0)) r7 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f00000001c0)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICLIST(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000380)={0xb4, r7, 0xc08, 0x70bd27, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @remote}, @NLBL_UNLABEL_A_SECCTX={0x25, 0x7, 'system_u:object_r:getty_etc_t:s0\x00'}, @NLBL_UNLABEL_A_ACPTFLG={0x5}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @remote}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @loopback}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @mcast1}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @mcast2}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'batadv0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @multicast1}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @multicast1}]}, 0xb4}, 0x1, 0x0, 0x0, 0xc0}, 0x4) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r6, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x40010}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, r7, 0x1, 0x70bd2a, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x8041) sendmsg$nl_route(r5, &(0x7f0000001fc0)={&(0x7f0000001ec0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001f80)={&(0x7f0000001f00)=@bridge_newneigh={0x50, 0x1c, 0x200, 0x70bd26, 0x25dfdbff, {0x7, 0x0, 0x0, 0x0, 0x8, 0x2}, [@NDA_LINK_NETNSID={0x8, 0xa, 0x4}, @NDA_CACHEINFO={0x14, 0x3, {0x9, 0x5, 0x3, 0x400}}, @NDA_SRC_VNI={0x8, 0xb, 0x401}, @NDA_SRC_VNI={0x8, 0xb, 0x200}, @NDA_LINK_NETNSID={0x8, 0xa, 0x2}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000}, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10001204}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x3c, r7, 0x0, 0x70bd2b, 0x25dfdbfe, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @mcast2}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4040080}, 0x8804) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) [ 2199.401961][ T5001] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2199.436552][ T5001] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 05:59:50 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3, &(0x7f00000008c0)=[{&(0x7f00000000c0)="8000000038040000197a0300e60100006c008001000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x3ff8000000000}, {&(0x7f00000005c0)="b4065f2ab9075ba253e109154559f88f062320246c5ae74af8e236a42c0cd0b73085bf4313acfd026684e3be45cf8f03379864cd059401666557f67127a057d2cb8d6521890c5cbfe5eaf821257dfacfaf5ef8b4c06e941318d3eec42a910d1420306249520086172e5e2f0c2308655d2a82735e431f158af85763d2d76375e78b343d563d952660c79ecfad7ccb16689bcb4fed9533483595eb30e2671cd545", 0xa0, 0x4}], 0x4803, 0x0) [ 2199.507884][ T5001] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2199.533562][ T5001] EXT4-fs: failed to create workqueue [ 2199.539415][ T5001] EXT4-fs (loop3): mount failed [ 2199.744543][ T5057] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2199.757712][ T5057] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2199.779370][ T5057] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2199.804882][ T5057] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 2199.867818][ T5057] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 2199.874377][ T5057] EXT4-fs (loop3): mount failed [ 2199.919132][ T5057] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2199.928992][ T5057] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2199.939892][ T5057] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2199.961322][ T5057] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 2199.975148][ T5057] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 2199.981647][ T5057] EXT4-fs (loop3): mount failed 05:59:53 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 05:59:53 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3, &(0x7f00000008c0)=[{&(0x7f00000000c0)="8000000038040000197a0300e60100006c00e101000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x3ff8000000000}, {&(0x7f00000005c0)="b4065f2ab9075ba253e109154559f88f062320246c5ae74af8e236a42c0cd0b73085bf4313acfd026684e3be45cf8f03379864cd059401666557f67127a057d2cb8d6521890c5cbfe5eaf821257dfacfaf5ef8b4c06e941318d3eec42a910d1420306249520086172e5e2f0c2308655d2a82735e431f158af85763d2d76375e78b343d563d952660c79ecfad7ccb16689bcb4fed9533483595eb30e2671cd545", 0xa0, 0x4}], 0x4803, 0x0) 05:59:53 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0xa0008000) 05:59:53 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000000000000010000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 05:59:53 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="0201a5ffffff00090000ff07000080ffffff000000000000000100000001000100ff81000004800000000a0000000005000042000000000000000000000055aa", 0x40, 0x1c0}]) r0 = socket$tipc(0x1e, 0x5, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x802, 0x0) statfs(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=""/54) unshare(0x400) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000040)) pselect6(0x40, &(0x7f0000000000)={0x8}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) write$cgroup_int(r1, &(0x7f0000000200), 0x12) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x220d82, 0x0) fchown(r2, 0x0, 0x0) r3 = accept(0xffffffffffffffff, &(0x7f00000001c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000000c0)=0x80) r4 = socket(0x200000000000011, 0x4000000000080002, 0xdd86) bind$packet(r4, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendmmsg$inet(r4, &(0x7f0000002b00)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="96c6322ea684879088175969ec15e10d40e4719016cbc15a36a88c6c843e12b1f5cb6a73613ceec274", 0x33}], 0x1, 0x0, 0x0, 0x534}}], 0x40001c0, 0x0) recvmmsg(r4, &(0x7f0000003fc0)=[{{&(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, 0x80, &(0x7f00000015c0)=[{&(0x7f0000000180)=""/157, 0x9d}, {&(0x7f0000000240)=""/242, 0xf2}, {&(0x7f0000000380)=""/22, 0x16}, {&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000001500)=""/186, 0xba}, {&(0x7f00000003c0)=""/18, 0x12}], 0x6, &(0x7f0000001640)=""/131, 0x83}, 0x9}, {{&(0x7f0000001700)=@nl=@unspec, 0x80, &(0x7f0000001d40)=[{&(0x7f0000001780)=""/69, 0x45}, {&(0x7f0000001800)=""/247, 0xf7}, {&(0x7f0000001900)=""/20, 0x14}, {&(0x7f0000001940)=""/15, 0xf}, {&(0x7f0000001980)=""/82, 0x52}, {&(0x7f0000001a00)=""/115, 0x73}, {&(0x7f0000001a80)=""/90, 0x5a}, {0x0}, {&(0x7f0000001bc0)=""/146, 0x92}, {&(0x7f0000001c80)=""/137, 0x89}], 0xa}, 0x20}, {{&(0x7f0000001e00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}, 0x7}, {{&(0x7f00000020c0)=@l2, 0x80, &(0x7f0000002580)=[{&(0x7f0000002140)=""/103, 0x67}, {&(0x7f00000021c0)=""/170, 0xaa}, {&(0x7f0000002280)=""/144, 0x90}, {&(0x7f0000002340)=""/172, 0xac}, {&(0x7f0000002480)=""/197, 0xc5}], 0x5, &(0x7f0000002600)=""/199, 0xc7}, 0xfffffffa}, {{&(0x7f0000002700)=@nfc_llcp, 0x80, 0x0}, 0xffffffc0}, {{&(0x7f0000003d00)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000003f00)=[{0x0}, {&(0x7f0000003e00)=""/216, 0xd8}], 0x2}}], 0x6, 0x1, &(0x7f0000004140)) r7 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f00000001c0)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICLIST(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000380)={0xb4, r7, 0xc08, 0x70bd27, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @remote}, @NLBL_UNLABEL_A_SECCTX={0x25, 0x7, 'system_u:object_r:getty_etc_t:s0\x00'}, @NLBL_UNLABEL_A_ACPTFLG={0x5}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @remote}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @loopback}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @mcast1}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @mcast2}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'batadv0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @multicast1}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @multicast1}]}, 0xb4}, 0x1, 0x0, 0x0, 0xc0}, 0x4) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r6, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x40010}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, r7, 0x1, 0x70bd2a, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x8041) sendmsg$nl_route(r5, &(0x7f0000001fc0)={&(0x7f0000001ec0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001f80)={&(0x7f0000001f00)=@bridge_newneigh={0x50, 0x1c, 0x200, 0x70bd26, 0x25dfdbff, {0x7, 0x0, 0x0, 0x0, 0x8, 0x2}, [@NDA_LINK_NETNSID={0x8, 0xa, 0x4}, @NDA_CACHEINFO={0x14, 0x3, {0x9, 0x5, 0x3, 0x400}}, @NDA_SRC_VNI={0x8, 0xb, 0x401}, @NDA_SRC_VNI={0x8, 0xb, 0x200}, @NDA_LINK_NETNSID={0x8, 0xa, 0x2}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000}, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10001204}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x3c, r7, 0x0, 0x70bd2b, 0x25dfdbfe, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @mcast2}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4040080}, 0x8804) 05:59:53 executing program 5: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="0201a5ffffff00090000ff07000080ffffff000000000000000100000001000100ff81000004800000000a0000000005000042000000000000000000000055aa", 0x40, 0x1c0}]) r0 = socket$tipc(0x1e, 0x5, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x802, 0x0) statfs(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=""/54) unshare(0x400) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000040)) pselect6(0x40, &(0x7f0000000000)={0x8}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) write$cgroup_int(r1, &(0x7f0000000200), 0x12) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x220d82, 0x0) fchown(r2, 0x0, 0x0) r3 = accept(0xffffffffffffffff, &(0x7f00000001c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000000c0)=0x80) r4 = socket(0x200000000000011, 0x4000000000080002, 0xdd86) bind$packet(r4, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendmmsg$inet(r4, &(0x7f0000002b00)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="96c6322ea684879088175969ec15e10d40e4719016cbc15a36a88c6c843e12b1f5cb6a73613ceec274", 0x33}], 0x1, 0x0, 0x0, 0x534}}], 0x40001c0, 0x0) recvmmsg(r4, &(0x7f0000003fc0)=[{{&(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, 0x80, &(0x7f00000015c0)=[{&(0x7f0000000180)=""/157, 0x9d}, {&(0x7f0000000240)=""/242, 0xf2}, {&(0x7f0000000380)=""/22, 0x16}, {&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000001500)=""/186, 0xba}, {&(0x7f00000003c0)=""/18, 0x12}], 0x6, &(0x7f0000001640)=""/131, 0x83}, 0x9}, {{&(0x7f0000001700)=@nl=@unspec, 0x80, &(0x7f0000001d40)=[{&(0x7f0000001780)=""/69, 0x45}, {&(0x7f0000001800)=""/247, 0xf7}, {&(0x7f0000001900)=""/20, 0x14}, {&(0x7f0000001940)=""/15, 0xf}, {&(0x7f0000001980)=""/82, 0x52}, {&(0x7f0000001a00)=""/115, 0x73}, {&(0x7f0000001a80)=""/90, 0x5a}, {0x0}, {&(0x7f0000001bc0)=""/146, 0x92}, {&(0x7f0000001c80)=""/137, 0x89}], 0xa}, 0x20}, {{&(0x7f0000001e00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}, 0x7}, {{&(0x7f00000020c0)=@l2, 0x80, &(0x7f0000002580)=[{&(0x7f0000002140)=""/103, 0x67}, {&(0x7f00000021c0)=""/170, 0xaa}, {&(0x7f0000002280)=""/144, 0x90}, {&(0x7f0000002340)=""/172, 0xac}, {&(0x7f0000002480)=""/197, 0xc5}], 0x5, &(0x7f0000002600)=""/199, 0xc7}, 0xfffffffa}, {{&(0x7f0000002700)=@nfc_llcp, 0x80, 0x0}, 0xffffffc0}, {{&(0x7f0000003d00)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000003f00)=[{0x0}, {&(0x7f0000003e00)=""/216, 0xd8}], 0x2}}], 0x6, 0x1, &(0x7f0000004140)) r7 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f00000001c0)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICLIST(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000380)={0xb4, r7, 0xc08, 0x70bd27, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @remote}, @NLBL_UNLABEL_A_SECCTX={0x25, 0x7, 'system_u:object_r:getty_etc_t:s0\x00'}, @NLBL_UNLABEL_A_ACPTFLG={0x5}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @remote}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @loopback}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @mcast1}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @mcast2}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'batadv0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @multicast1}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @multicast1}]}, 0xb4}, 0x1, 0x0, 0x0, 0xc0}, 0x4) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r6, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x40010}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, r7, 0x1, 0x70bd2a, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x8041) sendmsg$nl_route(r5, &(0x7f0000001fc0)={&(0x7f0000001ec0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001f80)={&(0x7f0000001f00)=@bridge_newneigh={0x50, 0x1c, 0x200, 0x70bd26, 0x25dfdbff, {0x7, 0x0, 0x0, 0x0, 0x8, 0x2}, [@NDA_LINK_NETNSID={0x8, 0xa, 0x4}, @NDA_CACHEINFO={0x14, 0x3, {0x9, 0x5, 0x3, 0x400}}, @NDA_SRC_VNI={0x8, 0xb, 0x401}, @NDA_SRC_VNI={0x8, 0xb, 0x200}, @NDA_LINK_NETNSID={0x8, 0xa, 0x2}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000}, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10001204}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x3c, r7, 0x0, 0x70bd2b, 0x25dfdbfe, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @mcast2}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4040080}, 0x8804) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r8, 0x40086602, 0x400007) [ 2202.107416][ T5075] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2202.121072][ T22] kauditd_printk_skb: 314 callbacks suppressed [ 2202.121080][ T22] audit: type=1400 audit(1579672793.195:336850): avc: denied { map } for pid=5081 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 05:59:53 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000000000000020000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2202.138315][ T5075] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2202.163057][ T22] audit: type=1400 audit(1579672793.225:336851): avc: denied { map } for pid=5081 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2202.173020][ T5075] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2202.208416][ T5077] loop5: p1 p2 p3 [ 2202.212650][ T22] audit: type=1400 audit(1579672793.225:336852): avc: denied { map } for pid=5081 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2202.222225][ T5077] loop5: p1 start 2304 is beyond EOD, truncated 05:59:53 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="0201a5ffffff00090000ff07000080ffffff000000000000000100000001000100ff81000004800000000a0000000005000042000000000000000000000055aa", 0x40, 0x1c0}]) r0 = socket$tipc(0x1e, 0x5, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x802, 0x0) statfs(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=""/54) unshare(0x400) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000040)) pselect6(0x40, &(0x7f0000000000)={0x8}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) write$cgroup_int(r1, &(0x7f0000000200), 0x12) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x220d82, 0x0) fchown(r2, 0x0, 0x0) accept(0xffffffffffffffff, &(0x7f00000001c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000000c0)=0x80) r3 = socket(0x200000000000011, 0x4000000000080002, 0xdd86) bind$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendmmsg$inet(r3, &(0x7f0000002b00)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="96c6322ea684879088175969ec15e10d40e4719016cbc15a36a88c6c843e12b1f5cb6a73613ceec274", 0x33}], 0x1, 0x0, 0x0, 0x534}}], 0x40001c0, 0x0) recvmmsg(r3, &(0x7f0000003fc0)=[{{&(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, 0x80, &(0x7f00000015c0)=[{&(0x7f0000000180)=""/157, 0x9d}, {&(0x7f0000000240)=""/242, 0xf2}, {&(0x7f0000000380)=""/22, 0x16}, {&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000001500)=""/186, 0xba}, {&(0x7f00000003c0)=""/18, 0x12}], 0x6, &(0x7f0000001640)=""/131, 0x83}, 0x9}, {{&(0x7f0000001700)=@nl=@unspec, 0x80, &(0x7f0000001d40)=[{&(0x7f0000001780)=""/69, 0x45}, {&(0x7f0000001800)=""/247, 0xf7}, {&(0x7f0000001900)=""/20, 0x14}, {&(0x7f0000001940)=""/15, 0xf}, {&(0x7f0000001980)=""/82, 0x52}, {&(0x7f0000001a00)=""/115, 0x73}, {&(0x7f0000001a80)=""/90, 0x5a}, {0x0}, {&(0x7f0000001bc0)=""/146, 0x92}, {&(0x7f0000001c80)=""/137, 0x89}], 0xa}, 0x20}, {{&(0x7f0000001e00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}, 0x7}, {{&(0x7f00000020c0)=@l2, 0x80, &(0x7f0000002580)=[{&(0x7f0000002140)=""/103, 0x67}, {&(0x7f00000021c0)=""/170, 0xaa}, {&(0x7f0000002280)=""/144, 0x90}, {&(0x7f0000002340)=""/172, 0xac}, {&(0x7f0000002480)=""/197, 0xc5}], 0x5, &(0x7f0000002600)=""/199, 0xc7}, 0xfffffffa}, {{&(0x7f0000002700)=@nfc_llcp, 0x80, 0x0}, 0xffffffc0}, {{&(0x7f0000003d00)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000003f00)=[{0x0}, {&(0x7f0000003e00)=""/216, 0xd8}], 0x2}}], 0x6, 0x1, &(0x7f0000004140)) r6 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f00000001c0)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICLIST(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000380)={0xb4, r6, 0xc08, 0x70bd27, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @remote}, @NLBL_UNLABEL_A_SECCTX={0x25, 0x7, 'system_u:object_r:getty_etc_t:s0\x00'}, @NLBL_UNLABEL_A_ACPTFLG={0x5}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @remote}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @loopback}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @mcast1}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @mcast2}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'batadv0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @multicast1}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @multicast1}]}, 0xb4}, 0x1, 0x0, 0x0, 0xc0}, 0x4) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r5, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x40010}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, r6, 0x1, 0x70bd2a, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x8041) sendmsg$nl_route(r4, &(0x7f0000001fc0)={&(0x7f0000001ec0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001f80)={&(0x7f0000001f00)=@bridge_newneigh={0x50, 0x1c, 0x200, 0x70bd26, 0x25dfdbff, {0x7, 0x0, 0x0, 0x0, 0x8, 0x2}, [@NDA_LINK_NETNSID={0x8, 0xa, 0x4}, @NDA_CACHEINFO={0x14, 0x3, {0x9, 0x5, 0x3, 0x400}}, @NDA_SRC_VNI={0x8, 0xb, 0x401}, @NDA_SRC_VNI={0x8, 0xb, 0x200}, @NDA_LINK_NETNSID={0x8, 0xa, 0x2}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000}, 0x10) [ 2202.249808][ T22] audit: type=1400 audit(1579672793.225:336853): avc: denied { map } for pid=5081 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2202.274698][ T22] audit: type=1400 audit(1579672793.225:336854): avc: denied { map } for pid=5081 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 05:59:53 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0xfeffffff) [ 2202.307553][ T22] audit: type=1400 audit(1579672793.225:336855): avc: denied { map } for pid=5081 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2202.351094][ T22] audit: type=1400 audit(1579672793.225:336856): avc: denied { map } for pid=5081 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2202.361831][ T5077] loop5: p2 start 16777216 is beyond EOD, truncated [ 2202.387559][ T5075] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 2202.394181][ T22] audit: type=1400 audit(1579672793.225:336857): avc: denied { map } for pid=5081 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2202.401605][ T5077] loop5: p3 start 128 is beyond EOD, truncated 05:59:53 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000000000000040000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2202.425457][ T22] audit: type=1400 audit(1579672793.225:336858): avc: denied { map } for pid=5081 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2202.433906][ T5075] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 2202.457122][ T22] audit: type=1400 audit(1579672793.225:336859): avc: denied { map } for pid=5081 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 05:59:53 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000000000000060000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2202.522840][ T5075] EXT4-fs (loop3): mount failed 05:59:53 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000000000000080000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2202.664313][ T5075] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2202.700026][ T5075] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2202.718432][ T5075] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2202.738836][ T5075] EXT4-fs: failed to create workqueue [ 2202.744398][ T5075] EXT4-fs (loop3): mount failed 05:59:56 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000000000006080000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 05:59:56 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x4, 0x0) 05:59:56 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3, &(0x7f00000008c0)=[{&(0x7f00000000c0)="8000000038040000197a0300e60100006c00f301000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x3ff8000000000}, {&(0x7f00000005c0)="b4065f2ab9075ba253e109154559f88f062320246c5ae74af8e236a42c0cd0b73085bf4313acfd026684e3be45cf8f03379864cd059401666557f67127a057d2cb8d6521890c5cbfe5eaf821257dfacfaf5ef8b4c06e941318d3eec42a910d1420306249520086172e5e2f0c2308655d2a82735e431f158af85763d2d76375e78b343d563d952660c79ecfad7ccb16689bcb4fed9533483595eb30e2671cd545", 0xa0, 0x4}], 0x4803, 0x0) 05:59:56 executing program 5: sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2}, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x0, 0x1f4}}], 0x1, 0x100, 0x0) r1 = socket(0x11, 0x7a927167a04eaea8, 0xff) ioctl$sock_SIOCGSKNS(r1, 0x894c, &(0x7f00000003c0)) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x24000010}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES32], 0x2}}, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCL_SETVESABLANK(r7, 0x541c, &(0x7f0000000380)) r8 = socket(0x6, 0xa, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r9 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f00000002c0)={0x5, &(0x7f0000000140)=[{0x101, 0x80, 0x47, 0xa0000}, {0xf800, 0x8b, 0x0, 0x2}, {0x4f40, 0x3f, 0x81, 0xfff}, {0x9, 0x0, 0x81, 0xffffffff}, {0x7, 0x2, 0x5, 0x3f}]}) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r10, 0x6628, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000400)=[r3, r2, r0, 0xffffffffffffffff, r4, r6, r3, r0, 0xffffffffffffffff, r9, r4, r4, r10], 0xd) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000005c0)=ANY=[@ANYBLOB="380000001000050700"/20, @ANYRES32, @ANYBLOB="00000016010000001800120008000100736974000c00020008000300", @ANYRES32], 0x38}}, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={@loopback={0xfec0ffff00000000}}) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)=0x2) 05:59:56 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0xff600000) 05:59:56 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="0201a5ffffff00090000ff07000080ffffff000000000000000100000001000100ff81000004800000000a0000000005000042000000000000000000000055aa", 0x40, 0x1c0}]) r0 = socket$tipc(0x1e, 0x5, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x802, 0x0) statfs(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=""/54) unshare(0x400) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000040)) pselect6(0x40, &(0x7f0000000000)={0x8}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) write$cgroup_int(r1, &(0x7f0000000200), 0x12) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x220d82, 0x0) fchown(r2, 0x0, 0x0) accept(0xffffffffffffffff, &(0x7f00000001c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000000c0)=0x80) r3 = socket(0x200000000000011, 0x4000000000080002, 0xdd86) bind$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendmmsg$inet(r3, &(0x7f0000002b00)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="96c6322ea684879088175969ec15e10d40e4719016cbc15a36a88c6c843e12b1f5cb6a73613ceec274", 0x33}], 0x1, 0x0, 0x0, 0x534}}], 0x40001c0, 0x0) recvmmsg(r3, &(0x7f0000003fc0)=[{{&(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, 0x80, &(0x7f00000015c0)=[{&(0x7f0000000180)=""/157, 0x9d}, {&(0x7f0000000240)=""/242, 0xf2}, {&(0x7f0000000380)=""/22, 0x16}, {&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000001500)=""/186, 0xba}, {&(0x7f00000003c0)=""/18, 0x12}], 0x6, &(0x7f0000001640)=""/131, 0x83}, 0x9}, {{&(0x7f0000001700)=@nl=@unspec, 0x80, &(0x7f0000001d40)=[{&(0x7f0000001780)=""/69, 0x45}, {&(0x7f0000001800)=""/247, 0xf7}, {&(0x7f0000001900)=""/20, 0x14}, {&(0x7f0000001940)=""/15, 0xf}, {&(0x7f0000001980)=""/82, 0x52}, {&(0x7f0000001a00)=""/115, 0x73}, {&(0x7f0000001a80)=""/90, 0x5a}, {0x0}, {&(0x7f0000001bc0)=""/146, 0x92}, {&(0x7f0000001c80)=""/137, 0x89}], 0xa}, 0x20}, {{&(0x7f0000001e00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}, 0x7}, {{&(0x7f00000020c0)=@l2, 0x80, &(0x7f0000002580)=[{&(0x7f0000002140)=""/103, 0x67}, {&(0x7f00000021c0)=""/170, 0xaa}, {&(0x7f0000002280)=""/144, 0x90}, {&(0x7f0000002340)=""/172, 0xac}, {&(0x7f0000002480)=""/197, 0xc5}], 0x5, &(0x7f0000002600)=""/199, 0xc7}, 0xfffffffa}, {{&(0x7f0000002700)=@nfc_llcp, 0x80, 0x0}, 0xffffffc0}, {{&(0x7f0000003d00)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000003f00)=[{0x0}, {&(0x7f0000003e00)=""/216, 0xd8}], 0x2}}], 0x6, 0x1, &(0x7f0000004140)) r5 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f00000001c0)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICLIST(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000380)={0xb4, r5, 0xc08, 0x70bd27, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @remote}, @NLBL_UNLABEL_A_SECCTX={0x25, 0x7, 'system_u:object_r:getty_etc_t:s0\x00'}, @NLBL_UNLABEL_A_ACPTFLG={0x5}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @remote}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @loopback}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @mcast1}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @mcast2}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'batadv0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @multicast1}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @multicast1}]}, 0xb4}, 0x1, 0x0, 0x0, 0xc0}, 0x4) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r4, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x40010}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, r5, 0x1, 0x70bd2a, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x8041) 05:59:56 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe80000000000000000d0000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2205.190199][ T5128] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2205.214542][ T5128] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2205.225775][ T5128] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock 05:59:56 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe80000000000000001f0000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2205.236965][ T5128] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 2205.264983][ T5128] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 2205.283542][ T5128] EXT4-fs (loop3): mount failed 05:59:56 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0xfffffffe) 05:59:56 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000000000000280000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 05:59:56 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="0201a5ffffff00090000ff07000080ffffff000000000000000100000001000100ff81000004800000000a0000000005000042000000000000000000000055aa", 0x40, 0x1c0}]) r0 = socket$tipc(0x1e, 0x5, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x802, 0x0) statfs(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=""/54) unshare(0x400) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000040)) pselect6(0x40, &(0x7f0000000000)={0x8}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) write$cgroup_int(r1, &(0x7f0000000200), 0x12) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x220d82, 0x0) fchown(r2, 0x0, 0x0) accept(0xffffffffffffffff, &(0x7f00000001c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000000c0)=0x80) r3 = socket(0x200000000000011, 0x4000000000080002, 0xdd86) bind$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendmmsg$inet(r3, &(0x7f0000002b00)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="96c6322ea684879088175969ec15e10d40e4719016cbc15a36a88c6c843e12b1f5cb6a73613ceec274", 0x33}], 0x1, 0x0, 0x0, 0x534}}], 0x40001c0, 0x0) recvmmsg(r3, &(0x7f0000003fc0)=[{{&(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, 0x80, &(0x7f00000015c0)=[{&(0x7f0000000180)=""/157, 0x9d}, {&(0x7f0000000240)=""/242, 0xf2}, {&(0x7f0000000380)=""/22, 0x16}, {&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000001500)=""/186, 0xba}, {&(0x7f00000003c0)=""/18, 0x12}], 0x6, &(0x7f0000001640)=""/131, 0x83}, 0x9}, {{&(0x7f0000001700)=@nl=@unspec, 0x80, &(0x7f0000001d40)=[{&(0x7f0000001780)=""/69, 0x45}, {&(0x7f0000001800)=""/247, 0xf7}, {&(0x7f0000001900)=""/20, 0x14}, {&(0x7f0000001940)=""/15, 0xf}, {&(0x7f0000001980)=""/82, 0x52}, {&(0x7f0000001a00)=""/115, 0x73}, {&(0x7f0000001a80)=""/90, 0x5a}, {0x0}, {&(0x7f0000001bc0)=""/146, 0x92}, {&(0x7f0000001c80)=""/137, 0x89}], 0xa}, 0x20}, {{&(0x7f0000001e00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}, 0x7}, {{&(0x7f00000020c0)=@l2, 0x80, &(0x7f0000002580)=[{&(0x7f0000002140)=""/103, 0x67}, {&(0x7f00000021c0)=""/170, 0xaa}, {&(0x7f0000002280)=""/144, 0x90}, {&(0x7f0000002340)=""/172, 0xac}, {&(0x7f0000002480)=""/197, 0xc5}], 0x5, &(0x7f0000002600)=""/199, 0xc7}, 0xfffffffa}, {{&(0x7f0000002700)=@nfc_llcp, 0x80, 0x0}, 0xffffffc0}, {{&(0x7f0000003d00)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000003f00)=[{0x0}, {&(0x7f0000003e00)=""/216, 0xd8}], 0x2}}], 0x6, 0x1, &(0x7f0000004140)) r4 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f00000001c0)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICLIST(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000380)={0xb4, r4, 0xc08, 0x70bd27, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @remote}, @NLBL_UNLABEL_A_SECCTX={0x25, 0x7, 'system_u:object_r:getty_etc_t:s0\x00'}, @NLBL_UNLABEL_A_ACPTFLG={0x5}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @remote}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @loopback}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @mcast1}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @mcast2}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'batadv0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @multicast1}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @multicast1}]}, 0xb4}, 0x1, 0x0, 0x0, 0xc0}, 0x4) 05:59:56 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x2000, 0x0) [ 2205.385202][ T5128] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2205.411290][ T5128] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 05:59:56 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000000000000290000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 05:59:56 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x200000000000) [ 2205.495723][ T5128] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2205.519466][ T5128] EXT4-fs: failed to create workqueue [ 2205.530492][ T5128] EXT4-fs (loop3): mount failed 05:59:56 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3, &(0x7f00000008c0)=[{&(0x7f00000000c0)="8000000038040000197a0300e60100006c000402000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x3ff8000000000}, {&(0x7f00000005c0)="b4065f2ab9075ba253e109154559f88f062320246c5ae74af8e236a42c0cd0b73085bf4313acfd026684e3be45cf8f03379864cd059401666557f67127a057d2cb8d6521890c5cbfe5eaf821257dfacfaf5ef8b4c06e941318d3eec42a910d1420306249520086172e5e2f0c2308655d2a82735e431f158af85763d2d76375e78b343d563d952660c79ecfad7ccb16689bcb4fed9533483595eb30e2671cd545", 0xa0, 0x4}], 0x4803, 0x0) [ 2205.709183][ T5181] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2205.719902][ T5181] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2205.731156][ T5181] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2205.742517][ T5181] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature 05:59:56 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x4000, 0x0) 05:59:56 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe80000000000000002b0000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 05:59:56 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="0201a5ffffff00090000ff07000080ffffff000000000000000100000001000100ff81000004800000000a0000000005000042000000000000000000000055aa", 0x40, 0x1c0}]) r0 = socket$tipc(0x1e, 0x5, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x802, 0x0) statfs(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=""/54) unshare(0x400) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000040)) pselect6(0x40, &(0x7f0000000000)={0x8}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) write$cgroup_int(r1, &(0x7f0000000200), 0x12) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x220d82, 0x0) fchown(r2, 0x0, 0x0) accept(0xffffffffffffffff, &(0x7f00000001c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000000c0)=0x80) r3 = socket(0x200000000000011, 0x4000000000080002, 0xdd86) bind$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendmmsg$inet(r3, &(0x7f0000002b00)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="96c6322ea684879088175969ec15e10d40e4719016cbc15a36a88c6c843e12b1f5cb6a73613ceec274", 0x33}], 0x1, 0x0, 0x0, 0x534}}], 0x40001c0, 0x0) recvmmsg(r3, &(0x7f0000003fc0)=[{{&(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, 0x80, &(0x7f00000015c0)=[{&(0x7f0000000180)=""/157, 0x9d}, {&(0x7f0000000240)=""/242, 0xf2}, {&(0x7f0000000380)=""/22, 0x16}, {&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000001500)=""/186, 0xba}, {&(0x7f00000003c0)=""/18, 0x12}], 0x6, &(0x7f0000001640)=""/131, 0x83}, 0x9}, {{&(0x7f0000001700)=@nl=@unspec, 0x80, &(0x7f0000001d40)=[{&(0x7f0000001780)=""/69, 0x45}, {&(0x7f0000001800)=""/247, 0xf7}, {&(0x7f0000001900)=""/20, 0x14}, {&(0x7f0000001940)=""/15, 0xf}, {&(0x7f0000001980)=""/82, 0x52}, {&(0x7f0000001a00)=""/115, 0x73}, {&(0x7f0000001a80)=""/90, 0x5a}, {0x0}, {&(0x7f0000001bc0)=""/146, 0x92}, {&(0x7f0000001c80)=""/137, 0x89}], 0xa}, 0x20}, {{&(0x7f0000001e00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}, 0x7}, {{&(0x7f00000020c0)=@l2, 0x80, &(0x7f0000002580)=[{&(0x7f0000002140)=""/103, 0x67}, {&(0x7f00000021c0)=""/170, 0xaa}, {&(0x7f0000002280)=""/144, 0x90}, {&(0x7f0000002340)=""/172, 0xac}, {&(0x7f0000002480)=""/197, 0xc5}], 0x5, &(0x7f0000002600)=""/199, 0xc7}, 0xfffffffa}, {{&(0x7f0000002700)=@nfc_llcp, 0x80, 0x0}, 0xffffffc0}, {{&(0x7f0000003d00)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000003f00)=[{0x0}, {&(0x7f0000003e00)=""/216, 0xd8}], 0x2}}], 0x6, 0x1, &(0x7f0000004140)) syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f00000001c0)='NLBL_UNLBL\x00') 05:59:56 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(r0, &(0x7f0000000180)={0x38, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffd, 0xfffffffd}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) setsockopt$TIPC_CONN_TIMEOUT(0xffffffffffffffff, 0x10f, 0x82, &(0x7f00000006c0), 0x4) socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x0, 0x300) r4 = socket(0x10, 0x2, 0x0) write(r4, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) recvmmsg(r4, &(0x7f0000002ec0), 0x400000000000ec0, 0x2, &(0x7f00000001c0)={0x77359400}) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000700)={{{@in=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000140)=0xe8) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) ioctl$TUNGETSNDBUF(r6, 0x400454d0, &(0x7f0000000040)) mount$bpf(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x3608841, &(0x7f0000000540)=ANY=[@ANYRESHEX=r6, @ANYRESDEC=r5, @ANYBLOB="2c7365636c6162656c2c726f6f74636f6e746578743d753b861870e1c84accc5ce6e636f4e66696e6564f8752c00"]) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) open(0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x41007701, &(0x7f0000001940)='lo\x00') r7 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/3\x00') r8 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) sendfile(r8, r7, 0x0, 0x209) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 05:59:56 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x400000000000) [ 2205.758384][ T5181] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 2205.765754][ T5181] EXT4-fs (loop3): mount failed 05:59:56 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe80000000000000002c0000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2205.839163][ T5181] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2205.874254][ T5181] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 05:59:57 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x60ff, 0x0) 05:59:57 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe80000000000000002f0000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2205.907055][ T5181] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2205.920936][ T5181] EXT4-fs: failed to create workqueue [ 2205.933103][ T5181] EXT4-fs (loop3): mount failed 05:59:57 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3, &(0x7f00000008c0)=[{&(0x7f00000000c0)="8000000038040000197a0300e60100006c000c02000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x3ff8000000000}, {&(0x7f00000005c0)="b4065f2ab9075ba253e109154559f88f062320246c5ae74af8e236a42c0cd0b73085bf4313acfd026684e3be45cf8f03379864cd059401666557f67127a057d2cb8d6521890c5cbfe5eaf821257dfacfaf5ef8b4c06e941318d3eec42a910d1420306249520086172e5e2f0c2308655d2a82735e431f158af85763d2d76375e78b343d563d952660c79ecfad7ccb16689bcb4fed9533483595eb30e2671cd545", 0xa0, 0x4}], 0x4803, 0x0) 05:59:57 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x60ffffffffff) 05:59:57 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="0201a5ffffff00090000ff07000080ffffff000000000000000100000001000100ff81000004800000000a0000000005000042000000000000000000000055aa", 0x40, 0x1c0}]) r0 = socket$tipc(0x1e, 0x5, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x802, 0x0) statfs(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=""/54) unshare(0x400) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000040)) pselect6(0x40, &(0x7f0000000000)={0x8}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) write$cgroup_int(r1, &(0x7f0000000200), 0x12) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x220d82, 0x0) fchown(r2, 0x0, 0x0) accept(0xffffffffffffffff, &(0x7f00000001c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000000c0)=0x80) r3 = socket(0x200000000000011, 0x4000000000080002, 0xdd86) bind$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendmmsg$inet(r3, &(0x7f0000002b00)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="96c6322ea684879088175969ec15e10d40e4719016cbc15a36a88c6c843e12b1f5cb6a73613ceec274", 0x33}], 0x1, 0x0, 0x0, 0x534}}], 0x40001c0, 0x0) recvmmsg(r3, &(0x7f0000003fc0)=[{{&(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, 0x80, &(0x7f00000015c0)=[{&(0x7f0000000180)=""/157, 0x9d}, {&(0x7f0000000240)=""/242, 0xf2}, {&(0x7f0000000380)=""/22, 0x16}, {&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000001500)=""/186, 0xba}, {&(0x7f00000003c0)=""/18, 0x12}], 0x6, &(0x7f0000001640)=""/131, 0x83}, 0x9}, {{&(0x7f0000001700)=@nl=@unspec, 0x80, &(0x7f0000001d40)=[{&(0x7f0000001780)=""/69, 0x45}, {&(0x7f0000001800)=""/247, 0xf7}, {&(0x7f0000001900)=""/20, 0x14}, {&(0x7f0000001940)=""/15, 0xf}, {&(0x7f0000001980)=""/82, 0x52}, {&(0x7f0000001a00)=""/115, 0x73}, {&(0x7f0000001a80)=""/90, 0x5a}, {0x0}, {&(0x7f0000001bc0)=""/146, 0x92}, {&(0x7f0000001c80)=""/137, 0x89}], 0xa}, 0x20}, {{&(0x7f0000001e00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}, 0x7}, {{&(0x7f00000020c0)=@l2, 0x80, &(0x7f0000002580)=[{&(0x7f0000002140)=""/103, 0x67}, {&(0x7f00000021c0)=""/170, 0xaa}, {&(0x7f0000002280)=""/144, 0x90}, {&(0x7f0000002340)=""/172, 0xac}, {&(0x7f0000002480)=""/197, 0xc5}], 0x5, &(0x7f0000002600)=""/199, 0xc7}, 0xfffffffa}, {{&(0x7f0000002700)=@nfc_llcp, 0x80, 0x0}, 0xffffffc0}, {{&(0x7f0000003d00)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000003f00)=[{0x0}, {&(0x7f0000003e00)=""/216, 0xd8}], 0x2}}], 0x6, 0x1, &(0x7f0000004140)) [ 2206.081597][ T5216] SELinux: security_context_str_to_sid(u;†páÈJÌÅÎncoNfinedøu) failed for (dev bpf, type bpf) errno=-22 05:59:57 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x7600, 0x0) 05:59:57 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe80000000000000003c0000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2206.239741][ T5220] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2206.276349][ T5220] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 05:59:57 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x7f00, 0x0) [ 2206.313285][ T5220] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2206.325677][ T5220] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 2206.340327][ T5220] EXT4-fs (loop3): corrupt root inode, run e2fsck 05:59:57 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000000000000400000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2206.365415][ T5220] EXT4-fs (loop3): mount failed 05:59:57 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000000000005430000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2206.443872][ T5220] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2206.513762][ T5220] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2206.534100][ T5220] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2206.545901][ T5220] EXT4-fs: failed to create workqueue [ 2206.552374][ T5220] EXT4-fs (loop3): mount failed 05:59:57 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x9600, 0x0) 05:59:57 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="0201a5ffffff00090000ff07000080ffffff000000000000000100000001000100ff81000004800000000a0000000005000042000000000000000000000055aa", 0x40, 0x1c0}]) r0 = socket$tipc(0x1e, 0x5, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x802, 0x0) statfs(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=""/54) unshare(0x400) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000040)) pselect6(0x40, &(0x7f0000000000)={0x8}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) write$cgroup_int(r1, &(0x7f0000000200), 0x12) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x220d82, 0x0) fchown(r2, 0x0, 0x0) accept(0xffffffffffffffff, &(0x7f00000001c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000000c0)=0x80) r3 = socket(0x200000000000011, 0x4000000000080002, 0xdd86) bind$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendmmsg$inet(r3, &(0x7f0000002b00)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="96c6322ea684879088175969ec15e10d40e4719016cbc15a36a88c6c843e12b1f5cb6a73613ceec274", 0x33}], 0x1, 0x0, 0x0, 0x534}}], 0x40001c0, 0x0) [ 2206.778920][ T5209] SELinux: security_context_str_to_sid(u;†páÈJÌÅÎncoNfinedøu) failed for (dev bpf, type bpf) errno=-22 05:59:57 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x760000000000) 05:59:57 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3, &(0x7f00000008c0)=[{&(0x7f00000000c0)="8000000038040000197a0300e60100006c000003000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x3ff8000000000}, {&(0x7f00000005c0)="b4065f2ab9075ba253e109154559f88f062320246c5ae74af8e236a42c0cd0b73085bf4313acfd026684e3be45cf8f03379864cd059401666557f67127a057d2cb8d6521890c5cbfe5eaf821257dfacfaf5ef8b4c06e941318d3eec42a910d1420306249520086172e5e2f0c2308655d2a82735e431f158af85763d2d76375e78b343d563d952660c79ecfad7ccb16689bcb4fed9533483595eb30e2671cd545", 0xa0, 0x4}], 0x4803, 0x0) 05:59:57 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000000000000740000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 05:59:57 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(r0, &(0x7f0000000180)={0x38, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffd, 0xfffffffd}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) setsockopt$TIPC_CONN_TIMEOUT(0xffffffffffffffff, 0x10f, 0x82, &(0x7f00000006c0), 0x4) socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x0, 0x300) r4 = socket(0x10, 0x2, 0x0) write(r4, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) recvmmsg(r4, &(0x7f0000002ec0), 0x400000000000ec0, 0x2, &(0x7f00000001c0)={0x77359400}) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000700)={{{@in=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000140)=0xe8) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) ioctl$TUNGETSNDBUF(r6, 0x400454d0, &(0x7f0000000040)) mount$bpf(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x3608841, &(0x7f0000000540)=ANY=[@ANYRESHEX=r6, @ANYRESDEC=r5, @ANYBLOB="2c7365636c6162656c2c726f6f74636f6e746578743d753b861870e1c84accc5ce6e636f4e66696e6564f8752c00"]) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) open(0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x41007701, &(0x7f0000001940)='lo\x00') r7 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/3\x00') r8 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) sendfile(r8, r7, 0x0, 0x209) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 05:59:57 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe800000000000000e800000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 05:59:58 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(r0, &(0x7f0000000180)={0x38, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffd, 0xfffffffd}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) setsockopt$TIPC_CONN_TIMEOUT(0xffffffffffffffff, 0x10f, 0x82, &(0x7f00000006c0), 0x4) socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x0, 0x300) r4 = socket(0x10, 0x2, 0x0) write(r4, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) recvmmsg(r4, &(0x7f0000002ec0), 0x400000000000ec0, 0x2, &(0x7f00000001c0)={0x77359400}) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000700)={{{@in=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000140)=0xe8) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) ioctl$TUNGETSNDBUF(r6, 0x400454d0, &(0x7f0000000040)) mount$bpf(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x3608841, &(0x7f0000000540)=ANY=[@ANYRESHEX=r6, @ANYRESDEC=r5, @ANYBLOB="2c7365636c6162656c2c726f6f74636f6e746578743d753b861870e1c84accc5ce6e636f4e66696e6564f8752c00"]) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) open(0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x41007701, &(0x7f0000001940)='lo\x00') r7 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/3\x00') r8 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) sendfile(r8, r7, 0x0, 0x209) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 05:59:58 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x200000, 0x0) 05:59:58 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x7fffffffefff) 05:59:58 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="0201a5ffffff00090000ff07000080ffffff000000000000000100000001000100ff81000004800000000a0000000005000042000000000000000000000055aa", 0x40, 0x1c0}]) r0 = socket$tipc(0x1e, 0x5, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x802, 0x0) statfs(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=""/54) unshare(0x400) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000040)) pselect6(0x40, &(0x7f0000000000)={0x8}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) write$cgroup_int(r1, &(0x7f0000000200), 0x12) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x220d82, 0x0) fchown(r2, 0x0, 0x0) accept(0xffffffffffffffff, &(0x7f00000001c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000000c0)=0x80) r3 = socket(0x200000000000011, 0x4000000000080002, 0xdd86) bind$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) 05:59:58 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(r0, &(0x7f0000000180)={0x38, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffd, 0xfffffffd}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) setsockopt$TIPC_CONN_TIMEOUT(0xffffffffffffffff, 0x10f, 0x82, &(0x7f00000006c0), 0x4) socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x0, 0x300) r4 = socket(0x10, 0x2, 0x0) write(r4, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) recvmmsg(r4, &(0x7f0000002ec0), 0x400000000000ec0, 0x2, &(0x7f00000001c0)={0x77359400}) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000700)={{{@in=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000140)=0xe8) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) ioctl$TUNGETSNDBUF(r6, 0x400454d0, &(0x7f0000000040)) mount$bpf(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x3608841, &(0x7f0000000540)=ANY=[@ANYRESHEX=r6, @ANYRESDEC=r5, @ANYBLOB="2c7365636c6162656c2c726f6f74636f6e746578743d753b861870e1c84accc5ce6e636f4e66696e6564f8752c00"]) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) open(0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x41007701, &(0x7f0000001940)='lo\x00') r7 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/3\x00') r8 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) sendfile(r8, r7, 0x0, 0x209) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') [ 2206.974810][ T5273] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2207.012567][ T5273] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 05:59:58 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000000000035800000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2207.055471][ T5273] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2207.079260][ T5273] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature 05:59:58 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x400000, 0x0) [ 2207.106485][ T5273] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 2207.124463][ T5273] EXT4-fs (loop3): mount failed 05:59:58 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000000000000810000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2207.200369][ T22] kauditd_printk_skb: 335 callbacks suppressed [ 2207.200377][ T22] audit: type=1400 audit(1579672798.275:337195): avc: denied { map } for pid=5295 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2207.243346][ T5273] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2207.253702][ T22] audit: type=1400 audit(1579672798.275:337196): avc: denied { map } for pid=5295 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2207.264099][ T5273] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2207.296128][ T22] audit: type=1400 audit(1579672798.275:337197): avc: denied { map } for pid=5295 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2207.298521][ T5273] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2207.321443][ T22] audit: type=1400 audit(1579672798.275:337198): avc: denied { map } for pid=5295 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2207.357382][ T22] audit: type=1400 audit(1579672798.275:337199): avc: denied { map } for pid=5295 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2207.381764][ T22] audit: type=1400 audit(1579672798.275:337200): avc: denied { map } for pid=5295 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2207.407428][ T22] audit: type=1400 audit(1579672798.275:337201): avc: denied { map } for pid=5295 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2207.408319][ T5273] EXT4-fs: failed to create workqueue [ 2207.433137][ T22] audit: type=1400 audit(1579672798.275:337202): avc: denied { map } for pid=5295 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2207.463420][ T22] audit: type=1400 audit(1579672798.275:337203): avc: denied { map } for pid=5295 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2207.492645][ T22] audit: type=1400 audit(1579672798.275:337204): avc: denied { map } for pid=5295 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2207.555598][ T5273] EXT4-fs (loop3): mount failed 05:59:58 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3, &(0x7f00000008c0)=[{&(0x7f00000000c0)="8000000038040000197a0300e60100006c000b03000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x3ff8000000000}, {&(0x7f00000005c0)="b4065f2ab9075ba253e109154559f88f062320246c5ae74af8e236a42c0cd0b73085bf4313acfd026684e3be45cf8f03379864cd059401666557f67127a057d2cb8d6521890c5cbfe5eaf821257dfacfaf5ef8b4c06e941318d3eec42a910d1420306249520086172e5e2f0c2308655d2a82735e431f158af85763d2d76375e78b343d563d952660c79ecfad7ccb16689bcb4fed9533483595eb30e2671cd545", 0xa0, 0x4}], 0x4803, 0x0) 05:59:58 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="0201a5ffffff00090000ff07000080ffffff000000000000000100000001000100ff81000004800000000a0000000005000042000000000000000000000055aa", 0x40, 0x1c0}]) r0 = socket$tipc(0x1e, 0x5, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x802, 0x0) statfs(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=""/54) unshare(0x400) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000040)) pselect6(0x40, &(0x7f0000000000)={0x8}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) write$cgroup_int(r1, &(0x7f0000000200), 0x12) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x220d82, 0x0) fchown(r2, 0x0, 0x0) accept(0xffffffffffffffff, &(0x7f00000001c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000000c0)=0x80) socket(0x200000000000011, 0x4000000000080002, 0xdd86) 05:59:58 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x517000, 0x0) 05:59:58 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000000000000820000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 05:59:58 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x7ffffffff000) 05:59:58 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000000ffffdd860000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 05:59:58 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x607100, 0x0) [ 2207.721399][ T5321] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2207.744678][ T5321] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 05:59:58 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="0201a5ffffff00090000ff07000080ffffff000000000000000100000001000100ff81000004800000000a0000000005000042000000000000000000000055aa", 0x40, 0x1c0}]) r0 = socket$tipc(0x1e, 0x5, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x802, 0x0) statfs(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=""/54) unshare(0x400) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000040)) pselect6(0x40, &(0x7f0000000000)={0x8}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) write$cgroup_int(r1, &(0x7f0000000200), 0x12) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x220d82, 0x0) fchown(r2, 0x0, 0x0) accept(0xffffffffffffffff, &(0x7f00000001c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000000c0)=0x80) [ 2207.818697][ T5321] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2207.829217][ T5321] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 2207.844038][ T5321] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 2207.854641][ T5321] EXT4-fs (loop3): mount failed [ 2207.918104][ T5321] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2207.957810][ T5321] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2207.972135][ T5321] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2207.993009][ T5321] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 2208.038755][ T5321] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 2208.067562][ T5321] EXT4-fs (loop3): mount failed [ 2209.448632][ T5350] cgroup1: Unknown subsys name 'perf_event' [ 2209.455786][ T5350] cgroup1: Unknown subsys name 'net_cls' [ 2212.207396][ T22] kauditd_printk_skb: 2517 callbacks suppressed [ 2212.207405][ T22] audit: type=1400 audit(1579672803.285:339722): avc: denied { map } for pid=5618 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2212.239663][ T22] audit: type=1400 audit(1579672803.285:339723): avc: denied { map } for pid=5618 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2212.265819][ T22] audit: type=1400 audit(1579672803.285:339724): avc: denied { map } for pid=5619 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2212.289487][ T22] audit: type=1400 audit(1579672803.285:339725): avc: denied { map } for pid=5619 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2212.312477][ T22] audit: type=1400 audit(1579672803.285:339726): avc: denied { map } for pid=5619 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2212.326705][ T5626] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2212.337497][ T22] audit: type=1400 audit(1579672803.285:339727): avc: denied { map } for pid=5619 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2212.345223][ T5626] audit: audit_lost=1531 audit_rate_limit=0 audit_backlog_limit=64 [ 2212.368972][ T22] audit: type=1400 audit(1579672803.295:339728): avc: denied { map } for pid=5619 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2212.377103][ T5626] audit: backlog limit exceeded [ 2213.879599][ T5747] SELinux: security_context_str_to_sid(u;†páÈJÌÅÎncoNfinedøu) failed for (dev bpf, type bpf) errno=-22 06:00:05 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x517000, 0x0) 06:00:05 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x960000000000) 06:00:05 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000000000047880000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:00:05 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x705100, 0x0) 06:00:05 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="0201a5ffffff00090000ff07000080ffffff000000000000000100000001000100ff81000004800000000a0000000005000042000000000000000000000055aa", 0x40, 0x1c0}]) r0 = socket$tipc(0x1e, 0x5, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x802, 0x0) statfs(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=""/54) unshare(0x400) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000040)) pselect6(0x40, &(0x7f0000000000)={0x8}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) write$cgroup_int(r1, &(0x7f0000000200), 0x12) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x220d82, 0x0) fchown(r2, 0x0, 0x0) 06:00:05 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3, &(0x7f00000008c0)=[{&(0x7f00000000c0)="8000000038040000197a0300e60100006c004603000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x3ff8000000000}, {&(0x7f00000005c0)="b4065f2ab9075ba253e109154559f88f062320246c5ae74af8e236a42c0cd0b73085bf4313acfd026684e3be45cf8f03379864cd059401666557f67127a057d2cb8d6521890c5cbfe5eaf821257dfacfaf5ef8b4c06e941318d3eec42a910d1420306249520086172e5e2f0c2308655d2a82735e431f158af85763d2d76375e78b343d563d952660c79ecfad7ccb16689bcb4fed9533483595eb30e2671cd545", 0xa0, 0x4}], 0x4803, 0x0) 06:00:05 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x60710000000000) 06:00:05 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000000000048880000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:00:05 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x517000, 0x0) 06:00:05 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="0201a5ffffff00090000ff07000080ffffff000000000000000100000001000100ff81000004800000000a0000000005000042000000000000000000000055aa", 0x40, 0x1c0}]) r0 = socket$tipc(0x1e, 0x5, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x802, 0x0) statfs(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=""/54) unshare(0x400) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000040)) pselect6(0x40, &(0x7f0000000000)={0x8}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) write$cgroup_int(r1, &(0x7f0000000200), 0x12) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x220d82, 0x0) 06:00:05 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x716000, 0x0) [ 2214.551305][ T5761] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2214.617589][ T5761] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 06:00:05 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000000000064880000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2214.666322][ T5761] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2214.678447][ T5761] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 2214.692068][ T5761] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 2214.700732][ T5761] EXT4-fs (loop3): mount failed [ 2214.774048][ T5761] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2214.816391][ T5761] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2214.830657][ T5761] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock 06:00:05 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x71f000, 0x0) 06:00:05 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3, &(0x7f00000008c0)=[{&(0x7f00000000c0)="8000000038040000197a0300e60100006c004703000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x3ff8000000000}, {&(0x7f00000005c0)="b4065f2ab9075ba253e109154559f88f062320246c5ae74af8e236a42c0cd0b73085bf4313acfd026684e3be45cf8f03379864cd059401666557f67127a057d2cb8d6521890c5cbfe5eaf821257dfacfaf5ef8b4c06e941318d3eec42a910d1420306249520086172e5e2f0c2308655d2a82735e431f158af85763d2d76375e78b343d563d952660c79ecfad7ccb16689bcb4fed9533483595eb30e2671cd545", 0xa0, 0x4}], 0x4803, 0x0) 06:00:05 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x70510000000000) 06:00:05 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="0201a5ffffff00090000ff07000080ffffff000000000000000100000001000100ff81000004800000000a0000000005000042000000000000000000000055aa", 0x40, 0x1c0}]) r0 = socket$tipc(0x1e, 0x5, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x802, 0x0) statfs(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=""/54) unshare(0x400) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000040)) pselect6(0x40, &(0x7f0000000000)={0x8}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) write$cgroup_int(r1, &(0x7f0000000200), 0x12) 06:00:05 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000000ffffa8880000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2214.858008][ T5761] EXT4-fs: failed to create workqueue [ 2214.864063][ T5761] EXT4-fs (loop3): mount failed 06:00:06 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000000ffffca880000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:00:06 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x80000000000000) 06:00:06 