594131][ T9519] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1941.625997][ T9519] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1941.671321][ T9519] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 1941.685645][ T9411] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 10:14:16 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') getdents64(r0, &(0x7f00000005c0)=""/153, 0x99) getdents64(r0, &(0x7f0000000000)=""/186, 0xba) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000100)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./bus\x00', 0x6, 0x2) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x239503, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r1, r1, &(0x7f0000000000), 0x0) fcntl$dupfd(r1, 0xa128f2f0922b301, 0xffffffffffffffff) 10:14:16 executing program 0: open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0xfffffffe, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x10001, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80046601, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40046602, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) pipe(0x0) socket$alg(0x26, 0x5, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x23) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, 0x0, &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB]) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x21) getdents64(r2, &(0x7f0000000100)=""/230, 0xe6) 10:14:16 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0), 0x120040, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x100, 0x0) ioctl$KVM_ENABLE_CAP(r0, 0x4068aea3, &(0x7f0000000140)={0x81, 0x0, [0x6, 0xcd, 0x3, 0x4]}) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:14:16 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000000), 0x0) shutdown(0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2600000013003ff1eb14c1f8030322ff0f1000e313000000093903680000000006000300124b", 0x26) 10:14:16 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e6010a006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:14:16 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e6010fff6c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1947.025487][ T9549] A link change request failed with some changes committed already. Interface K may have been left with an inconsistent configuration, please check. 10:14:16 executing program 0: open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0xfffffffe, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x10001, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80046601, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40046602, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) pipe(0x0) socket$alg(0x26, 0x5, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x23) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x21) getdents64(r2, &(0x7f0000000100)=""/230, 0xe6) [ 1947.178195][ T9552] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1947.196827][ T9552] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1947.209393][ T9552] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock 10:14:16 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x4, 0x0, &(0x7f0000000040)) [ 1947.244377][ T9561] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1947.258241][ T9552] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 1947.290406][ T9561] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1947.307549][ T9561] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock 10:14:16 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100000a000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1947.383974][ T9561] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 10:14:16 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000100), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="00706964aff2d60079096f73202b7069647370696473a023310c806513daff50eb8f775ad020b32e1357cd579bebf6c166506ac5539dea39bbeb7ce314a210ab429dfb608a0f72009447337e53affb000000000000"], 0x16) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, 0x0, 0x200002, 0x0) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) r3 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xc0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000001c0)={0x10000000, 0x0, 0x9cc2}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=0x6}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000a40)={0x0, r3, 0x0, 0x0, 0x0, r4}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000740)='#\x00', r4}, 0x30) openat$cgroup_ro(r1, &(0x7f0000000080)='cgroup.events\x00', 0x0, 0x0) socket$kcm(0xa, 0x8000000001, 0x0) r5 = socket$kcm(0x2, 0x5, 0x0) setsockopt$sock_attach_bpf(r5, 0x84, 0x17, &(0x7f0000000140), 0x20) r6 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40082404, &(0x7f0000000240)=0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000000600)=@alg={0x26, 'aead\x00', 0x0, 0x0, 'aegis256-generic\x00'}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)}, {&(0x7f0000000780)="ee145b797104e97b03c5eac4f822d2434e2de5d75c5c03c0d005f1880302efb2f8803745b6708b31b8f149af8491cbafbe4d8299fd53e1990116f537016319", 0x3f}], 0x2, &(0x7f0000000840)}, 0x8b5) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89a0, &(0x7f0000000000)='&\a[\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000005c0)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89a1, &(0x7f0000000680)='&@[\x00') 10:14:16 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x4, 0x400) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, [], 0x0, 0x3, r0, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000180)={r0}) syz_mount_image$ext4(&(0x7f0000000080)='eh\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r1, r1, &(0x7f0000000000), 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x9) 10:14:16 executing program 0: open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0xfffffffe, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x10001, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80046601, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40046602, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) pipe(0x0) socket$alg(0x26, 0x5, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x23) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x21) getdents64(r2, &(0x7f0000000100)=""/230, 0xe6) [ 1947.775075][ T9664] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1947.787926][ T9664] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1947.834888][ T9664] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1947.869789][ T9664] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 10:14:25 executing program 4: socketpair(0x4, 0x1, 0x9, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x44c0, 0x0) connect$l2tp(r0, &(0x7f00000002c0)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x4e21, @empty}, 0x1, 0x3, 0x1, 0x1}}, 0x2e) r2 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') getdents64(r2, &(0x7f00000005c0)=""/153, 0x99) openat$vimc0(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video0\x00', 0x2, 