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="0201a5ffffff00090000ff07000080ffffff000000000000000100000001000100ff81000004800000000a0000000005000042000000000000000000000055aa", 0x40, 0x1c0}]) r0 = socket$tipc(0x1e, 0x5, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x802, 0x0) statfs(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=""/54) unshare(0x400) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000040)) pselect6(0x40, &(0x7f0000000000)={0x8}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) [ 2215.130678][ T5804] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2215.158873][ T5804] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2215.182250][ T5804] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2215.217293][ T5804] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 2215.269159][ T5804] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 2215.284238][ T5804] EXT4-fs (loop3): mount failed [ 2215.339192][ T5804] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2215.361193][ T5804] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2215.418614][ T5804] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2215.446546][ T5804] EXT4-fs: failed to create workqueue [ 2215.452947][ T5804] EXT4-fs (loop3): mount failed [ 2216.776103][ T5825] cgroup1: Unknown subsys name 'perf_event' [ 2216.783175][ T5825] cgroup1: Unknown subsys name 'net_cls' [ 2217.217367][ T22] kauditd_printk_skb: 1590 callbacks suppressed [ 2217.217376][ T22] audit: type=1400 audit(1579672808.295:341319): avc: denied { map } for pid=5864 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2217.250735][ T22] audit: type=1400 audit(1579672808.295:341320): avc: denied { map } for pid=5864 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2217.277665][ T22] audit: type=1400 audit(1579672808.295:341321): avc: denied { map } for pid=5864 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2217.303536][ T22] audit: type=1400 audit(1579672808.295:341322): avc: denied { map } for pid=5865 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2217.327682][ T22] audit: type=1400 audit(1579672808.295:341323): avc: denied { map } for pid=5865 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2217.338251][ T5872] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2217.352336][ T22] audit: type=1400 audit(1579672808.295:341324): avc: denied { map } for pid=5865 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2217.358358][ T5872] audit: audit_lost=1532 audit_rate_limit=0 audit_backlog_limit=64 [ 2217.384013][ T22] audit: type=1400 audit(1579672808.295:341325): avc: denied { map } for pid=5865 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2217.391120][ T5872] audit: backlog limit exceeded 06:00:15 executing program 5: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000000000047880000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:00:15 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="0201a5ffffff00090000ff07000080ffffff000000000000000100000001000100ff81000004800000000a0000000005000042000000000000000000000055aa", 0x40, 0x1c0}]) r0 = socket$tipc(0x1e, 0x5, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x802, 0x0) statfs(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=""/54) unshare(0x400) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000040)) pselect6(0x40, &(0x7f0000000000)={0x8}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) 06:00:15 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000000000006890000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:00:15 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x8000a0ffffffff) 06:00:15 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3, &(0x7f00000008c0)=[{&(0x7f00000000c0)="8000000038040000197a0300e60100006c004a03000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x3ff8000000000}, {&(0x7f00000005c0)="b4065f2ab9075ba253e109154559f88f062320246c5ae74af8e236a42c0cd0b73085bf4313acfd026684e3be45cf8f03379864cd059401666557f67127a057d2cb8d6521890c5cbfe5eaf821257dfacfaf5ef8b4c06e941318d3eec42a910d1420306249520086172e5e2f0c2308655d2a82735e431f158af85763d2d76375e78b343d563d952660c79ecfad7ccb16689bcb4fed9533483595eb30e2671cd545", 0xa0, 0x4}], 0x4803, 0x0) 06:00:15 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x760000, 0x0) [ 2224.021618][ T22] kauditd_printk_skb: 3175 callbacks suppressed [ 2224.021627][ T22] audit: type=1400 audit(1579672815.095:344501): avc: denied { map } for pid=6225 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 06:00:15 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000002000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000e98027922d6405000000000061040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000ccdf9cf6d131bef46b1abfff9a0531edaa8760775d26032321cd53ab33"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x42, 0xe000034, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x296, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x28) [ 2224.066413][ T22] audit: type=1400 audit(1579672815.095:344502): avc: denied { map } for pid=6225 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2224.097602][ T22] audit: type=1400 audit(1579672815.095:344503): avc: denied { map } for pid=6225 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 06:00:15 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000000ffffff890000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:00:15 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="0201a5ffffff00090000ff07000080ffffff000000000000000100000001000100ff81000004800000000a0000000005000042000000000000000000000055aa", 0x40, 0x1c0}]) r0 = socket$tipc(0x1e, 0x5, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x802, 0x0) statfs(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=""/54) unshare(0x400) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000040)) pselect6(0x40, &(0x7f0000000000)={0x8}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) [ 2224.147222][ T22] audit: type=1400 audit(1579672815.095:344504): avc: denied { map } for pid=6225 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2224.187583][ T22] audit: type=1400 audit(1579672815.095:344505): avc: denied { map } for pid=6225 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2224.213566][ T22] audit: type=1400 audit(1579672815.095:344506): avc: denied { map } for pid=6225 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2224.254947][ T22] audit: type=1400 audit(1579672815.095:344507): avc: denied { map } for pid=6225 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 06:00:15 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0xf0710000000000) [ 2224.281334][ T22] audit: type=1400 audit(1579672815.095:344508): avc: denied { map } for pid=6225 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2224.301373][ T6228] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 06:00:15 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="0201a5ffffff00090000ff07000080ffffff000000000000000100000001000100ff81000004800000000a0000000005000042000000000000000000000055aa", 0x40, 0x1c0}]) socket$tipc(0x1e, 0x5, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x802, 0x0) statfs(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=""/54) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) 06:00:15 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x800000, 0x0) [ 2224.308463][ T22] audit: type=1400 audit(1579672815.095:344509): avc: denied { map } for pid=6225 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2224.342121][ T22] audit: type=1400 audit(1579672815.105:344510): avc: denied { map } for pid=6225 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2224.368627][ T6228] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 06:00:15 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000000ffffffff0000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2224.379485][ T6228] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2224.390665][ T6228] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 2224.405761][ T6228] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 2224.423098][ T6228] EXT4-fs (loop3): mount failed 06:00:15 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe80008000a0ffffffff0000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:00:15 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = dup(r1) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x6628, 0x0) fcntl$setpipe(r3, 0x407, 0xfffffffffffeffff) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x6628, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f00000005c0)='nl80211\x00') sendmsg$NL80211_CMD_SET_BEACON(r5, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000180)={0x1c, r6, 0x1, 0x70bd29}, 0xfffffffffffffe9d}}, 0x0) r7 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r7, &(0x7f0000002d00)='threaded\x00', 0xfffffd18) getsockopt$inet_mreqn(r7, 0x0, 0x24, &(0x7f0000000240)={@local, @remote, 0x0}, &(0x7f00000002c0)=0xc) sendmsg$NL80211_CMD_GET_MPATH(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x98ba3d6abd4602a0}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x60, r6, 0xc, 0x70bd27, 0x25dfdbfc, {}, [@NL80211_ATTR_MAC={0xa, 0x6, @local}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x2}}, @NL80211_ATTR_MAC={0xa, 0x6, @local}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r8}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @random="5df19fd754ee"}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x100ca005) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@mcast2, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast1}}, &(0x7f00000000c0)=0xe8) sendmsg$NL80211_CMD_DEL_STATION(r4, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, &(0x7f0000000140)={&(0x7f0000000300)={0x9c, r6, 0x300, 0x70bd28, 0x25dfdbff, {}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r9}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x4}, @NL80211_ATTR_STA_SUPPORT_P2P_PS={0x5}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x5}}, @NL80211_ATTR_STA_SUPPORTED_OPER_CLASSES={0x4f, 0xbe, "fb64d88e5df5d7cbb6b274bd76a5f6c9384e2be0c406d00a1cb7df75b5541c92cebf27fbb1c3cc3468cc18d68f35a65e23ba36ae0b285c07a8f791782bba9453ac3ba96dab186079af2e62"}, @NL80211_ATTR_WIPHY={0x8}, @NL80211_ATTR_STA_SUPPORTED_RATES={0x9, 0x13, "2b01827458"}]}, 0x9c}, 0x1, 0x0, 0x0, 0x20008000}, 0x810) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$inet6(r0, &(0x7f0000000180)={&(0x7f0000000040)={0xa, 0x4e20, 0x0, @dev}, 0x1c, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="1400800000000000290000000b0000000000000400000000"], 0x18}, 0x0) fremovexattr(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="6f73322e766d6e7f74305e6b657972696e67657468316370757365745e707070305c5d00"]) 06:00:15 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x8000a0, 0x0) [ 2224.506275][ T6228] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2224.551314][ T6228] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2224.584359][ T6228] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock 06:00:15 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3, &(0x7f00000008c0)=[{&(0x7f00000000c0)="8000000038040000197a0300e60100006c000204000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x3ff8000000000}, {&(0x7f00000005c0)="b4065f2ab9075ba253e109154559f88f062320246c5ae74af8e236a42c0cd0b73085bf4313acfd026684e3be45cf8f03379864cd059401666557f67127a057d2cb8d6521890c5cbfe5eaf821257dfacfaf5ef8b4c06e941318d3eec42a910d1420306249520086172e5e2f0c2308655d2a82735e431f158af85763d2d76375e78b343d563d952660c79ecfad7ccb16689bcb4fed9533483595eb30e2671cd545", 0xa0, 0x4}], 0x4803, 0x0) 06:00:15 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="0201a5ffffff00090000ff07000080ffffff000000000000000100000001000100ff81000004800000000a0000000005000042000000000000000000000055aa", 0x40, 0x1c0}]) socket$tipc(0x1e, 0x5, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x802, 0x0) statfs(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=""/54) pselect6(0x40, &(0x7f0000000000)={0x8}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) 06:00:15 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000020000000000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:00:15 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x960000, 0x0) [ 2224.640819][ T6228] EXT4-fs: failed to create workqueue [ 2224.674246][ T6228] EXT4-fs (loop3): mount failed 06:00:15 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0xf0ffffff7f0000) 06:00:15 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000040000000000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:00:15 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000060000000000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:00:15 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="0201a5ffffff00090000ff07000080ffffff000000000000000100000001000100ff81000004800000000a0000000005000042000000000000000000000055aa", 0x40, 0x1c0}]) socket$tipc(0x1e, 0x5, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x802, 0x0) statfs(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=""/54) pselect6(0x40, &(0x7f0000000000)={0x8}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) 06:00:15 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000080000000000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2224.943488][ T6296] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2224.979939][ T6296] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 06:00:16 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="0201a5ffffff00090000ff07000080ffffff000000000000000100000001000100ff81000004800000000a0000000005000042000000000000000000000055aa", 0x40, 0x1c0}]) socket$tipc(0x1e, 0x5, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x802, 0x0) statfs(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=""/54) pselect6(0x40, &(0x7f0000000000)={0x8}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) [ 2225.014345][ T6296] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock 06:00:16 executing program 5: unshare(0x400) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x20000, 0x65) ioctl$LOOP_CLR_FD(r2, 0x4c01) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x6628, 0x0) setsockopt$TIPC_CONN_TIMEOUT(r3, 0x10f, 0x82, &(0x7f00000000c0)=0x5, 0x4) 06:00:16 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x100000000000000) [ 2225.064066][ T6296] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 2225.077980][ T6296] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 2225.084633][ T6296] EXT4-fs (loop3): mount failed [ 2225.163546][ T6296] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2225.197306][ T6296] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 06:00:16 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3, &(0x7f00000008c0)=[{&(0x7f00000000c0)="8000000038040000197a0300e60100006c000604000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x3ff8000000000}, {&(0x7f00000005c0)="b4065f2ab9075ba253e109154559f88f062320246c5ae74af8e236a42c0cd0b73085bf4313acfd026684e3be45cf8f03379864cd059401666557f67127a057d2cb8d6521890c5cbfe5eaf821257dfacfaf5ef8b4c06e941318d3eec42a910d1420306249520086172e5e2f0c2308655d2a82735e431f158af85763d2d76375e78b343d563d952660c79ecfad7ccb16689bcb4fed9533483595eb30e2671cd545", 0xa0, 0x4}], 0x4803, 0x0) 06:00:16 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="0201a5ffffff00090000ff07000080ffffff000000000000000100000001000100ff81000004800000000a0000000005000042000000000000000000000055aa", 0x40, 0x1c0}]) socket$tipc(0x1e, 0x5, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x802, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) [ 2225.208532][ T6296] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2225.222322][ T6296] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 2225.249943][ T6296] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 2225.256411][ T6296] EXT4-fs (loop3): mount failed 06:00:16 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe80000d0000000000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2225.369417][ T6333] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2225.383590][ T6333] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2225.393507][ T6333] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2225.414289][ T6333] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 2225.428351][ T6333] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 2225.434992][ T6333] EXT4-fs (loop3): mount failed [ 2225.463916][ T6333] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2225.473951][ T6333] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2225.484982][ T6333] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2225.507616][ T6333] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 2225.522076][ T6333] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 2225.529356][ T6333] EXT4-fs (loop3): mount failed 06:00:18 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) setxattr$security_ima(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x2) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0x2000000, 0x4) dup2(0xffffffffffffffff, 0xffffffffffffffff) 06:00:18 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0xf07100, 0x0) 06:00:18 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3, &(0x7f00000008c0)=[{&(0x7f00000000c0)="8000000038040000197a0300e60100006c001004000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x3ff8000000000}, {&(0x7f00000005c0)="b4065f2ab9075ba253e109154559f88f062320246c5ae74af8e236a42c0cd0b73085bf4313acfd026684e3be45cf8f03379864cd059401666557f67127a057d2cb8d6521890c5cbfe5eaf821257dfacfaf5ef8b4c06e941318d3eec42a910d1420306249520086172e5e2f0c2308655d2a82735e431f158af85763d2d76375e78b343d563d952660c79ecfad7ccb16689bcb4fed9533483595eb30e2671cd545", 0xa0, 0x4}], 0x4803, 0x0) 06:00:18 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000280000000000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:00:18 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="0201a5ffffff00090000ff07000080ffffff000000000000000100000001000100ff81000004800000000a0000000005000042000000000000000000000055aa", 0x40, 0x1c0}]) socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) 06:00:18 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x400000000000000) 06:00:18 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000290000000000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:00:18 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="0201a5ffffff00090000ff07000080ffffff000000000000000100000001000100ff81000004800000000a0000000005000042000000000000000000000055aa", 0x40, 0x1c0}]) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) [ 2227.846995][ T6357] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2227.890499][ T6357] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2227.950748][ T6357] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2227.991430][ T6357] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature 06:00:19 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="0201a5ffffff00090000ff07000080ffffff000000000000000100000001000100ff81000004800000000a0000000005000042000000000000000000000055aa", 0x40, 0x1c0}]) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) 06:00:19 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x4000000000000000) 06:00:19 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x1000000, 0x0) 06:00:19 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe80002b0000000000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2228.038069][ T6357] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 2228.054078][ T6357] EXT4-fs (loop3): mount failed [ 2228.153596][ T6357] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2228.193063][ T6357] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2228.203539][ T6357] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2228.344283][ T6357] EXT4-fs: failed to create workqueue [ 2228.380816][ T6357] EXT4-fs (loop3): mount failed 06:00:20 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x4000000, 0x0) 06:00:20 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) setxattr$security_ima(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x2) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0x2000000, 0x4) dup2(0xffffffffffffffff, 0xffffffffffffffff) 06:00:20 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x7f00000000000000) 06:00:20 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe80002c0000000000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:00:20 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3, &(0x7f00000008c0)=[{&(0x7f00000000c0)="8000000038040000197a0300e60100006c002904000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x3ff8000000000}, {&(0x7f00000005c0)="b4065f2ab9075ba253e109154559f88f062320246c5ae74af8e236a42c0cd0b73085bf4313acfd026684e3be45cf8f03379864cd059401666557f67127a057d2cb8d6521890c5cbfe5eaf821257dfacfaf5ef8b4c06e941318d3eec42a910d1420306249520086172e5e2f0c2308655d2a82735e431f158af85763d2d76375e78b343d563d952660c79ecfad7ccb16689bcb4fed9533483595eb30e2671cd545", 0xa0, 0x4}], 0x4803, 0x0) 06:00:20 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="0201a5ffffff00090000ff07000080ffffff000000000000000100000001000100ff81000004800000000a0000000005000042000000000000000000000055aa", 0x40, 0x1c0}]) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) 06:00:20 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) 06:00:20 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe80002f0000000000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:00:20 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x40000000, 0x0) [ 2229.097519][ T6419] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2229.111111][ T22] kauditd_printk_skb: 352 callbacks suppressed [ 2229.111120][ T22] audit: type=1400 audit(1579672820.185:344863): avc: denied { map } for pid=6423 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2229.144079][ T6419] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2229.184471][ T6419] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2229.188426][ T22] audit: type=1400 audit(1579672820.215:344864): avc: denied { map } for pid=6423 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2229.206753][ T6419] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature 06:00:20 executing program 4: socket$tipc(0x1e, 0x0, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) 06:00:20 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x7f000000, 0x0) [ 2229.218300][ T22] audit: type=1400 audit(1579672820.215:344865): avc: denied { map } for pid=6423 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2229.258453][ T22] audit: type=1400 audit(1579672820.215:344866): avc: denied { map } for pid=6423 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 06:00:20 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0xfeffffff00000000) [ 2229.285888][ T22] audit: type=1400 audit(1579672820.215:344867): avc: denied { map } for pid=6423 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2229.327178][ T22] audit: type=1400 audit(1579672820.215:344868): avc: denied { map } for pid=6423 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2229.354912][ T22] audit: type=1400 audit(1579672820.215:344869): avc: denied { map } for pid=6423 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2229.380323][ T22] audit: type=1400 audit(1579672820.215:344870): avc: denied { map } for pid=6423 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2229.381978][ T6419] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 2229.405217][ T22] audit: type=1400 audit(1579672820.215:344871): avc: denied { map } for pid=6423 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 06:00:20 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe80003c0000000000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2229.405230][ T22] audit: type=1400 audit(1579672820.225:344872): avc: denied { map } for pid=6423 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2229.470653][ T6419] EXT4-fs (loop3): mount failed [ 2229.572996][ T6419] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2229.677229][ T6419] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2229.687097][ T6419] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2229.702177][ T6419] EXT4-fs: failed to create workqueue [ 2229.708473][ T6419] EXT4-fs (loop3): mount failed 06:00:22 executing program 5: unshare(0x400) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = memfd_create(&(0x7f0000000780)='\xcb', 0x0) write(r1, &(0x7f00000000c0)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file1\x00', 0xa4000960) fdatasync(r0) rt_sigaction(0x3, &(0x7f0000000180)={&(0x7f0000000000)="670f0f31b766400fdee866410f381c63fc36430f415873e00f478802f2fec20f0dd544d29da54b73a9c442f9202cfb", 0x8000002, &(0x7f0000000140)="66430feb300f46a3b10000000f381e9fd2000000470029660ffcf5f0815c22c5ca0000006467f2ab47d8e9c443b10f5426cba841d80b", {[0x6]}}, &(0x7f0000000240)={&(0x7f00000001c0)="3e660f5a9a9b9459dd410f18ff0f0fdabb3640c604779a11670cc4c2d13ab9f2ffff7fc4819e11cdc461fdd7dec423d122b80000000000c4e1716dda", 0x0, &(0x7f0000000200)="0f5d17c4422dbfa600000080670f1e19f2660f907573d9f226440f806be20000450fa065470f541b654483eb7c2666450f3a0f4cad0b6c"}, 0x8, &(0x7f0000000280)) 06:00:22 executing program 4: socket$tipc(0x1e, 0x0, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) 06:00:22 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0xffefffffff7f0000) 06:00:22 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000740000000000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:00:22 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0xa0008000, 0x0) 06:00:22 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3, &(0x7f00000008c0)=[{&(0x7f00000000c0)="8000000038040000197a0300e60100006c002a04000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x3ff8000000000}, {&(0x7f00000005c0)="b4065f2ab9075ba253e109154559f88f062320246c5ae74af8e236a42c0cd0b73085bf4313acfd026684e3be45cf8f03379864cd059401666557f67127a057d2cb8d6521890c5cbfe5eaf821257dfacfaf5ef8b4c06e941318d3eec42a910d1420306249520086172e5e2f0c2308655d2a82735e431f158af85763d2d76375e78b343d563d952660c79ecfad7ccb16689bcb4fed9533483595eb30e2671cd545", 0xa0, 0x4}], 0x4803, 0x0) 06:00:22 executing program 4: socket$tipc(0x1e, 0x0, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) 06:00:22 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000820000000000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:00:22 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0xfeffffff, 0x0) [ 2231.771700][ T6476] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2231.821046][ T6476] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 06:00:22 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000430500000000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:00:23 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x0) pselect6(0x40, &(0x7f0000000000)={0x8}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) [ 2231.877367][ T6476] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2231.897437][ T6476] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature 06:00:23 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0xffffffff00000000) [ 2231.936355][ T6476] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 2231.946635][ T6476] EXT4-fs (loop3): mount failed [ 2232.032934][ T6476] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2232.062532][ T6476] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2232.090071][ T6476] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2232.117406][ T6476] EXT4-fs: failed to create workqueue [ 2232.125280][ T6476] EXT4-fs (loop3): mount failed 06:00:23 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x0) pselect6(0x40, &(0x7f0000000000)={0x8}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) 06:00:23 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000600000000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:00:23 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0xffffffffa0008000) 06:00:23 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3, &(0x7f00000008c0)=[{&(0x7f00000000c0)="8000000038040000197a0300e60100006c002b04000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x3ff8000000000}, {&(0x7f00000005c0)="b4065f2ab9075ba253e109154559f88f062320246c5ae74af8e236a42c0cd0b73085bf4313acfd026684e3be45cf8f03379864cd059401666557f67127a057d2cb8d6521890c5cbfe5eaf821257dfacfaf5ef8b4c06e941318d3eec42a910d1420306249520086172e5e2f0c2308655d2a82735e431f158af85763d2d76375e78b343d563d952660c79ecfad7ccb16689bcb4fed9533483595eb30e2671cd545", 0xa0, 0x4}], 0x4803, 0x0) 06:00:23 executing program 5: r0 = socket(0x10, 0x3, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) write$cgroup_int(r1, &(0x7f0000000200), 0x12) r2 = dup2(r1, 0xffffffffffffffff) getdents64(r2, &(0x7f0000000180)=""/113, 0x71) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_opts(r5, 0x29, 0x3b, &(0x7f00000000c0)=ANY=[@ANYBLOB="11100408fb280600fe880000000000000000000000000101ff020000000000000000000000000001fe8000000000000000000000000000bb00000000000000000000000000000000fe8000000000000000000000002500000000000000000000000000000000fe8000000000000000000000000000bbfe8000000000000000000000000000b90000"], 0x88) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r6, 0x29, 0x20, &(0x7f0000000000)={@rand_addr="0000000019a100f15700", 0x0, 0x0, 0x2, 0x1}, 0x20) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 06:00:23 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000080600000000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:00:23 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x0) pselect6(0x40, &(0x7f0000000000)={0x8}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) [ 2232.351741][ T6527] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 06:00:23 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000890600000000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2232.392238][ T6527] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2232.485177][ T6527] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2232.519878][ T6527] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 2232.559543][ T6527] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 2232.580125][ T6527] EXT4-fs (loop3): mount failed [ 2232.623457][ T6527] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2232.635173][ T6527] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2232.647178][ T6527] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2232.659607][ T6527] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 2232.674061][ T6527] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 2232.681960][ T6527] EXT4-fs (loop3): mount failed 06:00:25 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0xff600000, 0x0) 06:00:25 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0xffffffffff600000) 06:00:25 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000060800000000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:00:25 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0xfffffffd, 0x1000}, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffe58) fallocate(r1, 0x0, 0x0, 0x8003) 06:00:25 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) 06:00:25 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3, &(0x7f00000008c0)=[{&(0x7f00000000c0)="8000000038040000197a0300e60100006c002c04000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x3ff8000000000}, {&(0x7f00000005c0)="b4065f2ab9075ba253e109154559f88f062320246c5ae74af8e236a42c0cd0b73085bf4313acfd026684e3be45cf8f03379864cd059401666557f67127a057d2cb8d6521890c5cbfe5eaf821257dfacfaf5ef8b4c06e941318d3eec42a910d1420306249520086172e5e2f0c2308655d2a82735e431f158af85763d2d76375e78b343d563d952660c79ecfad7ccb16689bcb4fed9533483595eb30e2671cd545", 0xa0, 0x4}], 0x4803, 0x0) 06:00:26 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) [ 2234.904132][ T6557] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2234.917896][ T22] kauditd_printk_skb: 252 callbacks suppressed [ 2234.917905][ T22] audit: type=1400 audit(1579672825.995:345125): avc: denied { map } for pid=6562 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2234.970967][ T22] audit: type=1400 audit(1579672825.995:345126): avc: denied { map } for pid=6562 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2234.977831][ T6557] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 06:00:26 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000d00000000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2235.012004][ T22] audit: type=1400 audit(1579672825.995:345127): avc: denied { map } for pid=6562 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2235.027291][ T6557] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2235.048091][ T6557] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 2235.061788][ T6557] EXT4-fs (loop3): corrupt root inode, run e2fsck 06:00:26 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = gettid() rt_sigqueueinfo(r1, 0x21, &(0x7f0000000000)) tkill(r1, 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) [ 2235.064777][ T22] audit: type=1400 audit(1579672825.995:345128): avc: denied { map } for pid=6562 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2235.068493][ T6557] EXT4-fs (loop3): mount failed [ 2235.114922][ T22] audit: type=1400 audit(1579672825.995:345129): avc: denied { map } for pid=6562 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 06:00:26 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) [ 2235.167438][ T6557] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2235.170844][ T22] audit: type=1400 audit(1579672825.995:345130): avc: denied { map } for pid=6562 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2235.215121][ T22] audit: type=1400 audit(1579672825.995:345131): avc: denied { map } for pid=6562 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2235.218168][ T6557] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2235.240899][ T22] audit: type=1400 audit(1579672825.995:345132): avc: denied { map } for pid=6562 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2235.278569][ T22] audit: type=1400 audit(1579672825.995:345133): avc: denied { map } for pid=6562 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 06:00:26 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000800e00000000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:00:26 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0xfffffffe, 0x0) [ 2235.303666][ T22] audit: type=1400 audit(1579672825.995:345134): avc: denied { map } for pid=6562 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2235.340498][ T6557] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2235.351971][ T6557] EXT4-fs: failed to create workqueue [ 2235.359262][ T6557] EXT4-fs (loop3): mount failed 06:00:26 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3, &(0x7f00000008c0)=[{&(0x7f00000000c0)="8000000038040000197a0300e60100006c002d04000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x3ff8000000000}, {&(0x7f00000005c0)="b4065f2ab9075ba253e109154559f88f062320246c5ae74af8e236a42c0cd0b73085bf4313acfd026684e3be45cf8f03379864cd059401666557f67127a057d2cb8d6521890c5cbfe5eaf821257dfacfaf5ef8b4c06e941318d3eec42a910d1420306249520086172e5e2f0c2308655d2a82735e431f158af85763d2d76375e78b343d563d952660c79ecfad7ccb16689bcb4fed9533483595eb30e2671cd545", 0xa0, 0x4}], 0x4803, 0x0) 06:00:26 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) 06:00:26 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f0000000040)={0x41, 0x1, 0x1}, 0x10) r4 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 06:00:26 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$can_raw(0x1d, 0x3, 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r2, 0x0, r2) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x2, 0x3, 0x2d0, 0x130, 0x0, 0x130, 0x130, 0x130, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@ip={@multicast1, @local, 0x0, 0x0, 'ip6gretap0\x00'}, 0x0, 0xd0, 0x130, 0x0, {}, [@common=@inet=@l2tp={{0x30, 'l2tp\x00'}, {0x3000000, 0x0, 0x2, 0x0, 0x5}}, @common=@ah={{0x30, 'ah\x00'}}]}, @common=@SET={0x60, 'SET\x00'}}, {{@uncond, 0x0, 0xa0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x330) bind$can_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet6(0xa, 0x3, 0x4000000000000087) getsockopt$inet6_opts(r3, 0x29, 0x4d, 0x0, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_int(r4, &(0x7f0000000200), 0x12) setsockopt$EBT_SO_SET_COUNTERS(r4, 0x0, 0x81, &(0x7f0000000100)={'filter\x00', 0x0, 0x0, 0x0, [], 0x7, &(0x7f0000000000)=[{}, {}, {}, {}, {}], 0x0, [{}, {}, {}, {}, {}, {}, {}]}, 0xe8) [ 2235.574115][ T6607] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 06:00:26 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x711083, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 06:00:26 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000001f00000000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:00:26 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x200000000000, 0x0) [ 2235.622072][ T6607] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2235.661120][ T6607] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock 06:00:26 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) 06:00:26 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) clock_settime(0x0, &(0x7f0000000300)={0x0, 0x1c9c380}) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000402) fallocate(r1, 0x0, 0x0, 0x110001) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x6628, 0x0) r3 = ioctl$TIOCGPTPEER(r2, 0x5441, 0x6b) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000100)={{0x1, 0x0, @reserved="ce6dfefc0e418fedb2c2d41773687f4c08e7cfe6be66c79744b9f7919ad2d66c"}}) r4 = socket$inet_udplite(0x2, 0x2, 0x88) close(r4) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f0000000040)=""/23) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000240)) r5 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x4000, 0x0) ioctl$TIOCMGET(r5, 0x5415, &(0x7f00000002c0)) 06:00:26 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000002800000000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2235.755347][ T6607] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 2235.774737][ T6607] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 2235.781689][ T6607] EXT4-fs (loop3): mount failed 06:00:26 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) 06:00:26 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x400000000000, 0x0) [ 2235.841835][ T6607] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2235.912714][ T6607] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2235.934821][ T6607] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock 06:00:27 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000002900000000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:00:27 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) write$cgroup_int(r1, &(0x7f0000000200), 0x12) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@dev, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000000)=0xe8) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], r2, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 06:00:27 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3, &(0x7f00000008c0)=[{&(0x7f00000000c0)="8000000038040000197a0300e60100006c002e04000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x3ff8000000000}, {&(0x7f00000005c0)="b4065f2ab9075ba253e109154559f88f062320246c5ae74af8e236a42c0cd0b73085bf4313acfd026684e3be45cf8f03379864cd059401666557f67127a057d2cb8d6521890c5cbfe5eaf821257dfacfaf5ef8b4c06e941318d3eec42a910d1420306249520086172e5e2f0c2308655d2a82735e431f158af85763d2d76375e78b343d563d952660c79ecfad7ccb16689bcb4fed9533483595eb30e2671cd545", 0xa0, 0x4}], 0x4803, 0x0) [ 2235.962366][ T6607] EXT4-fs: failed to create workqueue [ 2235.969717][ T6607] EXT4-fs (loop3): mount failed 06:00:27 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000002b00000000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:00:27 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8}, 0x0, 0x0, 0x0, 0x0) 06:00:27 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x60ffffffffff, 0x0) 06:00:27 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x121680, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 06:00:27 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000002c00000000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2236.246910][ T6671] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2236.315814][ T6671] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2236.327087][ T6671] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock 06:00:27 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x46802) io_setup(0x100000000000c333, &(0x7f0000000180)=0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x50) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xb, 0x12, r2, 0x0) ftruncate(r0, 0x48280) r3 = open(&(0x7f00000004c0)='./bus\x00', 0x0, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x88800, 0x0) r4 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r4, 0x208200) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r6, 0xc0502100, &(0x7f0000000440)) r7 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x3, 0x4, @tid=r7}, &(0x7f0000044000)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x40, 0x1, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(r1, 0x20000000000001cb, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x400000000000, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r8 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r8, 0x0) writev(r3, 0x0, 0x0) open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) fdatasync(0xffffffffffffffff) 06:00:27 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000002f00000000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2236.359361][ T6671] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 2236.389297][ T6671] EXT4-fs (loop3): corrupt root inode, run e2fsck 06:00:27 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x760000000000, 0x0) [ 2236.415516][ T6671] EXT4-fs (loop3): mount failed 06:00:27 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000803500000000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:00:27 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000003c00000000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:00:27 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) write$cgroup_int(r1, &(0x7f0000000200), 0x12) vmsplice(r1, &(0x7f0000000100)=[{&(0x7f0000000880)="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"}], 0x6, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) write$cgroup_int(r2, &(0x7f0000000200), 0x12) sendto$inet(r2, &(0x7f0000000000)="4302f1382966511f883906f81b4c73b34abfda42b77ce1ebe25dc3d3fdb716dda045586c2e0edc2c60d491f615aa6e2e49f5ecebaa4bd593ccc5402b092c358fe66cd7", 0x43, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x6628, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r3, 0x894b, &(0x7f0000000240)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x6628, 0x0) ioctl$LOOP_SET_STATUS(r7, 0x4c02, &(0x7f0000000180)={0x0, {}, 0x0, {}, 0x7fff, 0x9, 0x5, 0x0, "379145de2787556ddb7280bb34762a3cc2ade501f2960d3bf33f7ad231d2f3ed099be6d015ae7a075d40beba7d1bbc30a5560d63563abdc3fbdfbd188f34b7d1", "58ac73c8386ac1816eacf3f70f32551367f61018079d3a459f60124c31b24d59", [0x7fffffff, 0x7e53]}) ptrace$cont(0x20, r0, 0x0, 0x0) [ 2236.535558][ T6671] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2236.573752][ T6671] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2236.584806][ T6671] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2236.606640][ T6671] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 2236.658802][ T6671] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 2236.675870][ T6671] EXT4-fs (loop3): mount failed 06:00:27 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000004000000000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:00:27 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.opaque\x00', &(0x7f0000000100)='y\x00', 0x2, 0x3) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = gettid() rt_sigqueueinfo(r4, 0x21, &(0x7f0000000000)) ptrace$cont(0x20, 0x0, 0x0, 0x0) 06:00:28 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8}, 0x0, 0x0, 0x0, 0x0) 06:00:28 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x7fffffffefff, 0x0) 06:00:28 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000054300000000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:00:28 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3, &(0x7f00000008c0)=[{&(0x7f00000000c0)="8000000038040000197a0300e60100006c002f04000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x3ff8000000000}, {&(0x7f00000005c0)="b4065f2ab9075ba253e109154559f88f062320246c5ae74af8e236a42c0cd0b73085bf4313acfd026684e3be45cf8f03379864cd059401666557f67127a057d2cb8d6521890c5cbfe5eaf821257dfacfaf5ef8b4c06e941318d3eec42a910d1420306249520086172e5e2f0c2308655d2a82735e431f158af85763d2d76375e78b343d563d952660c79ecfad7ccb16689bcb4fed9533483595eb30e2671cd545", 0xa0, 0x4}], 0x4803, 0x0) 06:00:28 executing program 2: clone(0x16124100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140)='nl80211\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) write$cgroup_int(r3, &(0x7f0000000200), 0x12) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f0000000180)={'batadv_slave_0\x00', 0x0}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x6628, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r5, 0x8933, &(0x7f00000001c0)={'batadv0\x00', 0x0}) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_int(r7, &(0x7f0000000200), 0x12) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000200)={'vlan1\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_MESH(r1, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x58, r2, 0x10, 0x70bd2d, 0x25dfdbfd, {}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x2}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r4}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x1}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x3}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r6}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x7, 0x2}}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r8}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x1}]}, 0x58}, 0x1, 0x0, 0x0, 0x4000}, 0x800) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = fcntl$dupfd(r10, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 06:00:28 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f000000aff8)='./file0\x00', &(0x7f0000000000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000cd2ff8)='./file0\x00') symlink(&(0x7f0000000140)='..', &(0x7f00000000c0)='./file0\x00') utimes(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000200)={{0x77359400}, {0x0, 0x7530}}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) umount2(&(0x7f0000000180)='../file0\x00', 0x2) utime(&(0x7f00000001c0)='./file0/../file0\x00', 0x0) [ 2237.120933][ T6738] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 06:00:28 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000884700000000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:00:28 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x7ffffffff000, 0x0) 06:00:28 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000884800000000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:00:28 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f000000aff8)='./file0\x00', &(0x7f0000000000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000cd2ff8)='./file0\x00') symlink(&(0x7f0000000140)='..', &(0x7f00000000c0)='./file0\x00') utimes(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000200)={{0x77359400}, {0x0, 0x7530}}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) umount2(&(0x7f0000000180)='../file0\x00', 0x2) utime(&(0x7f00000001c0)='./file0/../file0\x00', 0x0) [ 2237.229946][ T6738] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2237.248717][ T6738] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock 06:00:28 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x960000000000, 0x0) [ 2237.290503][ T6738] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 2237.312181][ T6738] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 2237.321014][ T6738] EXT4-fs (loop3): mount failed 06:00:28 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f000000aff8)='./file0\x00', &(0x7f0000000000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000cd2ff8)='./file0\x00') symlink(&(0x7f0000000140)='..', &(0x7f00000000c0)='./file0\x00') utimes(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000200)={{0x77359400}, {0x0, 0x7530}}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) umount2(&(0x7f0000000180)='../file0\x00', 0x2) utime(&(0x7f00000001c0)='./file0/../file0\x00', 0x0) [ 2237.399244][ T6738] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2237.467001][ T6738] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2237.527373][ T6738] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2237.566800][ T6738] EXT4-fs: failed to create workqueue [ 2237.573395][ T6738] EXT4-fs (loop3): mount failed 06:00:29 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8}, 0x0, 0x0, 0x0, 0x0) 06:00:29 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000886400000000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:00:29 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x244083, 0x0) ioctl$TIOCSERGETLSR(r1, 0x5459, &(0x7f0000000100)) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x6628, 0x0) fcntl$dupfd(r2, 0x406, 0xffffffffffffffff) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_int(r4, &(0x7f0000000200), 0x12) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40086602, 0x400007) write$cgroup_int(r5, &(0x7f0000000200), 0x12) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x100007) ptrace$cont(0x20, r0, 0x0, 0x1ff) openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/member\x00', 0x2, 0x0) 06:00:29 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f000000aff8)='./file0\x00', &(0x7f0000000000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000cd2ff8)='./file0\x00') symlink(&(0x7f0000000140)='..', &(0x7f00000000c0)='./file0\x00') utimes(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000200)={{0x77359400}, {0x0, 0x7530}}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) umount2(&(0x7f0000000180)='../file0\x00', 0x2) utime(&(0x7f00000001c0)='./file0/../file0\x00', 0x0) 06:00:29 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x60710000000000, 0x0) 06:00:29 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3, &(0x7f00000008c0)=[{&(0x7f00000000c0)="8000000038040000197a0300e60100006c003004000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x3ff8000000000}, {&(0x7f00000005c0)="b4065f2ab9075ba253e109154559f88f062320246c5ae74af8e236a42c0cd0b73085bf4313acfd026684e3be45cf8f03379864cd059401666557f67127a057d2cb8d6521890c5cbfe5eaf821257dfacfaf5ef8b4c06e941318d3eec42a910d1420306249520086172e5e2f0c2308655d2a82735e431f158af85763d2d76375e78b343d563d952660c79ecfad7ccb16689bcb4fed9533483595eb30e2671cd545", 0xa0, 0x4}], 0x4803, 0x0) 06:00:29 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000007400000000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2238.061004][ T6785] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2238.092748][ T6785] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 06:00:29 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe80000e8000000000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2238.103780][ T6785] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2238.115314][ T6785] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature 06:00:29 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x70510000000000, 0x0) 06:00:29 executing program 5: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getpeername$unix(r0, &(0x7f00000002c0), &(0x7f0000000280)=0x6e) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x6628, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, &(0x7f0000000200)={{0x1, 0x0, @descriptor="5cf664b308b1a82f"}}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x2000, 0x0) sendmsg(r2, &(0x7f0000000840)={&(0x7f0000000080)=@nl=@proc={0x10, 0x0, 0x25dfdbfb, 0x1}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000440)="1d602901e0ffbc03898b5e7c932ed42ad26aa381782d2d5d7d6b6bc38aae7bd61e69e3bbfbdd10d9f260f024dc21bafa8b363c0023cf38eea59d0dc2359bc08ae031c35fe646a51437ed2939131625d1943f4d1fcdec3a7c6455e7fdfd9512b7731ae31afd4af9d301bda66475cf983a8203f33e6ff9cfda6629d11b2e7b97ac4587467506a729e6156939412b75f8291b41d9d18743248f3938eec669a9229d0d95de0f527b22d9ae01c2b7fbe94b8977add7abe18d97ee86cfcc033d8ae947393585103f7e6688bdced2e0bfcb8d98", 0xd0}, {&(0x7f0000000540)="2deeb1487c9aa80252be405760441738620a03f6b9a5aca5a4261335b84aa46d072f5ef25fec357031ecb4ff1ce91264af4c3768f9662daa88164e5506f09b9a6ef7286e841639066263c189c06e05de0587966b45c21d5a09bb29477494be88bfd3c790b418be6ac6b780769a9a929fbfe46d5e6f249719cc4a26b5111c3846a9bd742a42873e5563b4e42571077a1397c4f8f79a85260e9edaa8f19f9442012ea3afe3e41c0cce88378c7912d2431b3e8b624d4812d0ed81ef194d0d892959c8beef72eedd189caccbcba1469177a3336e9a1bc4c1b56ae28b4f7e64f993", 0xdf}], 0x2, &(0x7f0000000640)=[{0xe8, 0x111, 0x801, "117f3c54142080c32a92cf71f67a73c33c3899f9b30986c3a71bbdb654c7ef01aa44e0f663f0aba1b56ddcb87c1dd3460b20e4fe8bd470c1451a02f8d27e8494b4baa30d4035c22212158276e541833711025b85ecafb8a1a2d06777b04019293844628046768ed72343ecc7ea95c9e923cf7427151ada6a6ed45cdba8f1f4ff999879c8ece3139df3959f4f2603856e333eea32e9833d5e95b0de87f7d371463926a97a78b4cde5bbe991890ef7dbaafc8bc5f2557405f1ea984c557e100977fefd0bb388d5440c30aaaaf28705490e443f0d"}, {0xb0, 0x3a, 0x1, "3686de977020a8167f1aa9b367789d07f17fdcae5377282652169dcd9dd8474cff3b6a1280790b2f7a4a51de580e661e3c01b93842dfc3e0c972c004d291b5e06f08c9d2328705869d299a681e16ff558ab2b1565d9b06d839d6337941034d81492c5b4095483afcc7048e26509f6cbe1e7609475181c20daa7e8b82629cf40f56f3f85727f6abfce01e912ae28344282fad014c2dd36be0bac6800e94"}, {0x40, 0x103, 0x6, "4fb1e8e7acfe348ee86e0bb4304f17fe8eeed4481eaa1b497cfcbab08422303818925ffaa5c194ca12ce9136"}, {0x10, 0x229, 0x6}, {0x10, 0x104}], 0x1f8}, 0x20040895) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r3 = geteuid() mount$overlay(0x400002, &(0x7f0000000140)='./file1\x00', &(0x7f0000000100)='overlay\x00', 0x100000, &(0x7f0000000340)={[{@nfs_export_off='nfs_export=off'}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_on='index=on'}, {@index_on='index=on'}], [{@euid_gt={'euid>', r3}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@dont_measure='dont_measure'}, {@appraise_type='appraise_type=imasig'}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) [ 2238.173164][ T6785] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 2238.181828][ T6785] EXT4-fs (loop3): mount failed 06:00:29 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x84080, 0x0) sendmsg$inet6(r0, &(0x7f0000001780)={&(0x7f0000000100)={0xa, 0x4e23, 0xe27, @ipv4={[], [], @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x4}, 0x1c, &(0x7f00000016c0)=[{&(0x7f0000000400)="3654c1cc1805ac3715e94773b27bc805b069b62467eb374cef1f784f893b4ddcc7f5f4d1c545e5ba627a3f217304788db4313e3c4b0c6b5266f8a400dbb269c9a8db4e51771f6e1bb86b2d338382ffb2e2525c0288b7738b43e171d81d1d7a476bacf03d8bd3b2bbedce5ce119248895985e01d335fcb0ec5350886e90378193f06e9c7098155da3de10f3e530c650f2724e33e786eb9ee3118c45c4c2023239c0163c85c8a22eb33036c8c634baf55add76e3598aca7333a0e2f0188ce03e8dafb4f34e216eb58873ff3aeacda241", 0xcf}, {&(0x7f0000000500)="bc1b18c6cddb625ac969f0b6f72b3b49a135272e9d4778eb210172ab5b58688b2ac2df91e5d433dae535a6ab5261da22e2e04acb4de3cc23446dfee74dd75cf35165e8a51c2014f4ef04450a535f34ebb7c9863623ca0e52235575f0117a00f34c1f1c7107fba4f219b3e3d7e6c75efd2434cced723308b0b2657df0c1734f3b712feb2e07955441d504ca683cfb8255301f7258cef884ee6fefe037e5e963fd1eb91d32ac96ac55e0a7f7bfa828a079f7e36249ef2dfe36523aa65e4794e25ce4c92a848684666c3127ad99f9c942f29b7ad451938fe47e17beebbcdb31ab5a", 0xe0}, {&(0x7f0000000180)="50addf63de87898b38ae1d5f4f12353d5cfe63a0ad4a6d5669a81ead241cad2775967869df6495cbb46201dd53f4f6ed59723ca4333ff74286730d9568218fc32b4da27e3c19bc045c2e56f6fdbbe23036ee0385be999db8be8bd64476421eeb1fe7390a4b5c9b9e28532b321a1464fc37ffa6489a1203c964cd7e526749f72446b8ae67", 0x84}, {&(0x7f0000000300)="13eb6aad3c06a5038fcd4921d235550db1dc7181fb472723350661c5d663437eb1bac0f7c81108893598661d7e9cb4877f926ded64387a970baaa5be18fd3df82b2e14acdf58cfe3ff02ed0f11eb7754ab6f4c5d5adeb643efcd9b5625a3362dec1027f07030ad5ce8999f3fef94a0b5a9ac4cdb1c9ef4243147dcd771", 0x7d}, {&(0x7f0000000600)="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", 0x1000}, {&(0x7f0000001600)="c39b8b255bf0c89eee2156649c53e01817c5030054961062185ac232dfdb06e463f352b8519c28a2e35732173dfd7a1a89987f5319f7dd8f80f7608d82628695a265b4a1a23a6a17d789c5df18372f4ef208f10f7a355cc442207163ab1d0b7614d0fb30cb8b596615b13b9bd9c7c6c79118af73a2b77b1167bc2d08fe1977de505b475e59e8e43bf2cc6e8c517d82c82d512fe0c495b89153fba14adad56ddd10f83f29ca152e2b51995738104c81e52ffa0b2513ae52bdd60c0c", 0xbb}], 0x6, &(0x7f0000001740)}, 0x10008014) r1 = gettid() wait4(0x0, 0x0, 0x1, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$trusted_overlay_upper(r2, &(0x7f0000000000)='trusted.overlay.upper\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="0010aa03038d1773ddde05bdd258d7964c65623b1e5cea1604dd2666d62c232c572a4aacc109e9909e4fd1a0f2f690a166c8b54abac17d150f0a859395e19ab7e82639896927fad8fe7296a9986f772d7572ad51c1c403f32805719b51e4d133f06d0cd2e9f9ef39e9c2e91b010e5336c2e06b605ae0e7bfc004d1e42ed800"/141], 0x4d, 0x2) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ptrace$cont(0x20, r1, 0x0, 0x0) 06:00:29 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000358000000000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2238.282931][ T6785] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2238.339552][ T6785] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2238.381591][ T6785] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2238.392057][ T6785] EXT4-fs: failed to create workqueue [ 2238.397645][ T6785] EXT4-fs (loop3): mount failed 06:00:30 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3, &(0x7f00000008c0)=[{&(0x7f00000000c0)="8000000038040000197a0300e60100006c003104000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x3ff8000000000}, {&(0x7f00000005c0)="b4065f2ab9075ba253e109154559f88f062320246c5ae74af8e236a42c0cd0b73085bf4313acfd026684e3be45cf8f03379864cd059401666557f67127a057d2cb8d6521890c5cbfe5eaf821257dfacfaf5ef8b4c06e941318d3eec42a910d1420306249520086172e5e2f0c2308655d2a82735e431f158af85763d2d76375e78b343d563d952660c79ecfad7ccb16689bcb4fed9533483595eb30e2671cd545", 0xa0, 0x4}], 0x4803, 0x0) 06:00:30 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000008100000000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:00:30 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$cgroup_int(r1, &(0x7f0000000200), 0x806000) write$P9_RXATTRCREATE(r3, &(0x7f0000000000)={0x7, 0x21, 0x2}, 0x7) 06:00:30 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x80000000000000, 0x0) 06:00:30 executing program 4 (fault-call:2 fault-nth:0): socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) 06:00:30 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) syslog(0x9, &(0x7f0000000180)=""/135, 0x87) [ 2238.987705][ T6835] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 06:00:30 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x8000a0ffffffff, 0x0) 06:00:30 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) 06:00:30 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000008200000000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2239.074742][ T6835] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2239.094923][ T6835] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock 06:00:30 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpgrp(0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x75, 0x1, 0x0, 0x2000, 0x7, 0x0, 0x800000000000, 0x0, 0x0, 0xffffffff}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002380)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) r4 = gettid() sched_setattr(r4, &(0x7f00000002c0)={0x38, 0x2, 0x1, 0x0, 0x3, 0x0, 0x2000000000}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r5, &(0x7f00000017c0), 0x199, 0x0) syz_open_dev$usbfs(0x0, 0x77, 0x1) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f00000006c0)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r8, 0x6628, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r9, 0x40086602, 0x400007) write$cgroup_int(r9, &(0x7f0000000200), 0x12) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r10, 0x40086602, 0x400007) write$cgroup_int(r10, &(0x7f0000000200), 0x12) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r11, 0x6628, 0x0) r12 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r12, 0x6628, 0x0) r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r13, 0x40086602, 0x400007) write$cgroup_int(r13, &(0x7f0000000200), 0x12) ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x8038550a, &(0x7f0000000140)=ANY=[@ANYRES16=r9, @ANYPTR=&(0x7f0000000840)=ANY=[@ANYBLOB="c5dc0a7110ffb97fa2acf52ad0b3acc2d3ff976a7fd28f5eeabc1e3cece1be2a3bfde8a5a6ac83e6a16af7f855ae526d1c3b065d051fbe60e79c28992ce2d8f4faf214d8047ab0c16f14731040c2ad989fb5dc7229ac12820fed46869ad020bea6e843e27b054df2eebbaa27d44a78d9433dbb2dc4d42c20419f5d9539cf92dac3dfaf4c7376f4c86f40b5c9e9e468228ba71bef1043ea2aa275d235231c5da8fb5c844bad57c58323fa12456f07fdb8cfecc29823a13cc9e62e616787f72d1c1676f209634e0000", @ANYRESOCT=r3, @ANYRESDEC, @ANYPTR64, @ANYRES16=0x0, @ANYRES64=r8], @ANYPTR=&(0x7f00000005c0)=ANY=[@ANYRESDEC=0x0, @ANYBLOB="2c6850a71e7358b7144628e26047563c4112f583787942db3af5062ac67941d17df4986ba46044768781f351ce48eb9f38df53ee7257752843ee0007d1b2b29432c4f14eff886d5e5c1353b670bb91d0a69f0c1cf632b50af98eae6c9c4238c7d0fa66dc7a9eaea79843eaf51911317b57c8929e2c1ff8b0b3e7fecaa81b6ca7db7aa6c78da84761257b60e754f74e9c42160421428a4c221096630fbc85867a942e802cde764bd25e08e0828ef56bd62a25d55ba09a5380b482c1f8b3", @ANYRES16=r6, @ANYRES16=r10, @ANYRES64, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRESOCT=r11, @ANYRESHEX=0x0, @ANYRESDEC, @ANYRESDEC=r13, @ANYRESOCT], @ANYRES32=r12], @ANYPTR=&(0x7f0000000200)=ANY=[]]) utime(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400)={0x0, 0xffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff}) close(r14) ioctl$FUSE_DEV_IOC_CLONE(r14, 0x8004e500, &(0x7f00000001c0)=r3) [ 2239.114276][ T6835] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 2239.137506][ T6835] EXT4-fs (loop3): corrupt root inode, run e2fsck 06:00:30 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000478800000000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:00:30 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x20000008}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) [ 2239.187409][ T6835] EXT4-fs (loop3): mount failed [ 2239.270540][ T6835] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2239.291866][ T6835] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2239.308192][ T6835] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2239.342746][ T6835] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 2239.360455][ T6880] overlayfs: missing 'lowerdir' 06:00:30 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0xf0710000000000, 0x0) 06:00:30 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000488800000000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2239.383583][ T6835] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 2239.395166][ T6835] EXT4-fs (loop3): mount failed 06:00:30 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x3}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) 06:00:30 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3, &(0x7f00000008c0)=[{&(0x7f00000000c0)="8000000038040000197a0300e60100006c003204000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x3ff8000000000}, {&(0x7f00000005c0)="b4065f2ab9075ba253e109154559f88f062320246c5ae74af8e236a42c0cd0b73085bf4313acfd026684e3be45cf8f03379864cd059401666557f67127a057d2cb8d6521890c5cbfe5eaf821257dfacfaf5ef8b4c06e941318d3eec42a910d1420306249520086172e5e2f0c2308655d2a82735e431f158af85763d2d76375e78b343d563d952660c79ecfad7ccb16689bcb4fed9533483595eb30e2671cd545", 0xa0, 0x4}], 0x4803, 0x0) [ 2239.592794][ T6895] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2239.602780][ T6895] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2239.612905][ T6895] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2239.633833][ T6895] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 2239.648172][ T6895] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 2239.654717][ T6895] EXT4-fs (loop3): mount failed 06:00:33 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000648800000000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:00:33 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpgrp(0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x75, 0x1, 0x0, 0x2000, 0x7, 0x0, 0x800000000000, 0x0, 0x0, 0xffffffff}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002380)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) r4 = gettid() sched_setattr(r4, &(0x7f00000002c0)={0x38, 0x2, 0x1, 0x0, 0x3, 0x0, 0x2000000000}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r5, &(0x7f00000017c0), 0x199, 0x0) syz_open_dev$usbfs(0x0, 0x77, 0x1) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f00000006c0)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r8, 0x6628, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r9, 0x40086602, 0x400007) write$cgroup_int(r9, &(0x7f0000000200), 0x12) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r10, 0x40086602, 0x400007) write$cgroup_int(r10, &(0x7f0000000200), 0x12) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r11, 0x6628, 0x0) r12 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r12, 0x6628, 0x0) r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r13, 0x40086602, 0x400007) write$cgroup_int(r13, &(0x7f0000000200), 0x12) ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x8038550a, &(0x7f0000000140)=ANY=[@ANYRES16=r9, @ANYPTR=&(0x7f0000000840)=ANY=[@ANYBLOB="c5dc0a7110ffb97fa2acf52ad0b3acc2d3ff976a7fd28f5eeabc1e3cece1be2a3bfde8a5a6ac83e6a16af7f855ae526d1c3b065d051fbe60e79c28992ce2d8f4faf214d8047ab0c16f14731040c2ad989fb5dc7229ac12820fed46869ad020bea6e843e27b054df2eebbaa27d44a78d9433dbb2dc4d42c20419f5d9539cf92dac3dfaf4c7376f4c86f40b5c9e9e468228ba71bef1043ea2aa275d235231c5da8fb5c844bad57c58323fa12456f07fdb8cfecc29823a13cc9e62e616787f72d1c1676f209634e0000", @ANYRESOCT=r3, @ANYRESDEC, @ANYPTR64, @ANYRES16=0x0, @ANYRES64=r8], @ANYPTR=&(0x7f00000005c0)=ANY=[@ANYRESDEC=0x0, @ANYBLOB="2c6850a71e7358b7144628e26047563c4112f583787942db3af5062ac67941d17df4986ba46044768781f351ce48eb9f38df53ee7257752843ee0007d1b2b29432c4f14eff886d5e5c1353b670bb91d0a69f0c1cf632b50af98eae6c9c4238c7d0fa66dc7a9eaea79843eaf51911317b57c8929e2c1ff8b0b3e7fecaa81b6ca7db7aa6c78da84761257b60e754f74e9c42160421428a4c221096630fbc85867a942e802cde764bd25e08e0828ef56bd62a25d55ba09a5380b482c1f8b3", @ANYRES16=r6, @ANYRES16=r10, @ANYRES64, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRESOCT=r11, @ANYRESHEX=0x0, @ANYRESDEC, @ANYRESDEC=r13, @ANYRESOCT], @ANYRES32=r12], @ANYPTR=&(0x7f0000000200)=ANY=[]]) utime(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400)={0x0, 0xffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff}) close(r14) ioctl$FUSE_DEV_IOC_CLONE(r14, 0x8004e500, &(0x7f00000001c0)=r3) 06:00:33 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) write$cgroup_int(r1, &(0x7f0000000200), 0x12) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) r2 = dup2(0xffffffffffffffff, r1) ioctl$TCFLSH(r2, 0x540b, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 06:00:33 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x4}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) 06:00:33 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0xf0ffffff7f0000, 0x0) 06:00:33 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3, &(0x7f00000008c0)=[{&(0x7f00000000c0)="8000000038040000197a0300e60100006c003304000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x3ff8000000000}, {&(0x7f00000005c0)="b4065f2ab9075ba253e109154559f88f062320246c5ae74af8e236a42c0cd0b73085bf4313acfd026684e3be45cf8f03379864cd059401666557f67127a057d2cb8d6521890c5cbfe5eaf821257dfacfaf5ef8b4c06e941318d3eec42a910d1420306249520086172e5e2f0c2308655d2a82735e431f158af85763d2d76375e78b343d563d952660c79ecfad7ccb16689bcb4fed9533483595eb30e2671cd545", 0xa0, 0x4}], 0x4803, 0x0) [ 2241.999141][ T6911] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2242.012561][ T22] kauditd_printk_skb: 543 callbacks suppressed [ 2242.012571][ T22] audit: type=1400 audit(1579672833.084:345678): avc: denied { map } for pid=6916 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 06:00:33 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000068900000000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2242.058953][ T6911] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2242.068816][ T22] audit: type=1400 audit(1579672833.084:345679): avc: denied { map } for pid=6916 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 06:00:33 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x8}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) [ 2242.124839][ T22] audit: type=1400 audit(1579672833.084:345680): avc: denied { map } for pid=6916 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2242.126109][ T6911] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock 06:00:33 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x100000000000000, 0x0) [ 2242.178906][ T22] audit: type=1400 audit(1579672833.084:345681): avc: denied { map } for pid=6916 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2242.215070][ T6911] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature 06:00:33 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000a00080000000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:00:33 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpgrp(0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x75, 0x1, 0x0, 0x2000, 0x7, 0x0, 0x800000000000, 0x0, 0x0, 0xffffffff}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002380)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) r4 = gettid() sched_setattr(r4, &(0x7f00000002c0)={0x38, 0x2, 0x1, 0x0, 0x3, 0x0, 0x2000000000}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r5, &(0x7f00000017c0), 0x199, 0x0) syz_open_dev$usbfs(0x0, 0x77, 0x1) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f00000006c0)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r8, 0x6628, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r9, 0x40086602, 0x400007) write$cgroup_int(r9, &(0x7f0000000200), 0x12) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r10, 0x40086602, 0x400007) write$cgroup_int(r10, &(0x7f0000000200), 0x12) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r11, 0x6628, 0x0) r12 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r12, 0x6628, 0x0) r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r13, 0x40086602, 0x400007) write$cgroup_int(r13, &(0x7f0000000200), 0x12) ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x8038550a, &(0x7f0000000140)=ANY=[@ANYRES16=r9, @ANYPTR=&(0x7f0000000840)=ANY=[@ANYBLOB="c5dc0a7110ffb97fa2acf52ad0b3acc2d3ff976a7fd28f5eeabc1e3cece1be2a3bfde8a5a6ac83e6a16af7f855ae526d1c3b065d051fbe60e79c28992ce2d8f4faf214d8047ab0c16f14731040c2ad989fb5dc7229ac12820fed46869ad020bea6e843e27b054df2eebbaa27d44a78d9433dbb2dc4d42c20419f5d9539cf92dac3dfaf4c7376f4c86f40b5c9e9e468228ba71bef1043ea2aa275d235231c5da8fb5c844bad57c58323fa12456f07fdb8cfecc29823a13cc9e62e616787f72d1c1676f209634e0000", @ANYRESOCT=r3, @ANYRESDEC, @ANYPTR64, @ANYRES16=0x0, @ANYRES64=r8], @ANYPTR=&(0x7f00000005c0)=ANY=[@ANYRESDEC=0x0, @ANYBLOB="2c6850a71e7358b7144628e26047563c4112f583787942db3af5062ac67941d17df4986ba46044768781f351ce48eb9f38df53ee7257752843ee0007d1b2b29432c4f14eff886d5e5c1353b670bb91d0a69f0c1cf632b50af98eae6c9c4238c7d0fa66dc7a9eaea79843eaf51911317b57c8929e2c1ff8b0b3e7fecaa81b6ca7db7aa6c78da84761257b60e754f74e9c42160421428a4c221096630fbc85867a942e802cde764bd25e08e0828ef56bd62a25d55ba09a5380b482c1f8b3", @ANYRES16=r6, @ANYRES16=r10, @ANYRES64, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRESOCT=r11, @ANYRESHEX=0x0, @ANYRESDEC, @ANYRESDEC=r13, @ANYRESOCT], @ANYRES32=r12], @ANYPTR=&(0x7f0000000200)=ANY=[]]) utime(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400)={0x0, 0xffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff}) close(r14) ioctl$FUSE_DEV_IOC_CLONE(r14, 0x8004e500, &(0x7f00000001c0)=r3) [ 2242.234514][ T6926] overlayfs: missing 'lowerdir' [ 2242.237435][ T22] audit: type=1400 audit(1579672833.084:345682): avc: denied { map } for pid=6916 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2242.257874][ T6911] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 2242.276061][ T22] audit: type=1400 audit(1579672833.084:345683): avc: denied { map } for pid=6916 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2242.301359][ T6911] EXT4-fs (loop3): mount failed [ 2242.307599][ T22] audit: type=1400 audit(1579672833.084:345684): avc: denied { map } for pid=6916 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 06:00:33 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000000010000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:00:33 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x6628, 0x0) vmsplice(r1, &(0x7f0000000340)=[{&(0x7f0000000300)="e6f534a4897ba585d30c3a0753d49f0db48f6abd279956de2417d46e27923afc621dd2e799ce3b3a504aacea1e", 0x2d}, {&(0x7f0000000540)="91ef181581cf7dea3035c12c3045618cdc150d6141dbe18d90b3d3ca5997e7fc6dc3728ead8a10bddd40fc3a86fc369087f13cc023edce06696fe2a7d9a0ccb2156f04ca1fd68fc0174e40f48c3570de519731a2b0ecdf0b2fd211c4b480c139b4", 0x61}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(0xffffffffffffffff, 0x8108551b, &(0x7f0000000400)={0xb18, 0x2, "afca783a8e1e945b8db22ef2a9ca12525e3cf5b7388fc893478237dc2254eb47db71aa1b1b40186ca20913c1902c256d229d057071d435b7c4844013d9d828676c21f8beeab0aff3ae423653bc72704c0c39a1f4a89dd5550f00d81bab35d318a09114deb0219165468e3859c534e90d9949c106187d6cb296b183e1b342e58ce03772dcce942f7caa999477ff9b72aec7ebd941b97f932e154b2cab976ca43956069c24d869a15f397de925bf5adc34ddd07e3d365a8d948eba7d44eb4857115598333f5fcb75ee4129afa082b001551ee4c0ad2e75ef7a8f3c15f6a2812075c3234a972b2e5e443ec0f7b095376d91b71bddf12ad4babe3ae4e62771a21a11"}) write$P9_RRENAME(r2, &(0x7f0000000280)={0x7, 0x15, 0x2}, 0x7) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x6628, 0x0) r4 = syz_genetlink_get_family_id$batadv(&(0x7f00000003c0)='batadv\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000600)={'veth0_to_bridge\x00', 0x0}) sendmsg$BATADV_CMD_SET_HARDIF(r3, &(0x7f00000006c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x3c, r4, 0x4, 0x70bd25, 0x25dfdbfd, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r5}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}, @BATADV_ATTR_HOP_PENALTY={0x5}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xd6c}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20000000}, 0x10004000) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) fcntl$notify(r6, 0x402, 0xc0000014) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) r10 = gettid() r11 = dup3(r7, 0xffffffffffffffff, 0x80000) ioctl$EVIOCSABS3F(r11, 0x401845ff, &(0x7f00000002c0)={0x7, 0x1000, 0x4, 0x7fffffff, 0x1, 0x6}) rt_sigqueueinfo(r10, 0x21, &(0x7f0000000000)) ptrace$setregs(0xf, r10, 0x800, &(0x7f0000000700)="1b7174cca11248c45d47e390febe6ff913fde7b57ab829725e412b1da8e42854a5c8d0623af5b28a79d91657aefdc286cb50bc408c3ce1abea574a4d801e01c85097092b834eed1431b7860442967272aed3d3a857422aa78a7f33b6eecb2c7f3708989072065127dd2a505332536821337d94a2017db314d32efb994102568e3d69cde247e37b5b579037fd8ac621f97e4974faf6857ee0a21927ef9780f01421758b4305bacbbc9ea3726a4df7b6306f85291b2c494c00143d7a87181600501dc21077f9c75d153fa6441bf5499105a9a31a98ba436a993a2fbae8211580abf538ad") ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) r12 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r12, 0x6628, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS(r12, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x5, 0x1, 0x101, 0x0, 0x0, {0xa, 0x0, 0x5}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x40d5}, 0x4000000) ptrace$cont(0x20, r0, 0x0, 0x0) [ 2242.334118][ T22] audit: type=1400 audit(1579672833.084:345685): avc: denied { map } for pid=6916 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2242.360635][ T22] audit: type=1400 audit(1579672833.084:345686): avc: denied { map } for pid=6916 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 06:00:33 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x400000000000000, 0x0) [ 2242.386699][ T22] audit: type=1400 audit(1579672833.094:345687): avc: denied { map } for pid=6916 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 06:00:33 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000000020000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:00:33 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x64}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) [ 2242.443498][ T6911] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2242.470524][ T6911] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 06:00:33 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x4000000000000000, 0x0) [ 2242.517776][ T6911] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2242.552073][ T6911] EXT4-fs: failed to create workqueue [ 2242.599565][ T6911] EXT4-fs (loop3): mount failed 06:00:33 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3, &(0x7f00000008c0)=[{&(0x7f00000000c0)="8000000038040000197a0300e60100006c003404000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x3ff8000000000}, {&(0x7f00000005c0)="b4065f2ab9075ba253e109154559f88f062320246c5ae74af8e236a42c0cd0b73085bf4313acfd026684e3be45cf8f03379864cd059401666557f67127a057d2cb8d6521890c5cbfe5eaf821257dfacfaf5ef8b4c06e941318d3eec42a910d1420306249520086172e5e2f0c2308655d2a82735e431f158af85763d2d76375e78b343d563d952660c79ecfad7ccb16689bcb4fed9533483595eb30e2671cd545", 0xa0, 0x4}], 0x4803, 0x0) 06:00:33 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpgrp(0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x75, 0x1, 0x0, 0x2000, 0x7, 0x0, 0x800000000000, 0x0, 0x0, 0xffffffff}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002380)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) r4 = gettid() sched_setattr(r4, &(0x7f00000002c0)={0x38, 0x2, 0x1, 0x0, 0x3, 0x0, 0x2000000000}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r5, &(0x7f00000017c0), 0x199, 0x0) syz_open_dev$usbfs(0x0, 0x77, 0x1) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f00000006c0)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r8, 0x6628, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r9, 0x40086602, 0x400007) write$cgroup_int(r9, &(0x7f0000000200), 0x12) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r10, 0x40086602, 0x400007) write$cgroup_int(r10, &(0x7f0000000200), 0x12) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r11, 0x6628, 0x0) r12 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r12, 0x6628, 0x0) r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r13, 0x40086602, 0x400007) write$cgroup_int(r13, &(0x7f0000000200), 0x12) ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x8038550a, &(0x7f0000000140)=ANY=[@ANYRES16=r9, @ANYPTR=&(0x7f0000000840)=ANY=[@ANYBLOB="c5dc0a7110ffb97fa2acf52ad0b3acc2d3ff976a7fd28f5eeabc1e3cece1be2a3bfde8a5a6ac83e6a16af7f855ae526d1c3b065d051fbe60e79c28992ce2d8f4faf214d8047ab0c16f14731040c2ad989fb5dc7229ac12820fed46869ad020bea6e843e27b054df2eebbaa27d44a78d9433dbb2dc4d42c20419f5d9539cf92dac3dfaf4c7376f4c86f40b5c9e9e468228ba71bef1043ea2aa275d235231c5da8fb5c844bad57c58323fa12456f07fdb8cfecc29823a13cc9e62e616787f72d1c1676f209634e0000", @ANYRESOCT=r3, @ANYRESDEC, @ANYPTR64, @ANYRES16=0x0, @ANYRES64=r8], @ANYPTR=&(0x7f00000005c0)=ANY=[@ANYRESDEC=0x0, @ANYBLOB="2c6850a71e7358b7144628e26047563c4112f583787942db3af5062ac67941d17df4986ba46044768781f351ce48eb9f38df53ee7257752843ee0007d1b2b29432c4f14eff886d5e5c1353b670bb91d0a69f0c1cf632b50af98eae6c9c4238c7d0fa66dc7a9eaea79843eaf51911317b57c8929e2c1ff8b0b3e7fecaa81b6ca7db7aa6c78da84761257b60e754f74e9c42160421428a4c221096630fbc85867a942e802cde764bd25e08e0828ef56bd62a25d55ba09a5380b482c1f8b3", @ANYRES16=r6, @ANYRES16=r10, @ANYRES64, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRESOCT=r11, @ANYRESHEX=0x0, @ANYRESDEC, @ANYRESDEC=r13, @ANYRESOCT], @ANYRES32=r12], @ANYPTR=&(0x7f0000000200)=ANY=[]]) utime(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400)={0x0, 0xffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff}) close(r14) ioctl$FUSE_DEV_IOC_CLONE(r14, 0x8004e500, &(0x7f00000001c0)=r3) 06:00:33 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000000040000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:00:33 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x300}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) 06:00:33 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x7f00000000000000, 0x0) 06:00:33 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000100)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_LIST(r4, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0xffc23a8bc794fe23}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB='d\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="000129bd7000fbdbdf25020000001400030000000000000000000000ffffe00000012600070073797374656d5f753a6f626a6563745f723a68616c645f63616368655f743a73300000001473797a5f74756e00"/94], 0x64}, 0x1, 0x0, 0x0, 0x4000}, 0x41) ioctl$PPPIOCSACTIVE(r3, 0x40107446, &(0x7f00000002c0)={0x3, &(0x7f0000000280)=[{0x5, 0x8, 0x40, 0x7f}, {0x7d, 0x8, 0x7, 0x2}, {0x7, 0x2, 0x3, 0x1ff}]}) ptrace$cont(0x20, r0, 0x0, 0x0) 06:00:33 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000000060000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2242.870200][ T6998] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2242.880635][ T6998] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2242.895460][ T6998] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock 06:00:34 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000000080000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2242.912416][ T6998] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature 06:00:34 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0xfeffffff00000000, 0x0) [ 2242.956076][ T6998] EXT4-fs (loop3): corrupt root inode, run e2fsck 06:00:34 executing program 5: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x64}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) 06:00:34 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x8bf}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) [ 2243.041472][ T7010] overlayfs: missing 'lowerdir' [ 2243.051959][ T6998] EXT4-fs (loop3): mount failed 06:00:34 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000006080000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2243.198760][ T6998] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2243.239819][ T6998] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2243.251524][ T6998] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2243.265553][ T6998] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 2243.280816][ T6998] EXT4-fs (loop3): corrupt root inode, run e2fsck 06:00:34 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpgrp(0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x75, 0x1, 0x0, 0x2000, 0x7, 0x0, 0x800000000000, 0x0, 0x0, 0xffffffff}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002380)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) r4 = gettid() sched_setattr(r4, &(0x7f00000002c0)={0x38, 0x2, 0x1, 0x0, 0x3, 0x0, 0x2000000000}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r5, &(0x7f00000017c0), 0x199, 0x0) syz_open_dev$usbfs(0x0, 0x77, 0x1) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f00000006c0)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r8, 0x6628, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r9, 0x40086602, 0x400007) write$cgroup_int(r9, &(0x7f0000000200), 0x12) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r10, 0x40086602, 0x400007) write$cgroup_int(r10, &(0x7f0000000200), 0x12) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r11, 0x6628, 0x0) r12 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r12, 0x6628, 0x0) r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r13, 0x40086602, 0x400007) write$cgroup_int(r13, &(0x7f0000000200), 0x12) ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x8038550a, &(0x7f0000000140)=ANY=[@ANYRES16=r9, @ANYPTR=&(0x7f0000000840)=ANY=[@ANYBLOB="c5dc0a7110ffb97fa2acf52ad0b3acc2d3ff976a7fd28f5eeabc1e3cece1be2a3bfde8a5a6ac83e6a16af7f855ae526d1c3b065d051fbe60e79c28992ce2d8f4faf214d8047ab0c16f14731040c2ad989fb5dc7229ac12820fed46869ad020bea6e843e27b054df2eebbaa27d44a78d9433dbb2dc4d42c20419f5d9539cf92dac3dfaf4c7376f4c86f40b5c9e9e468228ba71bef1043ea2aa275d235231c5da8fb5c844bad57c58323fa12456f07fdb8cfecc29823a13cc9e62e616787f72d1c1676f209634e0000", @ANYRESOCT=r3, @ANYRESDEC, @ANYPTR64, @ANYRES16=0x0, @ANYRES64=r8], @ANYPTR=&(0x7f00000005c0)=ANY=[@ANYRESDEC=0x0, @ANYBLOB="2c6850a71e7358b7144628e26047563c4112f583787942db3af5062ac67941d17df4986ba46044768781f351ce48eb9f38df53ee7257752843ee0007d1b2b29432c4f14eff886d5e5c1353b670bb91d0a69f0c1cf632b50af98eae6c9c4238c7d0fa66dc7a9eaea79843eaf51911317b57c8929e2c1ff8b0b3e7fecaa81b6ca7db7aa6c78da84761257b60e754f74e9c42160421428a4c221096630fbc85867a942e802cde764bd25e08e0828ef56bd62a25d55ba09a5380b482c1f8b3", @ANYRES16=r6, @ANYRES16=r10, @ANYRES64, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRESOCT=r11, @ANYRESHEX=0x0, @ANYRESDEC, @ANYRESDEC=r13, @ANYRESOCT], @ANYRES32=r12], @ANYPTR=&(0x7f0000000200)=ANY=[]]) utime(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400)={0x0, 0xffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff}) close(r14) ioctl$FUSE_DEV_IOC_CLONE(r14, 0x8004e500, &(0x7f00000001c0)=r3) [ 2243.293633][ T6998] EXT4-fs (loop3): mount failed 06:00:34 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) rt_sigpending(&(0x7f0000000000), 0x8) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 06:00:34 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0xffefffffff7f0000, 0x0) 06:00:34 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x6400}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) 06:00:34 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe80000000000d0000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:00:34 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3, &(0x7f00000008c0)=[{&(0x7f00000000c0)="8000000038040000197a0300e60100006c003704000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x3ff8000000000}, {&(0x7f00000005c0)="b4065f2ab9075ba253e109154559f88f062320246c5ae74af8e236a42c0cd0b73085bf4313acfd026684e3be45cf8f03379864cd059401666557f67127a057d2cb8d6521890c5cbfe5eaf821257dfacfaf5ef8b4c06e941318d3eec42a910d1420306249520086172e5e2f0c2308655d2a82735e431f158af85763d2d76375e78b343d563d952660c79ecfad7ccb16689bcb4fed9533483595eb30e2671cd545", 0xa0, 0x4}], 0x4803, 0x0) 06:00:34 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe80000000001f0000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:00:34 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0xbf08}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) 06:00:34 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0xffffffff00000000, 0x0) [ 2243.553920][ T7065] overlayfs: missing 'lowerdir' 06:00:34 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x3000000}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) [ 2243.604844][ T7063] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 06:00:34 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000000280000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:00:34 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpgrp(0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x75, 0x1, 0x0, 0x2000, 0x7, 0x0, 0x800000000000, 0x0, 0x0, 0xffffffff}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002380)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) r4 = gettid() sched_setattr(r4, &(0x7f00000002c0)={0x38, 0x2, 0x1, 0x0, 0x3, 0x0, 0x2000000000}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r5, &(0x7f00000017c0), 0x199, 0x0) syz_open_dev$usbfs(0x0, 0x77, 0x1) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f00000006c0)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r8, 0x6628, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r9, 0x40086602, 0x400007) write$cgroup_int(r9, &(0x7f0000000200), 0x12) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r10, 0x40086602, 0x400007) write$cgroup_int(r10, &(0x7f0000000200), 0x12) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r11, 0x6628, 0x0) r12 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r12, 0x6628, 0x0) r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r13, 0x40086602, 0x400007) write$cgroup_int(r13, &(0x7f0000000200), 0x12) ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x8038550a, &(0x7f0000000140)=ANY=[@ANYRES16=r9, @ANYPTR=&(0x7f0000000840)=ANY=[@ANYBLOB="c5dc0a7110ffb97fa2acf52ad0b3acc2d3ff976a7fd28f5eeabc1e3cece1be2a3bfde8a5a6ac83e6a16af7f855ae526d1c3b065d051fbe60e79c28992ce2d8f4faf214d8047ab0c16f14731040c2ad989fb5dc7229ac12820fed46869ad020bea6e843e27b054df2eebbaa27d44a78d9433dbb2dc4d42c20419f5d9539cf92dac3dfaf4c7376f4c86f40b5c9e9e468228ba71bef1043ea2aa275d235231c5da8fb5c844bad57c58323fa12456f07fdb8cfecc29823a13cc9e62e616787f72d1c1676f209634e0000", @ANYRESOCT=r3, @ANYRESDEC, @ANYPTR64, @ANYRES16=0x0, @ANYRES64=r8], @ANYPTR=&(0x7f00000005c0)=ANY=[@ANYRESDEC=0x0, @ANYBLOB="2c6850a71e7358b7144628e26047563c4112f583787942db3af5062ac67941d17df4986ba46044768781f351ce48eb9f38df53ee7257752843ee0007d1b2b29432c4f14eff886d5e5c1353b670bb91d0a69f0c1cf632b50af98eae6c9c4238c7d0fa66dc7a9eaea79843eaf51911317b57c8929e2c1ff8b0b3e7fecaa81b6ca7db7aa6c78da84761257b60e754f74e9c42160421428a4c221096630fbc85867a942e802cde764bd25e08e0828ef56bd62a25d55ba09a5380b482c1f8b3", @ANYRES16=r6, @ANYRES16=r10, @ANYRES64, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRESOCT=r11, @ANYRESHEX=0x0, @ANYRESDEC, @ANYRESDEC=r13, @ANYRESOCT], @ANYRES32=r12], @ANYPTR=&(0x7f0000000200)=ANY=[]]) utime(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400)={0x0, 0xffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff}) close(r14) ioctl$FUSE_DEV_IOC_CLONE(r14, 0x8004e500, &(0x7f00000001c0)=r3) [ 2243.713271][ T7063] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2243.724020][ T7063] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock 06:00:34 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x4000000}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) [ 2243.751893][ T7063] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 2243.799252][ T7063] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 2243.813648][ T7063] EXT4-fs (loop3): mount failed [ 2243.905810][ T7063] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2243.927551][ T7063] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2243.977479][ T7063] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2244.005957][ T7063] EXT4-fs: failed to create workqueue [ 2244.014719][ T7063] EXT4-fs (loop3): mount failed 06:00:37 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0xffffffffa0008000, 0x0) 06:00:37 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 06:00:37 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3, &(0x7f00000008c0)=[{&(0x7f00000000c0)="8000000038040000197a0300e60100006c003804000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x3ff8000000000}, {&(0x7f00000005c0)="b4065f2ab9075ba253e109154559f88f062320246c5ae74af8e236a42c0cd0b73085bf4313acfd026684e3be45cf8f03379864cd059401666557f67127a057d2cb8d6521890c5cbfe5eaf821257dfacfaf5ef8b4c06e941318d3eec42a910d1420306249520086172e5e2f0c2308655d2a82735e431f158af85763d2d76375e78b343d563d952660c79ecfad7ccb16689bcb4fed9533483595eb30e2671cd545", 0xa0, 0x4}], 0x4803, 0x0) 06:00:37 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x8000000}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) 06:00:37 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpgrp(0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x75, 0x1, 0x0, 0x2000, 0x7, 0x0, 0x800000000000, 0x0, 0x0, 0xffffffff}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002380)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) r4 = gettid() sched_setattr(r4, &(0x7f00000002c0)={0x38, 0x2, 0x1, 0x0, 0x3, 0x0, 0x2000000000}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r5, &(0x7f00000017c0), 0x199, 0x0) syz_open_dev$usbfs(0x0, 0x77, 0x1) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f00000006c0)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r8, 