0x0) getdents64(r2, &(0x7f0000000100)=""/159, 0x9f) getdents64(r2, &(0x7f00000001c0)=""/199, 0xc7) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000000)=""/53) 10:14:25 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x5000008}, 0xc, &(0x7f0000000280)={&(0x7f0000000180)={0xdc, r0, 0x800, 0x70bd27, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x1}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}]}, @IPVS_CMD_ATTR_DEST={0x3c, 0x2, [@IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e24}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x6}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x5d}, @IPVS_DEST_ATTR_TUN_TYPE={0x8}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x4}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e21}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8}]}, @IPVS_CMD_ATTR_DAEMON={0x6c, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0xff}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x5}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x2}]}]}, 0xdc}, 0x1, 0x0, 0x0, 0x1}, 0x4028485) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000300)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000340)=0x18) 10:14:25 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e6010c006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:14:25 executing program 5: dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000001940)=[{&(0x7f0000000180)=""/96, 0x60}], 0x1, 0x4c) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000002c0)=ANY=[], 0x0) 10:14:25 executing program 0: open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0xfffffffe, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x10001, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80046601, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40046602, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) pipe(0x0) socket$alg(0x26, 0x5, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x23) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x21) getdents64(r2, &(0x7f0000000100)=""/230, 0xe6) 10:14:25 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e601000020000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:14:25 executing program 0: open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0xfffffffe, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x10001, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80046601, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40046602, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) pipe(0x0) socket$alg(0x26, 0x5, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x21) getdents64(r2, &(0x7f0000000100)=""/230, 0xe6) 10:14:25 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r0 = socket(0x1e, 0x2, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0xff37) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9, 0x1, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x4) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) sendmmsg(r1, &(0x7f0000000a40), 0x8000000000000b0, 0x0) [ 1956.562092][ T9721] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 10:14:25 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4c05, 0x0) [ 1956.610214][ T9721] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1956.744680][ T9832] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1956.756755][ T9721] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1956.778092][ T9721] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 1956.821966][ T9832] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1956.838649][ T9832] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1956.881974][ T9832] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 10:14:26 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r0 = socket(0x1e, 0x2, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0xff37) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9, 0x1, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x4) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) sendmmsg(r1, &(0x7f0000000a40), 0x8000000000000b0, 0x0) 10:14:26 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0, 0xfffffff7}, 0xffe2) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:14:26 executing program 0: open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0xfffffffe, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x10001, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80046601, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40046602, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) pipe(0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x21) getdents64(r2, &(0x7f0000000100)=""/230, 0xe6) 10:14:33 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e601000023000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:14:33 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60123006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:14:33 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg$kcm(r1, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000480)=""/143, 0x8f}], 0x1}, 0x0) 10:14:33 executing program 0: open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0xfffffffe, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x10001, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80046601, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40046602, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x21) getdents64(r2, &(0x7f0000000100)=""/230, 0xe6) 10:14:33 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) 10:14:33 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r0, r0, &(0x7f0000000000), 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r4, @ANYBLOB="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"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) r5 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r5, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r5, r5, &(0x7f0000000000), 0x0) r6 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r6, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r6, r6, &(0x7f0000000000), 0x0) connect(r5, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, r6, {0x2, 0x4e24, @broadcast}, 0x4, 0x4, 0x4, 0x4}}, 0x80) r7 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r7, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r7, r7, &(0x7f0000000000), 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r7, 0x84, 0x20, &(0x7f0000000140), 0x4) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000000c0)={'team0\x00', r4}) r8 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') getdents64(r8, &(0x7f00000005c0)=""/153, 0x99) getdents64(r8, &(0x7f0000000000)=""/186, 0xba) 10:14:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000780)=[{&(0x7f0000000140)=""/127, 0x7f}, {0x0}, {0x0}, {0x0}], 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x8164, 0x0, 0x0, 0x800e00547) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000016c0)=[{&(0x7f00000001c0)=""/71, 0x47}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x6}, 0x0) r3 = dup(r2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0xfd1d, 