0x6628, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r9, 0x40086602, 0x400007) write$cgroup_int(r9, &(0x7f0000000200), 0x12) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r10, 0x40086602, 0x400007) write$cgroup_int(r10, &(0x7f0000000200), 0x12) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r11, 0x6628, 0x0) r12 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r12, 0x6628, 0x0) r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r13, 0x40086602, 0x400007) write$cgroup_int(r13, &(0x7f0000000200), 0x12) ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x8038550a, &(0x7f0000000140)=ANY=[@ANYRES16=r9, @ANYPTR=&(0x7f0000000840)=ANY=[@ANYBLOB="c5dc0a7110ffb97fa2acf52ad0b3acc2d3ff976a7fd28f5eeabc1e3cece1be2a3bfde8a5a6ac83e6a16af7f855ae526d1c3b065d051fbe60e79c28992ce2d8f4faf214d8047ab0c16f14731040c2ad989fb5dc7229ac12820fed46869ad020bea6e843e27b054df2eebbaa27d44a78d9433dbb2dc4d42c20419f5d9539cf92dac3dfaf4c7376f4c86f40b5c9e9e468228ba71bef1043ea2aa275d235231c5da8fb5c844bad57c58323fa12456f07fdb8cfecc29823a13cc9e62e616787f72d1c1676f209634e0000", @ANYRESOCT=r3, @ANYRESDEC, @ANYPTR64, @ANYRES16=0x0, @ANYRES64=r8], @ANYPTR=&(0x7f00000005c0)=ANY=[@ANYRESDEC=0x0, @ANYBLOB="2c6850a71e7358b7144628e26047563c4112f583787942db3af5062ac67941d17df4986ba46044768781f351ce48eb9f38df53ee7257752843ee0007d1b2b29432c4f14eff886d5e5c1353b670bb91d0a69f0c1cf632b50af98eae6c9c4238c7d0fa66dc7a9eaea79843eaf51911317b57c8929e2c1ff8b0b3e7fecaa81b6ca7db7aa6c78da84761257b60e754f74e9c42160421428a4c221096630fbc85867a942e802cde764bd25e08e0828ef56bd62a25d55ba09a5380b482c1f8b3", @ANYRES16=r6, @ANYRES16=r10, @ANYRES64, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRESOCT=r11, @ANYRESHEX=0x0, @ANYRESDEC, @ANYRESDEC=r13, @ANYRESOCT], @ANYRES32=r12], @ANYPTR=&(0x7f0000000200)=ANY=[]]) utime(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400)={0x0, 0xffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff}) close(r14) ioctl$FUSE_DEV_IOC_CLONE(r14, 0x8004e500, &(0x7f00000001c0)=r3) 06:00:37 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000000290000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:00:37 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe80000000002b0000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:00:37 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0xffffffffff600000, 0x0) [ 2246.422329][ T7106] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2246.453400][ T7106] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 06:00:37 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x64000000}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) [ 2246.469583][ T7106] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2246.520271][ T7106] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 2246.586635][ T7128] overlayfs: missing 'lowerdir' 06:00:37 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe80000000002c0000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:00:37 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x4) 06:00:37 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe80000000002f0000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2246.645326][ T7106] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 2246.683145][ T7106] EXT4-fs (loop3): mount failed 06:00:37 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 2246.750560][ T7106] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2246.774880][ T7106] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 06:00:37 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x803, 0x2) r5 = socket(0x10, 0x3, 0x0) r6 = socket(0x11, 0x800000003, 0x0) bind(r6, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r6, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)=@ipv6_newroute={0x24, 0x18, 0x1, 0x0, 0x0, {}, [@RTA_OIF={0x8, 0x4, r7}]}, 0x24}}, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x8936, &(0x7f0000000000)={@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], @local}, 0x0, r7}) setsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={r7, @dev={0xac, 0x14, 0x14, 0x26}, @remote}, 0xc) [ 2246.794901][ T7106] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock 06:00:37 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe80000000003c0000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:00:37 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0xbf080000}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) 06:00:37 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3, &(0x7f00000008c0)=[{&(0x7f00000000c0)="8000000038040000197a0300e60100006c008004000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x3ff8000000000}, {&(0x7f00000005c0)="b4065f2ab9075ba253e109154559f88f062320246c5ae74af8e236a42c0cd0b73085bf4313acfd026684e3be45cf8f03379864cd059401666557f67127a057d2cb8d6521890c5cbfe5eaf821257dfacfaf5ef8b4c06e941318d3eec42a910d1420306249520086172e5e2f0c2308655d2a82735e431f158af85763d2d76375e78b343d563d952660c79ecfad7ccb16689bcb4fed9533483595eb30e2671cd545", 0xa0, 0x4}], 0x4803, 0x0) [ 2246.859096][ T7106] EXT4-fs: failed to create workqueue [ 2246.864693][ T7106] EXT4-fs (loop3): mount failed 06:00:38 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x2000) 06:00:38 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000000400000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:00:38 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0xfefdffff}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) [ 2247.025753][ T22] kauditd_printk_skb: 338 callbacks suppressed [ 2247.025761][ T22] audit: type=1400 audit(1579672838.094:346026): avc: denied { watch } for pid=998 comm="udevd" path="/dev/loop3" dev="devtmpfs" ino=34085 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 06:00:38 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x4000) [ 2247.091030][ T7169] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2247.099756][ T22] audit: type=1400 audit(1579672838.174:346027): avc: denied { map } for pid=7175 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2247.128938][ T7169] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2247.140509][ T7169] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2247.146611][ T22] audit: type=1400 audit(1579672838.194:346028): avc: denied { watch } for pid=1013 comm="udevd" path="/dev/loop5" dev="devtmpfs" ino=124806 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 [ 2247.175599][ T7169] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 2247.191324][ T7173] EXT4-fs (loop5): bad geometry: block count 1080 exceeds size of device (1 blocks) [ 2247.202009][ T7169] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 2247.207754][ T22] audit: type=1400 audit(1579672838.204:346029): avc: denied { map } for pid=7175 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 06:00:38 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000005430000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2247.256868][ T22] audit: type=1400 audit(1579672838.204:346030): avc: denied { map } for pid=7175 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2247.278952][ T7169] EXT4-fs (loop3): mount failed [ 2247.302037][ T22] audit: type=1400 audit(1579672838.204:346031): avc: denied { map } for pid=7175 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 06:00:38 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0xfffffdfe}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) [ 2247.357460][ T22] audit: type=1400 audit(1579672838.204:346032): avc: denied { map } for pid=7175 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 06:00:38 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) write$cgroup_int(r0, &(0x7f0000000200), 0x12) write$eventfd(r0, &(0x7f0000000000)=0x5, 0x8) sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x4c, 0x0, 0x4, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x2}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x32}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x3ff}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0xfffffff7}, @BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40}, 0x4000000) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x21, &(0x7f0000000000)) ptrace$setopts(0x4206, r2, 0x2, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ptrace$cont(0x9, 0x0, 0xcf2, 0xfffffffffffffffd) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x40086602, 0x400007) write$cgroup_int(r6, &(0x7f0000000200), 0x12) setsockopt$inet6_tcp_int(r6, 0x6, 0x10, &(0x7f0000000100)=0x66, 0x4) ptrace$cont(0x20, r1, 0x0, 0x0) [ 2247.407877][ T22] audit: type=1400 audit(1579672838.204:346033): avc: denied { map } for pid=7175 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2247.446434][ T22] audit: type=1400 audit(1579672838.204:346034): avc: denied { map } for pid=7175 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2247.478755][ T22] audit: type=1400 audit(1579672838.204:346035): avc: denied { map } for pid=7175 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2247.527832][ T7173] EXT4-fs (loop5): bad geometry: block count 1080 exceeds size of device (1 blocks) [ 2247.548353][ T7169] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2247.581591][ T7169] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 06:00:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3, &(0x7f00000008c0)=[{&(0x7f00000000c0)="8000000038040000197a0300e60100006c003804000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x3ff8000000000}, {&(0x7f00000005c0)="b4065f2ab9075ba253e109154559f88f062320246c5ae74af8e236a42c0cd0b73085bf4313acfd026684e3be45cf8f03379864cd059401666557f67127a057d2cb8d6521890c5cbfe5eaf821257dfacfaf5ef8b4c06e941318d3eec42a910d1420306249520086172e5e2f0c2308655d2a82735e431f158af85763d2d76375e78b343d563d952660c79ecfad7ccb16689bcb4fed9533483595eb30e2671cd545", 0xa0, 0x4}], 0x4803, 0x0) 06:00:38 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x60ff) 06:00:38 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000000740000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:00:38 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x300000000000000}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) [ 2247.623296][ T7169] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2247.645574][ T7169] EXT4-fs: failed to create workqueue [ 2247.654365][ T7169] EXT4-fs (loop3): mount failed 06:00:38 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3, &(0x7f00000008c0)=[{&(0x7f00000000c0)="8000000038040000197a0300e60100006c000005000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x3ff8000000000}, {&(0x7f00000005c0)="b4065f2ab9075ba253e109154559f88f062320246c5ae74af8e236a42c0cd0b73085bf4313acfd026684e3be45cf8f03379864cd059401666557f67127a057d2cb8d6521890c5cbfe5eaf821257dfacfaf5ef8b4c06e941318d3eec42a910d1420306249520086172e5e2f0c2308655d2a82735e431f158af85763d2d76375e78b343d563d952660c79ecfad7ccb16689bcb4fed9533483595eb30e2671cd545", 0xa0, 0x4}], 0x4803, 0x0) 06:00:38 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$BINDER_THREAD_EXIT(r1, 0x40046208, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x2, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x800, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r2}, 0x78) r3 = getpid() ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000300)="7fd1050ed8ec8d49e442f71004e1a025f655414e866ed68f9d8cf3f2adb1f9236922504805322b61f5c7c3982042c0dcc918bdf22bf8555fe962fd1b7eaed172efcf28f8eb10d15febc17641aab8d95c00bf8901f3d0d1fc43f673c63f9f36f19a09e1ccf8d853632c25e6bd5a2193838957e28c6f810776f0761eae72") socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$RTC_AIE_ON(r6, 0x7001) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r8, 0x40086602, 0x400007) write$cgroup_int(r8, &(0x7f0000000200), 0x12) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r8, 0x40086602, 0x0) write$cgroup_int(r7, &(0x7f0000000200), 0x12) open(&(0x7f0000000180)='./file0\x00', 0x4000, 0x54) r9 = dup2(r7, 0xffffffffffffffff) r10 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x40200, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r9, 0x6, &(0x7f0000000100)={0x10001, &(0x7f0000000040)=[r10]}, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r11, 0x40086602, 0x400007) write$cgroup_int(r11, &(0x7f0000000200)=0x3, 0x12) ioctl$PPPIOCSMAXCID(r11, 0x40047451, &(0x7f0000000280)=0x6f1f) r12 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r12, 0x6628, 0x0) readahead(r12, 0x745, 0x6) ptrace$cont(0x20, r0, 0x0, 0x0) 06:00:38 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe800000000e800000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:00:38 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x400000000000000}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) 06:00:38 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000035800000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:00:38 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x7600) [ 2247.837361][ T7217] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 06:00:39 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) write$cgroup_int(r1, &(0x7f0000000200), 0x12) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000000)={0x17, 0xe5, &(0x7f0000000180)="00d4934f167dde662590e97e9481bfec4562f05d8bc60dfd813d02c42dea19ba8be469946a5b620bcb9d88fe9445b5f8b211e287b811fab7ddf7dd5fc35fe7f69064687f4bed46a8af114933917717ae47feb368fb7d4a3a4367f05773c52b01da8721a71eff9809ac5d647b37056407f8dd2456375608d1039386045cbf41e8952992be4a98a8a1b80a746a354c5db6ae3c39141f5d5edbfa59b9c117bdebaf54f8f3e6a88ef7bf2937d01b616f47cccb1648940e606a5c5c9b1a2d0fbf85a22ab751c3fe8e00ff9854995b4965dd4e31935ae4958148ccb4f6b925cea021973cb0852b73"}) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 06:00:39 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000000810000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2247.965080][ T7217] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2248.021103][ T7217] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2248.035668][ T7217] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 2248.060191][ T7242] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2248.099782][ T7217] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 2248.101877][ T7242] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2248.131487][ T7242] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2248.139900][ T7217] EXT4-fs (loop3): mount failed [ 2248.192618][ T7242] EXT4-fs error (device loop5): ext4_fill_super:4518: inode #2: comm syz-executor.5: casefold flag without casefold feature [ 2248.210690][ T7242] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 2248.217616][ T7242] EXT4-fs (loop5): mount failed 06:00:39 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x7f00) 06:00:39 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x800000000000000}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) 06:00:39 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000000820000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2248.318313][ T7217] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2248.329579][ T7217] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2248.370016][ T7217] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2248.398109][ T7217] EXT4-fs: failed to create workqueue [ 2248.410455][ T7217] EXT4-fs (loop3): mount failed 06:00:39 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3, &(0x7f00000008c0)=[{&(0x7f00000000c0)="8000000038040000197a0300e60100006c000006000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x3ff8000000000}, {&(0x7f00000005c0)="b4065f2ab9075ba253e109154559f88f062320246c5ae74af8e236a42c0cd0b73085bf4313acfd026684e3be45cf8f03379864cd059401666557f67127a057d2cb8d6521890c5cbfe5eaf821257dfacfaf5ef8b4c06e941318d3eec42a910d1420306249520086172e5e2f0c2308655d2a82735e431f158af85763d2d76375e78b343d563d952660c79ecfad7ccb16689bcb4fed9533483595eb30e2671cd545", 0xa0, 0x4}], 0x4803, 0x0) 06:00:39 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x9600) 06:00:39 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) write$cgroup_int(r1, &(0x7f0000000200), 0x12) syncfs(r1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 06:00:39 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000ffffdd860000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:00:39 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0}, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB='syste']) io_submit(0x0, 0x1ffffffffffffc7d, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) socket$nl_route(0x10, 0x3, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x6628, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000240)={0x3ff, 0x4, 0x400, 0x9, 0x5}) pipe2(&(0x7f0000000200)={0xffffffffffffffff}, 0x4000) ioctl$TCFLSH(r1, 0x540b, 0x2) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x6628, 0x0) getsockname$packet(r2, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f00000006c0)={r3, 0x1, 0x6, @local}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x6628, 0x0) getpeername$packet(r4, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000300)=0x14) bind$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0xf6, r5, 0x1, 0x8, 0x6, @random="444b8c911f6b"}, 0x14) r6 = open(&(0x7f0000000140)='./file0\x00', 0x802, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r6, 0xc008240a, &(0x7f0000000180)={0x4, 0x0, [0x0, 0x0, 0x0, 0x0]}) 06:00:39 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x6400000000000000}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) 06:00:39 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000047880000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2248.577832][ T7280] EXT4-fs (loop5): feature flags set on rev 0 fs, running e2fsck is recommended [ 2248.591881][ T7280] EXT4-fs (loop5): first meta block group too large: 101 (group descriptor block count 1) 06:00:39 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0xbf08000000000000}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) 06:00:39 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x21, &(0x7f0000000000)) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0xf0daa4ef3a710007, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x6628, 0x0) ioctl$LOOP_CLR_FD(r2, 0x4c01) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 06:00:39 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000048880000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:00:39 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.opaque\x00', &(0x7f0000000100)='y\x00', 0x2, 0x2) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000180)="c04f046f5c5333d6eb706c8c107aa0c830cbbf80d3d2342cdbcc50ea4fa493d67c8bd1003d08484a5a942d279561f23e522472599aa14fcec9f07a7fb4d13129862e4a9df368de3d78d6b1dffa15726c22aef0a5fa6e16bea52b5bd2") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x6628, 0x0) lseek(r1, 0x40, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) fchdir(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) [ 2248.788614][ T7302] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2248.805146][ T7294] EXT4-fs (loop5): feature flags set on rev 0 fs, running e2fsck is recommended [ 2248.817863][ T7302] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 06:00:39 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0xfefdffff00000000}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) [ 2248.829296][ T7302] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2248.840707][ T7294] EXT4-fs (loop5): first meta block group too large: 1697544549 (group descriptor block count 1) [ 2248.853363][ T7302] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 2248.921298][ T7302] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 2248.930557][ T7302] EXT4-fs (loop3): mount failed 06:00:40 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'\x00', 0x43732e5398416f1a}) pread64(r0, &(0x7f0000000340)=""/39, 0x27, 0x0) close(r0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="2800000010005f6a35ba00f96300"/24, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b0000000000"], 0x28}}, 0x0) [ 2249.123634][ T7331] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2249.872194][ T7334] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 06:00:42 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x200000) 06:00:42 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000064880000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:00:42 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3, &(0x7f00000008c0)=[{&(0x7f00000000c0)="8000000038040000197a0300e60100006c000406000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x3ff8000000000}, {&(0x7f00000005c0)="b4065f2ab9075ba253e109154559f88f062320246c5ae74af8e236a42c0cd0b73085bf4313acfd026684e3be45cf8f03379864cd059401666557f67127a057d2cb8d6521890c5cbfe5eaf821257dfacfaf5ef8b4c06e941318d3eec42a910d1420306249520086172e5e2f0c2308655d2a82735e431f158af85763d2d76375e78b343d563d952660c79ecfad7ccb16689bcb4fed9533483595eb30e2671cd545", 0xa0, 0x4}], 0x4803, 0x0) 06:00:42 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0xffffffffffffffff}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) 06:00:42 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) write$cgroup_int(r1, &(0x7f0000000200), 0x12) setsockopt$IP_VS_SO_SET_TIMEOUT(r1, 0x0, 0x48a, &(0x7f0000000000)={0x6, 0x800, 0x6}, 0xc) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 06:00:42 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in=@remote, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x20, 0x5e}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@broadcast, 0x0, 0x3c}, 0x0, @in=@broadcast}}, 0xe8) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x6628, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x6628, 0x0) accept$packet(r2, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000001c0)=0x14) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000300)={r3, 0x1, 0x6}, 0x10) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 06:00:42 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000ffffa8880000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:00:42 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x3}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) [ 2251.613728][ T7347] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2251.636989][ T7347] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2251.657782][ T7347] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock 06:00:42 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x400000) 06:00:42 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x301001, 0x0) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) r1 = socket$inet6(0xa, 0x803, 0x2) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)=@ipv6_newroute={0x24, 0x18, 0x1, 0x0, 0x0, {}, [@RTA_OIF={0x8, 0x4, r4}]}, 0x24}}, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8936, &(0x7f0000000000)={@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], @local}, 0x0, r4}) fsetxattr$trusted_overlay_nlink(r1, &(0x7f0000000300)='trusted.overlay.nlink\x00', &(0x7f0000000340)={'L-', 0x3}, 0x16, 0x3) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xe, 0x0, 0x9, 0x9, 0xc2, 0xffffffffffffffff, 0x800, [], r4, 0xffffffffffffffff, 0x3, 0x3}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r5, &(0x7f0000000240)="440a1cfaeae831e0ce19cb5954a87641f59f95ff0d27c5ae5b24c74c90525fd37a1b313a4ea432a1ca2a3cf2d3a4646089938f87423eb3ba06faef36ee9e39f999fdde", &(0x7f0000000100)=""/38}, 0x20) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xf, r0, 0x10000000000003, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(r8, 0x0, 0x2d, &(0x7f0000000180)={0x7fffffff, {{0x2, 0x4e24, @loopback}}}, 0x88) 06:00:42 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000ffffca880000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2251.684291][ T7347] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 2251.700562][ T7347] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 2251.711393][ T7347] EXT4-fs (loop3): mount failed 06:00:42 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x4}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) [ 2251.809599][ T7347] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2251.835173][ T7347] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 06:00:42 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000006890000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:00:43 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x517000) [ 2251.930954][ T7347] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2252.025220][ T7347] EXT4-fs: failed to create workqueue [ 2252.031928][ T7347] EXT4-fs (loop3): mount failed [ 2252.044399][ T22] kauditd_printk_skb: 390 callbacks suppressed 06:00:43 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3, &(0x7f00000008c0)=[{&(0x7f00000000c0)="8000000038040000197a0300e60100006c000007000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x3ff8000000000}, {&(0x7f00000005c0)="b4065f2ab9075ba253e109154559f88f062320246c5ae74af8e236a42c0cd0b73085bf4313acfd026684e3be45cf8f03379864cd059401666557f67127a057d2cb8d6521890c5cbfe5eaf821257dfacfaf5ef8b4c06e941318d3eec42a910d1420306249520086172e5e2f0c2308655d2a82735e431f158af85763d2d76375e78b343d563d952660c79ecfad7ccb16689bcb4fed9533483595eb30e2671cd545", 0xa0, 0x4}], 0x4803, 0x0) [ 2252.044408][ T22] audit: type=1400 audit(1579672843.114:346426): avc: denied { map } for pid=7390 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2252.076649][ T22] audit: type=1400 audit(1579672843.114:346427): avc: denied { map } for pid=7390 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 06:00:43 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x8}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) 06:00:43 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000ffffff890000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:00:43 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in=@remote, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x20, 0x5e}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@broadcast, 0x0, 0x3c}, 0x0, @in=@broadcast}}, 0xe8) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x6628, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x6628, 0x0) accept$packet(r2, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000001c0)=0x14) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000300)={r3, 0x1, 0x6}, 0x10) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 06:00:43 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000008000a00000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2252.106373][ T22] audit: type=1400 audit(1579672843.114:346428): avc: denied { map } for pid=7390 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2252.138167][ T22] audit: type=1400 audit(1579672843.114:346429): avc: denied { map } for pid=7390 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 06:00:43 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x607100) [ 2252.172183][ T22] audit: type=1400 audit(1579672843.114:346430): avc: denied { map } for pid=7390 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2252.198721][ T22] audit: type=1400 audit(1579672843.124:346431): avc: denied { map } for pid=7390 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2252.226601][ T22] audit: type=1400 audit(1579672843.124:346432): avc: denied { map } for pid=7390 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2252.256062][ T22] audit: type=1400 audit(1579672843.124:346433): avc: denied { map } for pid=7390 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2252.287210][ T22] audit: type=1400 audit(1579672843.124:346434): avc: denied { map } for pid=7390 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 06:00:43 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x64}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) [ 2252.318920][ T22] audit: type=1400 audit(1579672843.124:346435): avc: denied { map } for pid=7390 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2252.368640][ T7407] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2252.395621][ T7407] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2252.453160][ T7407] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2252.483054][ T7407] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 2252.507852][ T7407] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 2252.516389][ T7407] EXT4-fs (loop3): mount failed [ 2252.571295][ T7407] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2252.591066][ T7407] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2252.607184][ T7407] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2252.628017][ T7407] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 2252.642928][ T7407] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 2252.650573][ T7407] EXT4-fs (loop3): mount failed 06:00:45 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x300}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) 06:00:45 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe800088a8ffff0000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:00:45 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x705100) 06:00:45 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000580)={0x15c, 0x0, 0x1, 0x0, 0x25dfdbfe, {}, [@TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffffa}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x83bf}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}]}, @TIPC_NLA_NET={0x48, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x3f}, @TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x3}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x4}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xb8b}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8}]}, @TIPC_NLA_LINK={0x74, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}, @TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x200}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}, @TIPC_NLA_NODE={0x14, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3f}, @TIPC_NLA_NODE_ADDR={0x8}]}, @TIPC_NLA_SOCK={0x48, 0x2, [@TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x80}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1c}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xffffe4c6}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x3f}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x40}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NODE={0xc, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0x15c}, 0x1, 0x0, 0x0, 0x4000080}, 0x800) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000180)='security.ima\x00', &(0x7f00000001c0)=@md5={0x1, "5c4b37fb455288f7dd066f1197885119"}, 0x11, 0x4) socket$unix(0x1, 0x1, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r3, &(0x7f0000000140)=ANY=[@ANYBLOB="00f1ffffffff0a00ff0000"], 0x15) sendfile(r3, r2, 0x0, 0xa198) 06:00:45 