0x0, 0x0, 0x800e0053d) shutdown(r3, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r5, &(0x7f0000000040)=[{&(0x7f0000000640)=""/4096, 0x1000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x7) shutdown(r4, 0x0) shutdown(r1, 0x0) 10:14:34 executing program 0: open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0xfffffffe, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x10001, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80046601, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40046602, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x21) getdents64(r1, &(0x7f0000000100)=""/230, 0xe6) [ 1965.106139][T10106] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1965.133279][T10108] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1965.145488][T10106] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors 10:14:34 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID2(r2, 0x4008ae90, &(0x7f0000000140)={0x2, 0x0, [{0x0, 0x0, 0x5}, {0x80000001, 0x0, 0x6, 0x0, 0x0, 0xbece}]}) [ 1965.159999][T10108] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors 10:14:34 executing program 1: r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x140080}, 0xc, &(0x7f00000002c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="fc00008200", @ANYRES16=r0, @ANYBLOB="000226bd7000080000000c000000ac000500080001006962000008000100657468004c00020008000400dc03000008000100140000000800010002000000080004000400000008000400ffffffff08000300080000000800030010000000080002008000000008000200e8000000080001006574680008000100756470002400020008000200030000000800010012000000080003000010000008000200090000000800010069620000080001007564700008000100657468003c00070008000100050000000c0003000000000000000000080002000700000008000100000000000c00030000000000ffffffff0800010040000000"], 0xfc}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x6, 0xce6, &(0x7f0000000100)=[{&(0x7f0000000240)="800000003804000019000300e60100006c000000000000000100080c15e9e0c10c49eb0fa54fcbea57000000004000000040000080000000101308006d5ebe5a0000ffff53ef00000000", 0x4db, 0x400}], 0x88054, 0x0) [ 1965.232553][T10108] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1965.232711][T10106] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock 10:14:34 executing program 0: open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0xfffffffe, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x10001, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80046601, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40046602, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x21) getdents64(r1, &(0x7f0000000100)=""/230, 0xe6) [ 1965.336470][T10106] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 1965.362096][T10108] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 10:14:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r1, &(0x7f0000001740)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5}, 0x2) r2 = dup(r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0x1de, 0x0, 0x0, 0x800e0050e) shutdown(r2, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000300)=""/130, 0x82}, {0x0}, {0x0}], 0x3}, 0x0) shutdown(r3, 0x0) shutdown(r0, 0x0) 10:14:34 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e601000025000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:14:34 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e6012d006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:14:34 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) socket$inet_udp(0x2, 0x2, 0x0) 10:14:34 executing program 0: open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0xfffffffe, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x10001, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80046601, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40046602, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x21) getdents64(r1, &(0x7f0000000100)=""/230, 0xe6) 10:14:34 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@resize_size={'resize'}}]}) [ 1965.914510][T10349] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1965.925474][T10349] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1965.962012][T10349] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1966.023227][T10349] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 1966.042766][T10351] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1966.055849][T10351] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1966.098723][T10351] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1966.155829][T10351] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 1971.093688][T10477] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 10:14:41 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = getpgrp(0xffffffffffffffff) prlimit64(r1, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) syz_open_procfs(r1, &(0x7f00000000c0)='net/mcfilter\x00') kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, r0, &(0x7f00000000c0)={r0, 0xffffffffffffffff, 0x7}) getdents64(r0, &(0x7f00000005c0)=""/153, 0x99) getdents64(r0, &(0x7f0000000000)=""/186, 0xba) 10:14:41 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, &(0x7f0000000040)=0x841) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:14:41 executing program 5: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400c582f24186cf0d", @ANYRES32=r2, @ANYBLOB], 0x3}}, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x72, @empty, 0x80000}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 10:14:41 executing program 0: open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0xfffffffe, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x10001, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80046601, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40046602, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x21) getdents64(r1, &(0x7f0000000100)=""/230, 0xe6) 10:14:41 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60148006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:14:41 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100002a000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1972.242382][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 10:14:41 executing program 0: open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0xfffffffe, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x10001, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80046601, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40046602, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x21) getdents64(r1, &(0x7f0000000100)=""/230, 0xe6) 10:14:41 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x14000, 0x0) statx(r0, &(0x7f0000000140)='./file0\x00', 0x7400, 0xfff, &(0x7f0000000180)) [ 1972.472064][T10496] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1972.485601][T10493] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1972.526889][T10493] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1972.541089][T10496] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1972.562353][T10496] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1972.602160][T10493] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1972.612770][T10496] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 1972.633542][T10493] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 10:14:41 executing program 0: open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0xfffffffe, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x10001, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80046601, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40046602, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x21) getdents64(r1, &(0x7f0000000100)=""/230, 0xe6) 10:14:41 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100002b000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:14:41 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e6014c006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:14:42 executing program 5: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400c582f24186cf0d", @ANYRES32=r2, @ANYBLOB], 0x3}}, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x72, @empty, 0x80000}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 1973.204669][T10632] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1973.221332][T10632] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1973.255752][T10632] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1973.289164][T10535] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1973.337857][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1973.375642][T10535] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1973.428883][T10632] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 1973.435438][T10535] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1973.504006][T10535] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 10:14:50 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') getdents64(r0, &(0x7f00000005c0)=""/153, 0x99) getdents64(r0, &(0x7f0000000000)=""/186, 0xba) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r1, r1, &(0x7f0000000000), 0x0) ioctl$SNDRV_PCM_IOCTL_WRITEI_FRAMES(r1, 0x40184150, &(0x7f0000000180)={0x0, &(0x7f00000000c0)="568eca128ab5934b3dae2f0487126d79bc3ed62a319cf9975eaed1945c6097444eacb7b49788fa8c71495d2f334e94c6bfd333683446b546263084bb28a7f64dd1f80e3f4a46433b5fc359e39ef7f597d6fecb043a840316b20e558147c2fcef850c9012ad52b01e2b8a5861cde4a1a06d4fa917967916f4ce3f4d6c1c8dcf69e68380acb996c127b5078416bcb77a9539373867e7cff3ed0320b98224847f75ae9d4182598fa601e27f2612e13d783b1ad5ff1b9f69fca7fd47dc", 0xbb}) 10:14:50 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvram\x00', 0x80000, 0x0) r1 = open(&(0x7f0000000200)='./bus\x00', 0x141042, 0x10c) write$P9_RREADLINK(r1, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r2, r2, &(0x7f0000000000), 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r2, 0x8905, &(0x7f0000000140)) sendfile(r1, r1, &(0x7f0000000000), 0x0) ioctl$LOOP_SET_DIRECT_IO(r1, 0x4c08, 0x7) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000180)=0xffffffffffffffff, 0x4) 10:14:50 executing program 0: open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xfffffffe, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x10001, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80046601, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x21) getdents64(r1, &(0x7f0000000100)=""/230, 0xe6) 10:14:50 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100002d000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:14:50 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60160006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:14:50 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x1801}) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x800000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x8000002}, 0x1c) socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_GET(r3, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000000)=ANY=[@ANYBLOB="34001300", @ANYRES16=r4], 0x2}}, 0x0) sendmsg$DEVLINK_CMD_PORT_SET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40002000}, 0x54018481) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(0xffffffffffffffff, 0x800442d4, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) syz_open_dev$vivid(&(0x7f0000000180)='/dev/video#\x00', 0x1, 0x2) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') preadv(r5, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') preadv(r6, 0x0, 0x0, 0x6c00000000000000) syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) io_submit(0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_GET_MP_STATE(0xffffffffffffffff, 0x8004ae98, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2, 0x0, @rand_addr, 0x3}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) dup(0xffffffffffffffff) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000002480)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) 10:14:50 executing program 0: open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xfffffffe, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x10001, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x21) getdents64(r1, &(0x7f0000000100)=""/230, 0xe6) [ 1981.822970][T10665] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1981.854022][T10668] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1981.876896][T10665] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1981.898797][T10668] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1981.909166][T10665] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock 10:14:51 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x1801}) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x800000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x8000002}, 0x1c) socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_GET(r3, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000000)=ANY=[@ANYBLOB="34001300", @ANYRES16=r4], 0x2}}, 0x0) sendmsg$DEVLINK_CMD_PORT_SET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40002000}, 0x54018481) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(0xffffffffffffffff, 0x800442d4, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) syz_open_dev$vivid(&(0x7f0000000180)='/dev/video#\x00', 0x1, 0x2) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') preadv(r5, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') preadv(r6, 0x0, 0x0, 0x6c00000000000000) syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) io_submit(0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_GET_MP_STATE(0xffffffffffffffff, 0x8004ae98, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2, 0x0, @rand_addr, 0x3}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) dup(0xffffffffffffffff) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000002480)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) [ 1981.910160][T10668] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1981.940017][T10668] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 1981.968438][T10665] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 10:14:51 