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3, &(0x7f00000008c0)=[{&(0x7f00000000c0)="8000000038040000197a0300e60100006c000009000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x3ff8000000000}, {&(0x7f00000005c0)="b4065f2ab9075ba253e109154559f88f062320246c5ae74af8e236a42c0cd0b73085bf4313acfd026684e3be45cf8f03379864cd059401666557f67127a057d2cb8d6521890c5cbfe5eaf821257dfacfaf5ef8b4c06e941318d3eec42a910d1420306249520086172e5e2f0c2308655d2a82735e431f158af85763d2d76375e78b343d563d952660c79ecfad7ccb16689bcb4fed9533483595eb30e2671cd545", 0xa0, 0x4}], 0x4803, 0x0) 06:00:45 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0xfffffffffffffff9, &(0x7f0000000080)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) write$cgroup_int(r1, &(0x7f0000000200), 0x12) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000000)=0x0) prctl$PR_SET_PTRACER(0x59616d61, r2) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 06:00:45 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe800088caffff0000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:00:46 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x8bf}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) [ 2254.906870][ T7438] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 06:00:46 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x716000) [ 2254.990364][ T7438] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 06:00:46 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe800086ddffff0000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2255.064002][ T7438] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2255.085175][ T7438] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 2255.101257][ T7438] EXT4-fs (loop3): corrupt root inode, run e2fsck 06:00:46 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x6400}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) [ 2255.140245][ T7438] EXT4-fs (loop3): mount failed [ 2255.211514][ T7438] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2255.236679][ T7438] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2255.248014][ T7438] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock 06:00:46 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe800089ffffff0000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:00:46 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) write$cgroup_int(r1, &(0x7f0000000200), 0x12) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000040)=ANY=[@ANYBLOB="ac141429e00000010186e691f77d1fe0774e000000020000"], 0x18) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x6628, 0x0) ioctl$TIOCGPGRP(r5, 0x540f, &(0x7f0000000000)=0x0) r7 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(0x0, r9) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={r6, r8, r9}, 0xc) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) [ 2255.260972][ T7438] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature 06:00:46 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0xbf08}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) 06:00:46 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3, &(0x7f00000008c0)=[{&(0x7f00000000c0)="8000000038040000197a0300e60100006c00000a000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x3ff8000000000}, {&(0x7f00000005c0)="b4065f2ab9075ba253e109154559f88f062320246c5ae74af8e236a42c0cd0b73085bf4313acfd026684e3be45cf8f03379864cd059401666557f67127a057d2cb8d6521890c5cbfe5eaf821257dfacfaf5ef8b4c06e941318d3eec42a910d1420306249520086172e5e2f0c2308655d2a82735e431f158af85763d2d76375e78b343d563d952660c79ecfad7ccb16689bcb4fed9533483595eb30e2671cd545", 0xa0, 0x4}], 0x4803, 0x0) [ 2255.314056][ T7438] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 2255.338877][ T7438] EXT4-fs (loop3): mount failed [ 2255.545144][ T7482] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2255.555672][ T7482] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2255.567457][ T7482] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2255.583702][ T7482] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 2255.633283][ T7482] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 2255.662157][ T7482] EXT4-fs (loop3): mount failed [ 2255.727821][ T7482] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2255.742354][ T7482] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2255.768519][ T7482] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock 06:00:46 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000000000001000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:00:46 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x71f000) 06:00:46 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x3000000}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) 06:00:46 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x220d82, 0x0) getsockopt$SO_TIMESTAMPING(r2, 0x1, 0x0, 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x220d82, 0x0) getsockopt$SO_TIMESTAMPING(r3, 0x1, 0x0, 0x0, 0x0) dup3(r3, r2, 0x0) syz_open_procfs(0x0, 0x0) r4 = getpid() sched_setattr(r4, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r4) r5 = getpid() sched_setattr(r5, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) getpgrp(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, 0x0) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCETHTOOL(r6, 0x8946, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) socket(0x0, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) socket(0x0, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) socket(0x0, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) socket(0x11, 0x1, 0x2) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) socket(0x0, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) socket(0x0, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) r7 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r8 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r8, 0x10099b7) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000280)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x1005}]}, 0x10) sendfile(r7, r8, 0x0, 0xfffffffd) connect$unix(r7, &(0x7f00000001c0)=@file={0x0, './bus\x00'}, 0x6e) 06:00:46 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x20, 0x0, 0x0, 0x0) [ 2255.815492][ T7482] EXT4-fs: failed to create workqueue [ 2255.855827][ T7482] EXT4-fs (loop3): mount failed 06:00:47 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000ffffffffa000800000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:00:47 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) write$cgroup_int(r2, &(0x7f0000000200), 0x12) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) write$cgroup_int(r3, &(0x7f0000000200), 0x12) r4 = fcntl$dupfd(r3, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 06:00:47 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x4000000}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) 06:00:47 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x760000) 06:00:47 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3, &(0x7f00000008c0)=[{&(0x7f00000000c0)="8000000038040000197a0300e60100006c00000b000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x3ff8000000000}, {&(0x7f00000005c0)="b4065f2ab9075ba253e109154559f88f062320246c5ae74af8e236a42c0cd0b73085bf4313acfd026684e3be45cf8f03379864cd059401666557f67127a057d2cb8d6521890c5cbfe5eaf821257dfacfaf5ef8b4c06e941318d3eec42a910d1420306249520086172e5e2f0c2308655d2a82735e431f158af85763d2d76375e78b343d563d952660c79ecfad7ccb16689bcb4fed9533483595eb30e2671cd545", 0xa0, 0x4}], 0x4803, 0x0) 06:00:47 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000000000000000100000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2256.113819][ T7530] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2256.133912][ T7530] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 06:00:47 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x8000000}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) 06:00:47 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x800000) 06:00:47 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) r0 = creat(&(0x7f00000001c0)='./bus/file0\x00', 0x0) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x2e) ptrace$cont(0x18, r2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sched_setattr(r2, &(0x7f0000000100)={0x38, 0x0, 0x11, 0x1f3, 0x0, 0x9, 0x5, 0x101, 0x4, 0x40}, 0x0) ioctl$UI_SET_LEDBIT(r6, 0x40045569, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$GTP_CMD_DELPDP(r7, &(0x7f0000000300)={&(0x7f0000000200), 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x40, 0x0, 0x0, 0x70bd29, 0x25dfdbfd, {}, [@GTPA_O_TEI={0x8, 0x9, 0x3}, @GTPA_MS_ADDRESS={0x8, 0x5, @broadcast}, @GTPA_O_TEI={0x8, 0x9, 0x2}, @GTPA_TID={0xc, 0x3, 0x4}, @GTPA_I_TEI={0x8, 0x8, 0x1}]}, 0x40}, 0x1, 0x0, 0x0, 0x8000080}, 0x2000c041) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ptrace$cont(0x20, r2, 0x0, 0x0) sched_getaffinity(r2, 0x8, &(0x7f0000000000)) 06:00:47 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000000000000000200000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2256.284422][ T7530] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2256.317439][ T7530] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 2256.333979][ T7530] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 2256.343979][ T7530] EXT4-fs (loop3): mount failed 06:00:47 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x8000a0) 06:00:47 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x64000000}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) [ 2256.454952][ T7530] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2256.490538][ T7530] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 06:00:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3, &(0x7f00000008c0)=[{&(0x7f00000000c0)="8000000038040000197a0300e60100006c00000a000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x3ff8000000000}, {&(0x7f00000005c0)="b4065f2ab9075ba253e109154559f88f062320246c5ae74af8e236a42c0cd0b73085bf4313acfd026684e3be45cf8f03379864cd059401666557f67127a057d2cb8d6521890c5cbfe5eaf821257dfacfaf5ef8b4c06e941318d3eec42a910d1420306249520086172e5e2f0c2308655d2a82735e431f158af85763d2d76375e78b343d563d952660c79ecfad7ccb16689bcb4fed9533483595eb30e2671cd545", 0xa0, 0x4}], 0x4803, 0x0) 06:00:47 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000000000000000400000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:00:47 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_int(r4, &(0x7f0000000200), 0x12) r5 = getpgrp(0xffffffffffffffff) ioctl$sock_FIOSETOWN(r4, 0x8901, &(0x7f0000000100)=r5) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000000)=0x0) wait4(r6, &(0x7f0000000040), 0x20000000, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) [ 2256.501526][ T7530] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2256.515722][ T7530] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 2256.552463][ T7530] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 2256.589113][ T7530] EXT4-fs (loop3): mount failed 06:00:47 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000000000000000600000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:00:47 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3, &(0x7f00000008c0)=[{&(0x7f00000000c0)="8000000038040000197a0300e60100006c00030b000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x3ff8000000000}, {&(0x7f00000005c0)="b4065f2ab9075ba253e109154559f88f062320246c5ae74af8e236a42c0cd0b73085bf4313acfd026684e3be45cf8f03379864cd059401666557f67127a057d2cb8d6521890c5cbfe5eaf821257dfacfaf5ef8b4c06e941318d3eec42a910d1420306249520086172e5e2f0c2308655d2a82735e431f158af85763d2d76375e78b343d563d952660c79ecfad7ccb16689bcb4fed9533483595eb30e2671cd545", 0xa0, 0x4}], 0x4803, 0x0) [ 2256.677515][ T7599] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2256.688891][ T7599] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2256.708123][ T7599] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock 06:00:47 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0xbf080000}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) [ 2256.725214][ T7599] EXT4-fs error (device loop5): ext4_fill_super:4518: inode #2: comm syz-executor.5: casefold flag without casefold feature [ 2256.753668][ T7599] EXT4-fs (loop5): corrupt root inode, run e2fsck 06:00:47 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x960000) [ 2256.780213][ T7599] EXT4-fs (loop5): mount failed 06:00:47 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) write$cgroup_int(r1, &(0x7f0000000200), 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r1, 0xc0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=0x1, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x7, 0x5}, 0x0, 0x0, &(0x7f0000000100)={0x1, 0x5, 0x9c, 0x5}, &(0x7f0000000180)=0x401, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x3}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r2}, 0xfffffffffffffe43) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r4 = socket$pppl2tp(0x18, 0x1, 0x1) r5 = fcntl$dupfd(r4, 0x406, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 06:00:48 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000000000000000800000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2256.894197][ T7612] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 06:00:48 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0xfefdffff}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) [ 2256.945049][ T7612] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 06:00:48 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x2a7) connect$inet6(r2, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x2d, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000140)) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f00000003c0)=""/141) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='security.ima\x00', 0x0, 0x0, 0x4) sendmsg$key(0xffffffffffffffff, &(0x7f0000000000)={0x40000000, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_int(r4, &(0x7f0000000200), 0x12) write$FUSE_NOTIFY_STORE(r4, &(0x7f0000000500)={0x2d, 0x4, 0x0, {0x2, 0x27, 0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x2d) r5 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x6628, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x6628, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r7, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@empty, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000000a00)=0xfffffffffffffd61) stat(&(0x7f0000000700)='./bus\x00', &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000880)='./bus\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r3, &(0x7f0000000580)='system.posix_acl_default\x00', &(0x7f0000000940)={{}, {0x1, 0x7}, [{0x2, 0x2, r8}, {0x2, 0x2, r9}], {0x4, 0x2}, [{0x8, 0x1}, {0x8, 0x4, 0xee01}, {0x8, 0x5, 0xffffffffffffffff}, {0x8, 0x2, r10}], {0x10, 0x7}, {0x20, 0x6}}, 0x54, 0x3) r11 = open(&(0x7f0000000040)='./bus\x00', 0x422503, 0x42) write$P9_RSTATFS(r0, &(0x7f0000000480)={0x43, 0x9, 0x2, {0x9, 0x200, 0x3, 0x2, 0x5, 0x80000001, 0x1f, 0x7, 0x800}}, 0x43) write$binfmt_elf64(r11, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r11, r5, 0x0, 0xa198) r12 = creat(&(0x7f0000000100)='./file0\x00', 0x20) ioctl$USBDEVFS_DISCSIGNAL(r12, 0x8010550e, &(0x7f00000001c0)={0x800, &(0x7f00000002c0)="829a9910d47e2fbce2956e839ec11e5a32657f8193bdab9efefd2ab6fd43e28d80744cdbdc3ed3356b5a48181ba1df8624e128435325b079c811d8ac76d2b1efcb5e61c9baec97f364c5bc183422a409458038c4e63f8bb58b49efd55ae5dc566ccdd5d6833a1ad5aba48e8028ac5e99f3f0b10b14d0589d54530634b4e025dbfd50e693e8f203007e6633d9c6a738d1ce8d91f889d2fb481001f9e953"}) ioctl$USBDEVFS_RESET(r12, 0x5514) [ 2257.050809][ T22] kauditd_printk_skb: 463 callbacks suppressed [ 2257.050819][ T22] audit: type=1400 audit(1579672848.124:346899): avc: denied { map } for pid=7625 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2257.081668][ T7612] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2257.102250][ T22] audit: type=1400 audit(1579672848.124:346900): avc: denied { map } for pid=7625 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2257.120913][ T7612] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature 06:00:48 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0xf07100) [ 2257.127932][ T22] audit: type=1400 audit(1579672848.124:346901): avc: denied { map } for pid=7625 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2257.174373][ T22] audit: type=1400 audit(1579672848.124:346902): avc: denied { map } for pid=7625 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 06:00:48 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0xfffffdfe}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) 06:00:48 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000040)=[{0x0}, {0x0, 0xffffffffffffff9c}, {0x0}, {&(0x7f0000000400)="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"/286, 0xf3}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2b) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) [ 2257.200049][ T22] audit: type=1400 audit(1579672848.124:346903): avc: denied { map } for pid=7625 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2257.226649][ T22] audit: type=1400 audit(1579672848.124:346904): avc: denied { map } for pid=7625 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 06:00:48 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000000000000060800000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2257.254776][ T22] audit: type=1400 audit(1579672848.124:346905): avc: denied { map } for pid=7625 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2257.284182][ T22] audit: type=1400 audit(1579672848.124:346906): avc: denied { map } for pid=7625 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2257.311758][ T7612] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 2257.312726][ T22] audit: type=1400 audit(1579672848.124:346907): avc: denied { map } for pid=7625 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2257.343166][ T7612] EXT4-fs (loop3): mount failed 06:00:48 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000000000000000d00000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2257.347026][ T22] audit: type=1400 audit(1579672848.134:346908): avc: denied { map } for pid=7625 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2257.476452][ T7612] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2257.499098][ T7612] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2257.525224][ T7612] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2257.536243][ T7612] EXT4-fs: failed to create workqueue [ 2257.542554][ T7612] EXT4-fs (loop3): mount failed 06:00:48 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3, &(0x7f00000008c0)=[{&(0x7f00000000c0)="8000000038040000197a0300e60100006c00000c000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x3ff8000000000}, {&(0x7f00000005c0)="b4065f2ab9075ba253e109154559f88f062320246c5ae74af8e236a42c0cd0b73085bf4313acfd026684e3be45cf8f03379864cd059401666557f67127a057d2cb8d6521890c5cbfe5eaf821257dfacfaf5ef8b4c06e941318d3eec42a910d1420306249520086172e5e2f0c2308655d2a82735e431f158af85763d2d76375e78b343d563d952660c79ecfad7ccb16689bcb4fed9533483595eb30e2671cd545", 0xa0, 0x4}], 0x4803, 0x0) 06:00:48 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x300000000000000}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) 06:00:48 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000000000000001f00000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:00:48 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x1000000) 06:00:48 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x20080, 0x0) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000100)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x8, 0x70bd25, 0x25dfdbfd, {}, [""]}, 0x14}}, 0x94) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r4 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f0000000280)) r5 = fcntl$dupfd(r4, 0x406, r3) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x40086602, 0x400007) write$cgroup_int(r6, &(0x7f0000000200), 0x12) setsockopt$TIPC_MCAST_BROADCAST(r6, 0x10f, 0x85) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 06:00:48 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000000000000002800000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:00:48 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x4000000) 06:00:48 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x2a7) connect$inet6(r2, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x2d, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000140)) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f00000003c0)=""/141) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='security.ima\x00', 0x0, 0x0, 0x4) sendmsg$key(0xffffffffffffffff, &(0x7f0000000000)={0x40000000, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_int(r4, &(0x7f0000000200), 0x12) write$FUSE_NOTIFY_STORE(r4, &(0x7f0000000500)={0x2d, 0x4, 0x0, {0x2, 0x27, 0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x2d) r5 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x6628, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x6628, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r7, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@empty, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000000a00)=0xfffffffffffffd61) stat(&(0x7f0000000700)='./bus\x00', &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000880)='./bus\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r3, &(0x7f0000000580)='system.posix_acl_default\x00', &(0x7f0000000940)={{}, {0x1, 0x7}, [{0x2, 0x2, r8}, {0x2, 0x2, r9}], {0x4, 0x2}, [{0x8, 0x1}, {0x8, 0x4, 0xee01}, {0x8, 0x5, 0xffffffffffffffff}, {0x8, 0x2, r10}], {0x10, 0x7}, {0x20, 0x6}}, 0x54, 0x3) r11 = open(&(0x7f0000000040)='./bus\x00', 0x422503, 0x42) write$P9_RSTATFS(r0, &(0x7f0000000480)={0x43, 0x9, 0x2, {0x9, 0x200, 0x3, 0x2, 0x5, 0x80000001, 0x1f, 0x7, 0x800}}, 0x43) write$binfmt_elf64(r11, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r11, r5, 0x0, 0xa198) r12 = creat(&(0x7f0000000100)='./file0\x00', 0x20) ioctl$USBDEVFS_DISCSIGNAL(r12, 0x8010550e, &(0x7f00000001c0)={0x800, &(0x7f00000002c0)="829a9910d47e2fbce2956e839ec11e5a32657f8193bdab9efefd2ab6fd43e28d80744cdbdc3ed3356b5a48181ba1df8624e128435325b079c811d8ac76d2b1efcb5e61c9baec97f364c5bc183422a409458038c4e63f8bb58b49efd55ae5dc566ccdd5d6833a1ad5aba48e8028ac5e99f3f0b10b14d0589d54530634b4e025dbfd50e693e8f203007e6633d9c6a738d1ce8d91f889d2fb481001f9e953"}) ioctl$USBDEVFS_RESET(r12, 0x5514) 06:00:48 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x400000000000000}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) [ 2257.714115][ T7685] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2257.725244][ T7685] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2257.736076][ T7685] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2257.809921][ T7685] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature 06:00:48 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000000000000002900000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:00:49 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$inet6_udplite(0xa, 0x2, 0x88) ptrace$cont(0x20, r0, 0x0, 0x0) 06:00:49 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x40000000) [ 2257.893149][ T7685] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 2257.921933][ T7685] EXT4-fs (loop3): mount failed [ 2258.024774][ T7685] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2258.137956][ T7685] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2258.173617][ T7685] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2258.212432][ T7685] EXT4-fs: failed to create workqueue [ 2258.225997][ T7685] EXT4-fs (loop3): mount failed 06:00:49 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3, &(0x7f00000008c0)=[{&(0x7f00000000c0)="8000000038040000197a0300e60100006c00020c000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x3ff8000000000}, {&(0x7f00000005c0)="b4065f2ab9075ba253e109154559f88f062320246c5ae74af8e236a42c0cd0b73085bf4313acfd026684e3be45cf8f03379864cd059401666557f67127a057d2cb8d6521890c5cbfe5eaf821257dfacfaf5ef8b4c06e941318d3eec42a910d1420306249520086172e5e2f0c2308655d2a82735e431f158af85763d2d76375e78b343d563d952660c79ecfad7ccb16689bcb4fed9533483595eb30e2671cd545", 0xa0, 0x4}], 0x4803, 0x0) 06:00:49 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x800000000000000}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) 06:00:49 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000000000000002b00000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:00:49 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x7f000000) 06:00:49 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)=ANY=[@ANYBLOB="3802000010003b0e00"/20, @ANYRES32=0x0, @ANYBLOB="00000a00000000f3ffffff00", @ANYRES32=0x6, @ANYBLOB="100212000b000100697036746e6c0000000202001400030000000000000000000000ffffe00000011400030000000000000000000000ffffac14140017000300fec0ffff000001e200000000000000011c0002006c188a44711625f7e8e5d070c39a513b14000300fe88000000000000000000000000000114000200fe80000000000000000000000000000008000800000000001400030026235e58cad1850f722a1b12de5fb0c314000140fe8000000000000000000000000000bb08000800000000001400020000000000000000000000ffff0000000006001100000000003fff0200", @ANYRES32=0x0, @ANYBLOB="0500040000000000050005000000000008001400000000000800070000000000080008000000000005000600000000000500090029000000060010000000000004001300080014000000000006001100000000000600110000000000080014000000000006000f00000000000800080000000000080007000000000008000800000000001400030000000000000000000000000000000000050004000000000005000400000000000500050000000000030010000000000008000200", @ANYRES32=0x0, @ANYBLOB="39d057050000000000000000", @ANYRES32=0x0, @ANYRES64], 0xb}}, 0x0) 06:00:49 executing program 2: clone(0x84002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff}) tkill(r0, 0x3c) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) write$cgroup_int(r2, &(0x7f0000000200), 0x12) getsockname$tipc(r1, &(0x7f0000000480)=@name, &(0x7f00000004c0)=0x10) r3 = accept4(r2, 0x0, &(0x7f0000001540), 0x80000) sendto$unix(r3, &(0x7f0000001580)="867d97c61816c3454808e8eae6f9805999d3dbbfcd69a140f7682fb13487ad65046a4eb46c76f43d429da75450ac934ffd7a467ffa464f1c8cc749e758027fbf0822be42f749729fd64338bfc37b4dcadffd3088614681b7c7c26ac4e2120ae4ddd6ddc4efe79cb37c18f99211880f52ed653bf7284dd008f0ca17389c3890aace29b10cce5499df4ce4", 0x8a, 0x51, &(0x7f0000001640)=@abs={0x1, 0x0, 0x4e24}, 0x6e) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)) r4 = gettid() rt_sigqueueinfo(r4, 0x21, &(0x7f0000000000)) r5 = gettid() rt_sigqueueinfo(r5, 0x21, &(0x7f0000000000)) r6 = gettid() rt_sigqueueinfo(r6, 0x21, &(0x7f0000000000)) r7 = gettid() rt_sigqueueinfo(r7, 0x21, &(0x7f0000000000)) clone3(&(0x7f0000000400)={0x2000000, &(0x7f0000000040), &(0x7f0000000100)=0x0, &(0x7f0000000140), {0x18}, &(0x7f0000000240)=""/225, 0xe1, &(0x7f0000000180)=""/34, &(0x7f00000001c0)=[r5, r0, 0xffffffffffffffff, r0, r6, 0xffffffffffffffff, r0, 0xffffffffffffffff, r7], 0x9}, 0x50) r9 = gettid() rt_sigqueueinfo(r9, 0x21, &(0x7f0000000000)) ptrace$getsig(0x4202, r9, 0x31, &(0x7f0000000500)) ptrace$cont(0x18, r8, 0x800000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r10 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 06:00:49 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000000000000002c00000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:00:49 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x6400000000000000}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) 06:00:49 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x0, 0x0, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioprio_set$pid(0x2, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0xffffffffffffff54, 0x6, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, 0x20, 0x3}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = timerfd_create(0x0, 0x0) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x4) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x6628, 0x0) recvfrom$inet6(r7, &(0x7f0000000380)=""/132, 0x84, 0x141, &(0x7f00000002c0)={0xa, 0x4e20, 0x2b, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x7}, 0x1c) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r8 = creat(&(0x7f0000000040)='./bus\x00', 0xa) fcntl$setstatus(r8, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) open(0x0, 0x0, 0x0) io_setup(0x3, &(0x7f0000000100)) 06:00:49 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0xa0008000) 06:00:49 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x80) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r0, 0x8983, &(0x7f0000000040)={0x6, 'lo\x00', {0x7}, 0x8000}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x6628, 0x0) r2 = dup(r1) setsockopt$TIPC_GROUP_LEAVE(r2, 0x10f, 0x88) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) accept(r4, &(0x7f0000000580)=@l2tp={0x2, 0x0, @local}, &(0x7f0000000600)=0x80) wait4(0x0, 0x0, 0x80000002, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40086602, 0x400007) write$cgroup_int(r5, &(0x7f0000000200), 0x12) vmsplice(r5, &(0x7f0000000400)=[{&(0x7f0000000100)="cdff9b0248c5128c6885cebf1c5b4c705c4bff0099e8cebf6afdb6a2f2e38318990a14003583189049b19707c4b50f4b930abdf1f612fbd31c78b630f58e4b5b3b96bcb5972a295b4f64ff61d1448e5a0bd9863469a3ae82613bdc41961d4e4cf1672a5b29a303d12653c65005c66ff503f74c55ce9380f1db19ae1b36a35317e43a158dc64990d95e52c33d99da5ce388158cd02b3faf24f33beb0225aa8c44c7e5b4af27bcc11a01420a1cbc6b9d7a7c56076b0d0854b3916db5a097c8133f4d441858", 0xc4}, {&(0x7f0000000000)="4e1f1469f3baa1edc7", 0x9}, {&(0x7f0000000200)="8f915506b4a4220f24b3cfa86fd2437c9ef5e8d455582ab2f19943a67b0c46141cc688f40cb992608f434c", 0x2b}, {&(0x7f0000000240)="073820c8f5f54f8b583c5d81dd0e41b2d5c6ffe081ed496248b794fb0c6814a2b4161dc8af5b1832ce61f03125496206817eae5a18032cf63604a9a3482f77090bd29de3f8608bfb9232df0b1bba8025dd269b876ce57435d01692a871e36d7c5afcea95f5adf830c495", 0x6a}, {&(0x7f00000002c0)="e83df71fced436a10514aa790a354f9b95491c49466bb53ea429bac6608deae851e77dbabf8bde42aac49613f3bbdb7d723d8a47066813df9988d52eb0f81f6f101f2df2a224546ebcc702e53061b5685614fc59eba9b1c68492e39ff20508183663fcb5a1a321de60f6878579c1766ef9b9726bfa15b88c0c04ddf1a3075fbe7556bc34890c999657174f7892bfc5e561428b95ab8b8f4624963a904753854a81c67e25f09e76ae94822585db60", 0xae}], 0x5, 0xd) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) r6 = gettid() rt_sigqueueinfo(r6, 0x21, &(0x7f0000000000)) ptrace$setregs(0xf, r6, 0x4f, &(0x7f0000000480)="b542e4e665ec31698aa2c263862ceb0d466c46246fb4dea6225a99014096844ae7af8c4c170e3b9de11eb7e5dc5bc0d6c24616e10a0bdb95b4b8d3e0463b4f23108fe99df05d35373bed7625f78adb137854a6f90ad03cb0b5dd4cd45e472698f3ff2a1b0226fee1257e9e62b031b8151b5cabc79699d127aa059d6efa63470803745177fb13ac9423999ea34da7284ecf135c4457fb145179fd84b2d564103025fae46913f214af17c406d4fe2d") bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) r7 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r8, 0x40086602, 0x400007) write$cgroup_int(r8, &(0x7f0000000640)=0x2, 