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60168006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:14:51 executing program 0: open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xfffffffe, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x21) getdents64(r1, &(0x7f0000000100)=""/230, 0xe6) 10:14:51 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) acct(&(0x7f0000000180)='./file0/file0\x00') ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000040)=0x401) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x5801, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) recvfrom$inet6(r0, &(0x7f0000000800)=""/4096, 0x1000, 0x40000000, 0x0, 0x0) ioctl$KVM_SET_ONE_REG(0xffffffffffffffff, 0x4010aeac, &(0x7f0000000140)={0xffff, 0x9}) 10:14:51 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100002e000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1982.389225][T10798] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1982.424090][T10798] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1982.449801][T10798] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1982.474690][T10798] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 1982.590409][T10812] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1982.608139][T10812] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1982.651914][T10812] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1982.665853][T10812] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 10:14:59 executing program 4: getpgid(0x0) r0 = getpgrp(0xffffffffffffffff) prlimit64(r0, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) syz_open_procfs(r0, &(0x7f00000000c0)='net/mcfilter\x00') fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0xc) r2 = syz_open_procfs(r1, &(0x7f0000000140)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') getdents64(r2, &(0x7f00000005c0)=""/153, 0x99) getdents64(r2, &(0x7f0000000000)=""/186, 0xba) 10:14:59 executing program 0: open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x21) getdents64(r1, &(0x7f0000000100)=""/230, 0xe6) 10:14:59 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x1801}) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x800000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x8000002}, 0x1c) socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_GET(r3, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000000)=ANY=[@ANYBLOB="34001300", @ANYRES16=r4], 0x2}}, 0x0) sendmsg$DEVLINK_CMD_PORT_SET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40002000}, 0x54018481) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(0xffffffffffffffff, 0x800442d4, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) syz_open_dev$vivid(&(0x7f0000000180)='/dev/video#\x00', 0x1, 0x2) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') preadv(r5, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') preadv(r6, 0x0, 0x0, 0x6c00000000000000) syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) io_submit(0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_GET_MP_STATE(0xffffffffffffffff, 0x8004ae98, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2, 0x0, @rand_addr, 0x3}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) dup(0xffffffffffffffff) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000002480)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) 10:14:59 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e6016c006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:14:59 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100002f000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:14:59 executing program 1: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) ptrace$pokeuser(0x6, r1, 0x388, 0xffffffffffffffff) ptrace$pokeuser(0x6, r1, 0x9, 0xffffffffffff8000) ptrace$pokeuser(0x6, r0, 0x388, 0xffffffffffffffff) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(0xffffffffffffffff, 0xc1105518, &(0x7f00000001c0)={{0x3, 0x5, 0x3, 0x800, '\x00', 0xfff}, 0x6, 0x8, 0x2, r0, 0x1, 0x2, 'syz1\x00', &(0x7f0000000180)=['Mvboxnet0]procmime_type\x00'], 0x18, [], [0x0, 0x6, 0x7, 0x20]}) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x2000) ioctl$KVM_GET_DIRTY_LOG(r2, 0x4010ae42, &(0x7f0000000140)={0x20006, 0x0, &(0x7f0000ffd000/0x1000)=nil}) syz_open_dev$audion(&(0x7f0000000300)='/dev/audio#\x00', 0x7, 0x0) [ 1990.043854][ T26] audit: type=1800 audit(1576836899.116:82): pid=10838 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.4" name="bus" dev="sda1" ino=16818 res=0 10:14:59 executing program 0: open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x21) getdents64(r1, &(0x7f0000000100)=""/230, 0xe6) [ 1990.322880][T10849] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1990.337091][T10853] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1990.347019][T10853] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1990.347735][T10849] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors 10:14:59 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x1801}) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x800000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x8000002}, 0x1c) socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_GET(r3, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000000)=ANY=[@ANYBLOB="34001300", @ANYRES16=r4], 0x2}}, 0x0) sendmsg$DEVLINK_CMD_PORT_SET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40002000}, 0x54018481) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(0xffffffffffffffff, 0x800442d4, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) syz_open_dev$vivid(&(0x7f0000000180)='/dev/video#\x00', 0x1, 0x2) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') preadv(r5, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') preadv(r6, 0x0, 0x0, 0x6c00000000000000) syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) io_submit(0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_GET_MP_STATE(0xffffffffffffffff, 0x8004ae98, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2, 0x0, @rand_addr, 0x3}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) dup(0xffffffffffffffff) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000002480)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) [ 1990.358031][T10853] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1990.388777][T10849] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1990.399088][T10853] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 1990.423757][T10849] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 10:14:59 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e601000030000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:14:59 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x21) getdents64(r1, &(0x7f0000000100)=""/230, 0xe6) 10:14:59 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60174006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:14:59 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xfffffffffffffc76, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x801, 0x0) [ 1991.012922][T10890] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1991.023130][T10890] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1991.035057][T10895] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1991.044911][T10895] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1991.059989][T10890] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1991.070133][T10895] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1991.088157][T10895] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 1991.097483][T10890] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 10:15:05 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') getdents64(r0, &(0x7f00000005c0)=""/153, 0x99) getdents64(0xffffffffffffffff, &(0x7f0000000000)=""/186, 0xba) 10:15:05 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x1801}) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x800000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x8000002}, 0x1c) socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_GET(r3, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000000)=ANY=[@ANYBLOB="34001300", @ANYRES16=r4], 0x2}}, 0x0) sendmsg$DEVLINK_CMD_PORT_SET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40002000}, 0x54018481) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(0xffffffffffffffff, 0x800442d4, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) syz_open_dev$vivid(&(0x7f0000000180)='/dev/video#\x00', 0x1, 0x2) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') preadv(r5, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') preadv(r6, 0x0, 0x0, 0x6c00000000000000) syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) io_submit(0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_GET_MP_STATE(0xffffffffffffffff, 0x8004ae98, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2, 0x0, @rand_addr, 0x3}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) dup(0xffffffffffffffff) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000002480)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 10:15:05 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x21) getdents64(r1, &(0x7f0000000100)=""/230, 0xe6) 10:15:05 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e6017a006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:15:05 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100004c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:15:05 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) r0 = getpgrp(0x0) syz_open_procfs$namespace(r0, &(0x7f0000000040)='ns/pid_for_children\x00') 10:15:05 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x21) getdents64(r1, &(0x7f0000000100)=""/230, 0xe6) 10:15:05 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x21) getdents64(r1, &(0x7f0000000100)=""/230, 0xe6) [ 1996.618971][T10926] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1996.645637][T10930] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1996.670124][T10926] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1996.680874][T10930] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 1996.685376][T10926] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock 10:15:05 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = getpgrp(0xffffffffffffffff) prlimit64(r0, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) syz_open_procfs(r0, &(0x7f00000000c0)='net/mcfilter\x00') r1 = syz_open_procfs(r0, &(0x7f0000000040)='io\x00') sendto$unix(r1, &(0x7f0000000140), 0x0, 0x400c814, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0xfffffffd, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1996.729345][T10926] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 1996.764293][T10930] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock 10:15:05 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x1801}) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x800000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x8000002}, 0x1c) socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_GET(r3, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000000)=ANY=[@ANYBLOB="34001300", @ANYRES16=r4], 0x2}}, 0x0) sendmsg$DEVLINK_CMD_PORT_SET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40002000}, 0x54018481) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(0xffffffffffffffff, 0x800442d4, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) syz_open_dev$vivid(&(0x7f0000000180)='/dev/video#\x00', 0x1, 0x2) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') preadv(r5, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') preadv(r6, 0x0, 0x0, 0x6c00000000000000) syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) io_submit(0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_GET_MP_STATE(0xffffffffffffffff, 0x8004ae98, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2, 0x0, @rand_addr, 0x3}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) dup(0xffffffffffffffff) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000002480)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) [ 1996.775245][T10930] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 10:15:05 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x21) getdents64(r0, &(0x7f0000000100)=""/230, 0xe6) 10:15:06 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x21) getdents64(r0, &(0x7f0000000100)=""/230, 0xe6) 10:15:14 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') getdents64(r0, &(0x7f00000005c0)=""/153, 0x99) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r1, r1, &(0x7f0000000000), 0x0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r2, r2, &(0x7f0000000000), 0x0) ioctl$RTC_WKALM_RD(r2, 0x80287010, &(0x7f0000000100)) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0xa) write$P9_RREADLINK(r3, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x0) getdents64(r3, &(0x7f0000000000)=""/186, 0xba) 10:15:14 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e601000058000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:15:14 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60148016c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:15:14 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x1801}) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x800000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x8000002}, 0x1c) socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_GET(r3, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000000)=ANY=[@ANYBLOB="34001300", @ANYRES16=r4], 0x2}}, 0x0) sendmsg$DEVLINK_CMD_PORT_SET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40002000}, 0x54018481) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(0xffffffffffffffff, 0x800442d4, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) syz_open_dev$vivid(&(0x7f0000000180)='/dev/video#\x00', 0x1, 0x2) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') preadv(r5, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') preadv(r6, 0x0, 0x0, 0x6c00000000000000) syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) io_submit(0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_GET_MP_STATE(0xffffffffffffffff, 0x8004ae98, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2, 0x0, @rand_addr, 0x3}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) dup(0xffffffffffffffff) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000002480)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 10:15:14 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x21) getdents64(r0, &(0x7f0000000100)=""/230, 0xe6) 10:15:14 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r0, r0, &(0x7f0000000000), 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x0, 0xd7, 0x4, 0x5, 0xff, 0x100}) 10:15:14 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = open(0x0, 0x0, 0x21) getdents64(r1, &(0x7f0000000100)=""/230, 0xe6) 10:15:15 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = open(0x0, 0x0, 0x21) getdents64(r1, &(0x7f0000000100)=""/230, 0xe6) [ 2006.034231][T11203] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2006.045555][T11203] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 2006.072849][T11203] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock 10:15:15 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = open(0x0, 0x0, 0x21) getdents64(r1, &(0x7f0000000100)=""/230, 0xe6) [ 2006.159355][T11203] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 2006.181232][T11194] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 10:15:15 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x1801}) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x800000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x8000002}, 0x1c) socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_GET(r3, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000000)=ANY=[@ANYBLOB="34001300", @ANYRES16=r4], 0x2}}, 0x0) sendmsg$DEVLINK_CMD_PORT_SET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40002000}, 0x54018481) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(0xffffffffffffffff, 0x800442d4, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) syz_open_dev$vivid(&(0x7f0000000180)='/dev/video#\x00', 0x1, 0x2) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') preadv(r5, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') preadv(r6, 0x0, 0x0, 0x6c00000000000000) syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) io_submit(0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_GET_MP_STATE(0xffffffffffffffff, 0x8004ae98, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2, 0x0, @rand_addr, 0x3}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) dup(0xffffffffffffffff) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000002480)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 10:15:15 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000100)=""/230, 0xe6) [ 2006.315278][T11194] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 2006.405388][T11194] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock 10:15:15 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x118400, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r1, r1, &(0x7f0000000000), 0x0) linkat(r0, &(0x7f0000000140)='./file0\x00', r1, &(0x7f0000000180)='./file0\x00', 0x400) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000100)=[{&(0x7f0000000200)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) [ 2006.451928][T11194] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 10:15:24 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xcd\x9e\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\x80\xa3P\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') getdents64(r0, &(0x7f00000005c0)=""/153, 0x99) getdents64(r0, &(0x7f0000000000)=""/186, 0xba) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000880)=ANY=[@ANYBLOB=':'], 0x1) sendfile(r1, r1, &(0x7f0000000000), 0x0) ioctl$SG_GET_TIMEOUT(r1, 0x2202, 0x0) ioctl$sock_inet_sctp_SIOCINQ(r0, 0x541b, &(0x7f00000000c0)) 10:15:24 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet_udp(0x2, 0x2, 0x0) io_setup(0x0, 0x0) io_submit(0x0, 0x0, 0x0) r0 = socket(0x2, 0x2, 0x0) r1 = open(&(0x7f0000b91ff9)='./file0\x00', 0x68042, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(r1, 0x0, 0xffff, 0x9) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000821ff0)={0x2, 0x4e20}, 0x10) sendfile(r0, r1, 0x0, 0x10001) io_setup(0xb, &(0x7f0000000040)=0x0) io_submit(r2, 0x0, &(0x7f0000000540)) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) 10:15:24 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000100)=""/230, 0xe6) 10:15:24 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100036c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:15:24 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x1801}) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x800000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x8000002}, 0x1c) socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_GET(r3, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000000)=ANY=[@ANYBLOB="34001300", @ANYRES16=r4], 0x2}}, 0x0) sendmsg$DEVLINK_CMD_PORT_SET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40002000}, 0x54018481) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(0xffffffffffffffff, 0x800442d4, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) syz_open_dev$vivid(&(0x7f0000000180)='/dev/video#\x00', 0x1, 0x2) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') preadv(r5, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') preadv(r6, 0x0, 0x0, 0x6c00000000000000) syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) io_submit(0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_GET_MP_STATE(0xffffffffffffffff, 0x8004ae98, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2, 0x0, @rand_addr, 0x3}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) dup(0xffffffffffffffff) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000002480)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 10:15:24 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100005c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 10:15:24 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000100)=""/230, 0xe6) 10:15:24 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x1801}) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x800000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x8000002}, 0x1c) socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_GET(r3, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000000)=ANY=[@ANYBLOB="34001300", @ANYRES16=r4], 0x2}}, 0x0) sendmsg$DEVLINK_CMD_PORT_SET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40002000}, 0x54018481) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(0xffffffffffffffff, 0x800442d4, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) syz_open_dev$vivid(&(0x7f0000000180)='/dev/video#\x00', 0x1, 0x2) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') preadv(r5, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') preadv(r6, 0x0, 0x0, 0x6c00000000000000) syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) io_submit(0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_GET_MP_STATE(0xffffffffffffffff, 0x8004ae98, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2, 0x0, @rand_addr, 0x3}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) dup(0xffffffffffffffff) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000002480)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 10:15:24 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000100)=""/230, 0xe6) [ 2015.269550][T11357] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2015.301124][T11357] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors 10:15:24 executing program 1: socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) ioctl$PPPIOCSNPMODE(0xffffffffffffffff, 0x4008744b, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r2 = creat(0x0, 0x0) r3 = creat(0x0, 0x1) write$binfmt_script(r3, 0x0, 0x0) close(0xffffffffffffffff) openat$cgroup_ro(r2, &(0x7f0000000300)='cpuset.memory_pressure\x00', 0x0, 0x0) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, 0x0) ioctl$TCSETXW(0xffffffffffffffff, 0x5435, 0x0) timerfd_settime(0xffffffffffffffff, 0x1, 0x0, 0x0) r4 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r4, &(0x7f0000000680)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300030000000000000000003800000000000000000000000000200002000000000000000000000003000000000000000000000000000000090000000000000000000000000000ff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000700ccfb5da7962e00"/296], 0x128) execveat(r4, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$EXT4_IOC_SETFLAGS(r4, 0x40086602, &(0x7f0000000100)=0x80011) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, &(0x7f00000000c0), 0xc) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000340)}], 0x1}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x5}, 0x0, 0x10003, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000000)=""/18, 0x12}], 0x1) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) memfd_create(&(0x7f0000000500)='/dev\x8aT\xc0_\xb7#\x10\x16 /sbin/init /etc/init.d/rc /sbin/startpar /etc/init.d/ssh /sbin/start-stop-daemon /usr/sbin/sshd /usr/sbin/sshd /bin/bash /root/syz-fuzzer /root/syz-executor.1 proc:/self/fd/8' not defined. 10:15:24 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x1801}) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x800000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x8000002}, 0x1c) socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_GET(r3, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000000)=ANY=[@ANYBLOB="34001300", @ANYRES16=r4], 0x2}}, 0x0) sendmsg$DEVLINK_CMD_PORT_SET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40002000}, 0x54018481) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(0xffffffffffffffff, 0x800442d4, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) syz_open_dev$vivid(&(0x7f0000000180)='/dev/video#\x00', 0x1, 0x2) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') preadv(r5, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') preadv(r6, 0x0, 0x0, 0x6c00000000000000) syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) io_submit(0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_GET_MP_STATE(0xffffffffffffffff, 0x8004ae98, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2, 0x0, @rand_addr, 0x3}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) dup(0xffffffffffffffff) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000002480)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) [ 2015.602432][ T3991] ================================================================== [ 2015.610581][ T3991] BUG: KCSAN: data-race in common_perm_cond / kernfs_refresh_inode [ 2015.618462][ T3991] [ 2015.620797][ T3991] read to 0xffff8880b80d4cf8 of 2 bytes by task 11206 on cpu 0: [ 2015.628429][ T3991] common_perm_cond+0x74/0x110 [ 2015.633196][ T3991] apparmor_inode_getattr+0x2b/0x40 [ 2015.638401][ T3991] security_inode_getattr+0x9b/0xd0 [ 2015.643605][ T3991] vfs_getattr+0x2e/0x70 [ 2015.647851][ T3991] vfs_statx+0x102/0x190 [ 2015.652099][ T3991] __do_sys_newstat+0x51/0xb0 [ 2015.656778][ T3991] __x64_sys_newstat+0x3a/0x50 [ 2015.661548][ T3991] do_syscall_64+0xcc/0x3a0 [ 2015.666063][ T3991] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2015.671935][ T3991] [ 2015.674257][ T3991] write to 0xffff8880b80d4cf8 of 2 bytes by task 3991 on cpu 1: [ 2015.681888][ T3991] kernfs_refresh_inode+0x42/0x140 [ 2015.687007][ T3991] kernfs_iop_getattr+0x68/0x90 [ 2015.691862][ T3991] vfs_getattr_nosec+0x12e/0x170 [ 2015.696797][ T3991] vfs_getattr+0x54/0x70 [ 2015.701049][ T3991] vfs_statx+0x102/0x190 [ 2015.705296][ T3991] __do_sys_newstat+0x51/0xb0 [ 2015.709982][ T3991] __x64_sys_newstat+0x3a/0x50 [ 2015.714753][ T3991] do_syscall_64+0xcc/0x3a0 [ 2015.719272][ T3991] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2015.725154][ T3991] [ 2015.727480][ T3991] Reported by Kernel Concurrency Sanitizer on: [ 2015.733648][ T3991] CPU: 1 PID: 3991 Comm: udevd Not tainted 5.5.0-rc1-syzkaller #0 [ 2015.741451][ T3991] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2015.751512][ T3991] ================================================================== [ 2015.759580][ T3991] Kernel panic - not syncing: panic_on_warn set ... [ 2015.766297][ T3991] CPU: 1 PID: 3991 Comm: udevd Not tainted 5.5.0-rc1-syzkaller #0 [ 2015.774099][ T3991] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2015.784162][ T3991] Call Trace: [ 2015.787464][ T3991] dump_stack+0x11d/0x181 [ 2015.791803][ T3991] panic+0x210/0x640 [ 2015.795709][ T3991] ? vprintk_func+0x8d/0x140 [ 2015.800301][ T3991] kcsan_report.cold+0xc/0xd [ 2015.804907][ T3991] kcsan_setup_watchpoint+0x3fe/0x460 [ 2015.810288][ T3991] __tsan_unaligned_write2+0xc7/0x110 [ 2015.815811][ T3991] kernfs_refresh_inode+0x42/0x140 [ 2015.820945][ T3991] kernfs_iop_getattr+0x68/0x90 [ 2015.825808][ T3991] vfs_getattr_nosec+0x12e/0x170 [ 2015.830764][ T3991] ? kernfs_refresh_inode+0x140/0x140 [ 2015.836152][ T3991] vfs_getattr+0x54/0x70 [ 2015.840408][ T3991] vfs_statx+0x102/0x190 [ 2015.844708][ T3991] __do_sys_newstat+0x51/0xb0 [ 2015.849404][ T3991] __x64_sys_newstat+0x3a/0x50 [ 2015.854179][ T3991] do_syscall_64+0xcc/0x3a0 [ 2015.858695][ T3991] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2015.864589][ T3991] RIP: 0033:0x7f94306efc65 [ 2015.869018][ T3991] Code: 00 00 00 e8 5d 01 00 00 48 83 c4 18 c3 90 90 90 90 90 90 90 90 83 ff 01 48 89 f0 77 18 48 89 c7 48 89 d6 b8 04 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 17 f3 c3 90 48 8b 05 a1 51 2b 00 64 c7 00 16 [ 2015.888630][ T3991] RSP: 002b:00007ffc5668bb48 EFLAGS: 00000246 ORIG_RAX: 0000000000000004 [ 2015.897053][ T3991] RAX: ffffffffffffffda RBX: 00000000019b1250 RCX: 00007f94306efc65 [ 2015.907377][ T3991] RDX: 00007ffc5668bb60 RSI: 00007ffc5668bb60 RDI: 00007ffc5668bff0 [ 2015.915351][ T3991] RBP: 00007ffc5668c450 R08: 000000000041f4f1 R09: 00007f94307467d0 [ 2015.923325][ T3991] R10: 7269762f73656369 R11: 0000000000000246 R12: 0000000000000004 [ 2015.931293][ T3991] R13: 00007ffc5668c457 R14: 00000000019b14b0 R15: 00000000019b1250 [ 2015.940800][ T3991] Kernel Offset: disabled [ 2015.945144][ T3991] Rebooting in 86400 seconds..