0x12) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000003c0)={&(0x7f0000000380)='./file0\x00', r8}, 0x10) ptrace$cont(0x20, r3, 0x100000001, 0x0) 06:00:49 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000000000000002f00000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2258.522999][ T7760] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2258.578984][ T7760] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2258.609419][ T7760] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2258.625996][ T7760] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 2258.639764][ T7760] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 2258.646247][ T7760] EXT4-fs (loop3): mount failed [ 2258.751338][ T7760] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2258.762973][ T7760] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2258.777342][ T7760] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2258.792175][ T7760] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 2258.855958][ T7760] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 2258.865190][ T7760] EXT4-fs (loop3): mount failed 06:00:50 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3, &(0x7f00000008c0)=[{&(0x7f00000000c0)="8000000038040000197a0300e60100006c00000d000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x3ff8000000000}, {&(0x7f00000005c0)="b4065f2ab9075ba253e109154559f88f062320246c5ae74af8e236a42c0cd0b73085bf4313acfd026684e3be45cf8f03379864cd059401666557f67127a057d2cb8d6521890c5cbfe5eaf821257dfacfaf5ef8b4c06e941318d3eec42a910d1420306249520086172e5e2f0c2308655d2a82735e431f158af85763d2d76375e78b343d563d952660c79ecfad7ccb16689bcb4fed9533483595eb30e2671cd545", 0xa0, 0x4}], 0x4803, 0x0) 06:00:50 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0xbf08000000000000}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) 06:00:50 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000000000000003c00000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:00:50 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0xfeffffff) 06:00:50 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000000000000004000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:00:50 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0xfefdffff00000000}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) 06:00:50 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000000000000054300000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:00:50 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0xff600000) [ 2259.141520][ T7813] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2259.152059][ T7813] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2259.162573][ T7813] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2259.177784][ T7813] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 2259.199247][ T7813] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 2259.205834][ T7813] EXT4-fs (loop3): mount failed [ 2259.291472][ T7813] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2259.301374][ T7813] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2259.312184][ T7813] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2259.333481][ T7813] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 2259.348538][ T7813] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 2259.355129][ T7813] EXT4-fs (loop3): mount failed 06:00:50 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x400000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x20}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$FUSE_IOCTL(0xffffffffffffffff, &(0x7f0000000080)={0x20, 0xffffffffffffffda, 0x3, {0x60ea, 0x4, 0x3, 0x100}}, 0x20) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$9p(0xffffffffffffffff, &(0x7f0000001400), 0x0) unshare(0x40000000) r1 = socket$packet(0x11, 0x2, 0x300) dup(r1) r2 = socket$packet(0x11, 0x2, 0x300) dup(r2) dup3(r1, r2, 0xc0000) dup(0xffffffffffffffff) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000240)=@usbdevfs_connect) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) 06:00:50 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3, &(0x7f00000008c0)=[{&(0x7f00000000c0)="8000000038040000197a0300e60100006c00000e000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x3ff8000000000}, {&(0x7f00000005c0)="b4065f2ab9075ba253e109154559f88f062320246c5ae74af8e236a42c0cd0b73085bf4313acfd026684e3be45cf8f03379864cd059401666557f67127a057d2cb8d6521890c5cbfe5eaf821257dfacfaf5ef8b4c06e941318d3eec42a910d1420306249520086172e5e2f0c2308655d2a82735e431f158af85763d2d76375e78b343d563d952660c79ecfad7ccb16689bcb4fed9533483595eb30e2671cd545", 0xa0, 0x4}], 0x4803, 0x0) [ 2259.594406][ T7831] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2259.619763][ T7831] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2259.637992][ T7831] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2259.667938][ T7831] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 2259.682045][ T7831] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 2259.688912][ T7831] EXT4-fs (loop3): mount failed 06:00:52 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653070000053c07bc337600b639405cb4ae1d08178757a9000000000000ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b945c281a9de5e57e0000", 0x71}], 0x4, 0xf) ptrace$setopts(0x4206, r0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) mprotect(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1000001) tkill(r0, 0x19) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = gettid() rt_sigqueueinfo(r1, 0x21, &(0x7f0000000000)) ptrace$setregs(0xffffffffffffffff, r1, 0x5, &(0x7f0000000000)="279bf54319563c01f8cc7b914014282a8c7219f18f49339a04dbe825051ce862917f4a348701815d9587c6c220f8c5aafb5968320cb37e44123745ce87088e5fae178669b053d3a8fc82b103ea3c20c66783e2345ebdb334a47790") socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x6628, 0x0) r6 = openat$cgroup_ro(r4, &(0x7f0000000100)='cpu.stat\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r6, 0x40505412, &(0x7f0000000180)={0x3, 0x6, 0x7}) ptrace$cont(0x20, r0, 0x0, 0x0) 06:00:52 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0xffffffffffffffff}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) 06:00:52 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000000000000007400000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:00:52 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0xfffffffe) 06:00:52 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3, &(0x7f00000008c0)=[{&(0x7f00000000c0)="8000000038040000197a0300e60100006c00000f000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x3ff8000000000}, {&(0x7f00000005c0)="b4065f2ab9075ba253e109154559f88f062320246c5ae74af8e236a42c0cd0b73085bf4313acfd026684e3be45cf8f03379864cd059401666557f67127a057d2cb8d6521890c5cbfe5eaf821257dfacfaf5ef8b4c06e941318d3eec42a910d1420306249520086172e5e2f0c2308655d2a82735e431f158af85763d2d76375e78b343d563d952660c79ecfad7ccb16689bcb4fed9533483595eb30e2671cd545", 0xa0, 0x4}], 0x4803, 0x0) 06:00:52 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x5536a029f86f52de) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={r0, 0x16, 0x0, 0x0, 0x0}, 0x20) syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x8, 0x10000) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x6628, 0x0) r2 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) write$cgroup_int(r3, &(0x7f0000000200), 0x12) renameat2(r3, &(0x7f0000000200)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00', 0x5) 06:00:52 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe80000000000000000e8000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:00:52 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x0, 0x3}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) [ 2261.705438][ T7849] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2261.729115][ T7849] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2261.741745][ T7849] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock 06:00:52 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x200000000000) 06:00:52 executing program 5: r0 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x9b2e7cf702970428) write$binfmt_aout(r0, &(0x7f0000000100)=ANY=[], 0x49f) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x10084165) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) lseek(r1, 0x80, 0x4) [ 2261.796870][ T7849] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 2261.829072][ T7849] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 2261.839967][ T7849] EXT4-fs (loop3): mount failed 06:00:53 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000000000000358000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2261.895709][ T7849] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 06:00:53 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x0, 0x4}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) 06:00:53 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x400000000000) [ 2262.013837][ T7849] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2262.074966][ T22] kauditd_printk_skb: 436 callbacks suppressed [ 2262.074973][ T22] audit: type=1400 audit(1579672853.144:347345): avc: denied { watch } for pid=998 comm="udevd" path="/dev/loop3" dev="devtmpfs" ino=34085 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 [ 2262.112276][ T7849] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock 06:00:53 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000000000000008100000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2262.122964][ T22] audit: type=1400 audit(1579672853.154:347346): avc: denied { map } for pid=7889 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 06:00:53 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r2, r3) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r2, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x5, 0x8, 0x0, 0x2}, &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x8}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={r1, 0x10, &(0x7f0000000240)={&(0x7f0000000580)=""/181, 0xb5, r4}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r4}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='rdma.current\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r7, 0x54a3) r8 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r9, 0x6628, 0x0) r10 = fcntl$getown(r9, 0x9) ptrace$setregs(0xf, r10, 0xffff, &(0x7f0000000480)="759189829bdc1965065cc23dde96eed4e4621037a58c322721a8f2be70b63214b029eef42537542a59716ea5d58cfd6b92050cf17a93f2ccaf841b6f43428b93d9239ea7db30a5e4f5ec3349d89707f4bec569b5522a79def1f0428ef137c6d51e2bd4e05ee0c347fe0b352079671702e8138083744e9163e381474584aa9f04005d8f0f77cc") 06:00:53 executing program 5: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r0, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0x12) perf_event_open(&(0x7f0000000080)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="ac45dcaf42ae8cfb948f206d012b"], 0x1) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x412, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) write$cgroup_int(r1, &(0x7f0000000200), 0x12) setsockopt$pppl2tp_PPPOL2TP_SO_DEBUG(r1, 0x111, 0x1, 0x0, 0x4) [ 2262.158377][ T22] audit: type=1400 audit(1579672853.154:347347): avc: denied { map } for pid=7889 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2262.165301][ T7849] EXT4-fs: failed to create workqueue [ 2262.189403][ T22] audit: type=1400 audit(1579672853.154:347348): avc: denied { map } for pid=7889 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2262.224424][ T22] audit: type=1400 audit(1579672853.154:347349): avc: denied { map } for pid=7889 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2262.267285][ T22] audit: type=1400 audit(1579672853.154:347350): avc: denied { map } for pid=7889 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2262.299020][ T22] audit: type=1400 audit(1579672853.184:347351): avc: denied { map } for pid=7889 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2262.303334][ T7849] EXT4-fs (loop3): mount failed [ 2262.333480][ T22] audit: type=1400 audit(1579672853.184:347352): avc: denied { map } for pid=7889 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 06:00:53 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3, &(0x7f00000008c0)=[{&(0x7f00000000c0)="8000000038040000197a0300e60100006c000410000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x3ff8000000000}, {&(0x7f00000005c0)="b4065f2ab9075ba253e109154559f88f062320246c5ae74af8e236a42c0cd0b73085bf4313acfd026684e3be45cf8f03379864cd059401666557f67127a057d2cb8d6521890c5cbfe5eaf821257dfacfaf5ef8b4c06e941318d3eec42a910d1420306249520086172e5e2f0c2308655d2a82735e431f158af85763d2d76375e78b343d563d952660c79ecfad7ccb16689bcb4fed9533483595eb30e2671cd545", 0xa0, 0x4}], 0x4803, 0x0) 06:00:53 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x0, 0x8}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) 06:00:53 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000000000000008200000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:00:53 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe800000000000ffffdd8600000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2262.360360][ T22] audit: type=1400 audit(1579672853.184:347353): avc: denied { map } for pid=7889 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2262.386269][ T22] audit: type=1400 audit(1579672853.184:347354): avc: denied { map } for pid=7889 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 06:00:53 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x6628, 0x0) setsockopt$TIPC_MCAST_REPLICAST(r0, 0x10f, 0x86) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) preadv(r0, &(0x7f0000000180)=[{&(0x7f0000000400)=""/141, 0x8d}, {&(0x7f00000004c0)=""/228, 0xe4}], 0x2, 0x2) tkill(r1, 0x3c) sendmsg$IPCTNL_MSG_CT_DELETE(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="4400000002bd070000000000000000000500000608010000800000000c000d0008000100ac14143a0800030000000406140005000f000100746674f02d323030303000002f8be8c8a560848209349ec1a6fcab23141a4206155a185149"], 0x44}, 0x1, 0x0, 0x0, 0x40}, 0x4000020) ptrace$cont(0x18, r1, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) flistxattr(0xffffffffffffffff, &(0x7f0000000200)=""/97, 0x61) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000300)='NLBL_UNLBL\x00') ptrace$cont(0x20, r1, 0x0, 0x0) 06:00:53 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000000000000478800000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:00:53 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x0, 0x64}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) [ 2262.531037][ T7922] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2262.551561][ T7922] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 06:00:53 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000000000000488800000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2262.587230][ T7922] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2262.610094][ T7922] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 2262.633752][ T7922] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 2262.647175][ T7922] EXT4-fs (loop3): mount failed [ 2262.755839][ T7922] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2262.779764][ T7922] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2262.789884][ T7922] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2262.800268][ T7922] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 2262.814191][ T7922] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 2262.820821][ T7922] EXT4-fs (loop3): mount failed 06:00:56 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x60ffffffffff) 06:00:56 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3, &(0x7f00000008c0)=[{&(0x7f00000000c0)="8000000038040000197a0300e60100006c002010000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x3ff8000000000}, {&(0x7f00000005c0)="b4065f2ab9075ba253e109154559f88f062320246c5ae74af8e236a42c0cd0b73085bf4313acfd026684e3be45cf8f03379864cd059401666557f67127a057d2cb8d6521890c5cbfe5eaf821257dfacfaf5ef8b4c06e941318d3eec42a910d1420306249520086172e5e2f0c2308655d2a82735e431f158af85763d2d76375e78b343d563d952660c79ecfad7ccb16689bcb4fed9533483595eb30e2671cd545", 0xa0, 0x4}], 0x4803, 0x0) 06:00:56 executing program 5: socketpair$unix(0x1, 0x1, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x800, 0xfd) recvmmsg(r1, &(0x7f0000002380)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r4, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x2, 0x0) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000600)=0xda6, 0x4) rt_sigreturn() r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x6628, 0x0) accept4$vsock_stream(r5, &(0x7f0000000540), 0x10, 0x80000) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) socket$inet(0x2, 0x4, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x40086602, 0x400007) write$cgroup_int(r6, &(0x7f0000000200), 0x12) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000340)='nl80211\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000003c0)=0x14) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r9, 0x40086602, 0x400007) write$cgroup_int(r9, &(0x7f0000000200), 0x12) sendmsg$NL80211_CMD_SET_INTERFACE(r6, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2010000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000640)=ANY=[@ANYRESDEC=r9, @ANYRES16=r7, @ANYBLOB="000429bd7000fedbdf250600000008000300", @ANYRES32=r8, @ANYBLOB="0c00992cd02cf3bdfd6543dbea9517b28df73e27dd7000"], 0x5}, 0x1, 0x0, 0x0, 0x631818e406a4fe76}, 0x40810) writev(r4, &(0x7f0000000780)=[{&(0x7f0000000100)="dff548771d77ce8786aca76dda6fb054ab8ea73799d7293eda90ba41a2db81fab55b5415692300a8e64bca2f60e1717f85f06a6bbca90f392b04f34940db7ffccc33ed6ea82296de9683c9e360cd1c477304bd8f9bd74d44a4c7d1c7e625a86cd54b72c5745f475a772b84977a6b05381dbe6259bc510f0f70c3e9946a78c7b5a19e97267799d930f9623b", 0x8b}, {&(0x7f00000007c0)="963b43759109c936b6431fb1cb119741d2b9dc5e5ce3e5fe9f7ba76ef518bc7b6c1d0b424e1ce0f34c0943ae3c843c57debc3964b3cd14849c62c0fdefbae36740a7169721af852826d7f14b6cae8af86507ff78a1dda991aea5952f43e7e0146ac803570522f769ea1ccccdc60cdf3400193bbe3a0c0b1eae5799db27b4ee9c13475210eefa4dac9d784e0c89135b82b321f8e43d7a5d00006922dae5931556", 0xa0}, {&(0x7f0000001340)="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", 0x1b9}], 0x3) sendto$inet(r4, &(0x7f00000012c0)="0c268a927f1f655cb967481241ba78600f53f65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 06:00:56 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000000000000648800000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:00:56 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x0, 0x300}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) 06:00:56 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe800000000000ffffa88800000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2265.099574][ T7951] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2265.120777][ T7951] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2265.138704][ T7951] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock 06:00:56 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x0, 0x8bf}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) [ 2265.167456][ T7951] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature 06:00:56 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe800000000000ffffca8800000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2265.216243][ T7951] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 2265.226995][ T7951] EXT4-fs (loop3): mount failed [ 2265.304398][ T7951] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2265.419655][ T7951] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2265.477695][ T7951] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2265.488352][ T7951] EXT4-fs: failed to create workqueue [ 2265.493836][ T7951] EXT4-fs (loop3): mount failed 06:00:56 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = gettid() ioctl$BLKTRACESTOP(r3, 0x1275, 0x0) ptrace$cont(0x20, r4, 0x8, 0x0) 06:00:56 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3, &(0x7f00000008c0)=[{&(0x7f00000000c0)="8000000038040000197a0300e60100006c000011000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x3ff8000000000}, {&(0x7f00000005c0)="b4065f2ab9075ba253e109154559f88f062320246c5ae74af8e236a42c0cd0b73085bf4313acfd026684e3be45cf8f03379864cd059401666557f67127a057d2cb8d6521890c5cbfe5eaf821257dfacfaf5ef8b4c06e941318d3eec42a910d1420306249520086172e5e2f0c2308655d2a82735e431f158af85763d2d76375e78b343d563d952660c79ecfad7ccb16689bcb4fed9533483595eb30e2671cd545", 0xa0, 0x4}], 0x4803, 0x0) 06:00:56 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x0, 0x6400}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) 06:00:56 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x760000000000) 06:00:56 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000000000000068900000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:00:56 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r1, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x1b, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000480), 0x8}, 0x200, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) getsockopt$IP_SET_OP_GET_BYINDEX(r0, 0x1, 0x53, &(0x7f00000001c0), &(0x7f0000000200)=0x28) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_int(r4, &(0x7f0000000200), 0x12) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000300)=0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x7, 0x4, 0xff, 0x1, 0x0, 0xbb, 0x21000, 0xc, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x80, 0x4, @perf_bp={&(0x7f0000000240), 0x5}, 0x2a0, 0xd8, 0x1183eec1, 0x4, 0x0, 0x8000, 0x847}, r5, 0x6, r2, 0x2) r6 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/mls\x00', 0x0, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x170, r8, 0x1}, 0x3f0}}, 0x0) sendmsg$TIPC_CMD_SHOW_PORTS(r6, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x1c, r8, 0x200, 0x70bd28, 0x25dfdbfd, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004051}, 0x4800) r9 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$EVIOCSKEYCODE(r9, 0x40084504, &(0x7f0000000180)=[0x85, 0x5]) prctl$PR_MCE_KILL(0x35, 0x0, 0x4) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00') read$FUSE(r10, 0x0, 0x0) r11 = socket$nl_generic(0x10, 0x3, 0x10) r12 = syz_genetlink_get_family_id$nl80211(&(0x7f00000005c0)='nl80211\x00') sendmsg$NL80211_CMD_SET_BEACON(r11, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000680)=ANY=[@ANYBLOB="1c000000c5409d00436529141c45bf682c69618ea574fb61af12520b7d0aac8661d62e9756569c85b078040000000000005fc92249032c8955d1143f28a3d4eef475d5b46c167463ad39a50906ad7b12f3ff05b695c82a1dc259fa41b25d54da936885df2ccd8e26d0b431ace6faba7dbdec060ddcb38e7a3e9447703aa99f60a34828a0ce7f4ce5e554ef83", @ANYRES16=r12, @ANYBLOB="010029bd7000000000000e000000"], 0xfffffffffffffe9d}}, 0x0) r13 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r13, &(0x7f0000002d00)='threaded\x00', 0xfffffd18) getsockopt$inet_mreqn(r13, 0x0, 0x24, &(0x7f0000000240)={@local, @remote, 0x0}, &(0x7f00000002c0)=0xc) sendmsg$NL80211_CMD_GET_MPATH(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x98ba3d6abd4602a0}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x60, r12, 0xc, 0x70bd27, 0x25dfdbfc, {}, [@NL80211_ATTR_MAC={0xa, 0x6, @local}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x2}}, @NL80211_ATTR_MAC={0xa, 0x6, @local}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r14}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @random="5df19fd754ee"}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x100ca005) sendmsg$NL80211_CMD_DEL_MPATH(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x14, r12, 0x400, 0x70bd27, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x40800}, 0x4000000) 06:00:56 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe800000000000ffffff8900000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:00:56 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x7fffffffefff) 06:00:56 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x0, 0xbf08}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) [ 2265.708709][ T7998] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 06:00:56 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe800000000000ffffffff00000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2265.749938][ T7998] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 06:00:56 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x0, 0x3000000}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) 06:00:56 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000008000a0ffffffff00000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2265.802246][ T7998] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2265.815819][ T7998] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 2265.831182][ T7998] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 2265.838468][ T7998] EXT4-fs (loop3): mount failed [ 2265.902476][ T7998] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2265.917535][ T7998] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 06:00:57 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x0, 0x4000000}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) [ 2265.964856][ T7998] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2266.003554][ T7998] EXT4-fs: failed to create workqueue [ 2266.031812][ T7998] EXT4-fs (loop3): mount failed 06:00:57 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3, &(0x7f00000008c0)=[{&(0x7f00000000c0)="8000000038040000197a0300e60100006c000012000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x3ff8000000000}, {&(0x7f00000005c0)="b4065f2ab9075ba253e109154559f88f062320246c5ae74af8e236a42c0cd0b73085bf4313acfd026684e3be45cf8f03379864cd059401666557f67127a057d2cb8d6521890c5cbfe5eaf821257dfacfaf5ef8b4c06e941318d3eec42a910d1420306249520086172e5e2f0c2308655d2a82735e431f158af85763d2d76375e78b343d563d952660c79ecfad7ccb16689bcb4fed9533483595eb30e2671cd545", 0xa0, 0x4}], 0x4803, 0x0) 06:00:57 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000200000000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:00:57 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687ff64ece002a72ad8c9ace0000fc57641a22d7ec7165", 0x6d}], 0x3, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r2, r3) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r2, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x5, 0x8, 0x0, 0x2}, &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x8}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={r1, 0x10, &(0x7f0000000240)={&(0x7f0000000580)=""/181, 0xb5, r4}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) lsetxattr$security_evm(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='security.evm\x00', &(0x7f00000001c0)=@md5={0x1, "1b8eb5d5802f310f397cb1e5e4450a59"}, 0x11, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r7, 0x40485404, &(0x7f0000000200)={{0x0, 0x1, 0x2, 0x1, 0xfffffffa}, 0xa7, 0x1000}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 06:00:57 executing program 5: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0xfffffffffffffffa, 0x1, &(0x7f0000000100)=[{&(0x7f0000000080)="eb3c906d6b66732e6661740002993eb6", 0x10, 0x4}], 0x12b4039, 0x0) r0 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ftruncate(r1, 0x8200) 06:00:57 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000400000000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:00:57 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x0, 0x8000000}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) [ 2266.370786][ T8057] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2266.467432][ T8057] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2266.483074][ T8057] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2266.504488][ T8057] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 2266.518685][ T8057] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 2266.525265][ T8057] EXT4-fs (loop3): mount failed [ 2266.610343][ T8057] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2266.620455][ T8057] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2266.631388][ T8057] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2266.652861][ T8057] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 2266.666720][ T8057] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 2266.673514][ T8057] EXT4-fs (loop3): mount failed 06:00:59 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x7ffffffff000) 06:00:59 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) setsockopt$CAN_RAW_FD_FRAMES(r3, 0x65, 0x5, &(0x7f0000000000), 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 06:00:59 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000600000000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:00:59 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x0, 0x64000000}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) 06:00:59 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="4510df745d88341c7fea1c35b2f06107482c870e56a9891432c32be4161531a18ffa43c9540be6677c29813ba2f3d874fa91fd4abbf14647b42c2dac2bb605e9111039bde89f1ba3f70629f3312b0d568f1ebbdd50eee4c8f649673978874f0e5373030000004ac971da83296ae9e07e795223551f016a1ea13fc4692dc6065fcd"], 0x81) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000002380)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x1, 0x5, 0x0) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000140)=ANY=[@ANYRESHEX, @ANYBLOB="5638a092643c91aae83796bcd51063585e02db18c81d578351ded3399f766354137d80fd0e89fa24ffce5ac34c5a4107c903829ba9284d6dc9cdf67d2e7a8dc58cee8f0b"], 0x2}, 0x1, 0x0, 0x0, 0x20000001}, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x6628, 0x0) ioctl$RTC_EPOCH_READ(r6, 0x8008700d, &(0x7f0000000080)) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r7 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000780)=ANY=[@ANYBLOB='`\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="0100e501000000000000030000004c000100380004002000010000000000000000010001000000001400020002000000e00000010000000000000000100001007564703a73797a3000000000cf643d2cc76310c6cc65a305cd206a72a1d432c9efa44a2aafdfa17d9b58ad8e5db9e3ff523359cc9e790e2e013155cdb88f4dc6179a0894e29e629a0965e1e11a73945a4b5b77fa662a802bdb0e1cabc0b5a6528649b32e1e2d5e19e1536f07a6aede2b8833deea335fbc7263ed1f226c98e15583ec1fedc67df4360ee71c5be2d354d3db3f137e17d6016c1084150c282a7efda8c8f0f35d969fdfae9daf178ca11b7935a95d68e65dbe5f02231d7310c3a0457f4e3cf2768216fedbfcb4be9a9a8d0213397a71316796e714d6738e4fd48892d5f302eef4f708121bbcd8e57b387b17687a590f7ba782addce3a350e045a7cb9b5eb2a3d00f1638fde69c0937b9bbe7663923e056f352b273188ba2b09281e846dd0e559e"], 0x60}}, 0x0) epoll_create(0xd47a) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ptmx\x00', 0x40c002, 0x0) r8 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r8, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)}, 0x0) recvmmsg(r1, &(0x7f00000068c0), 0x0, 0x122, 0x0) 06:00:59 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3, &(0x7f00000008c0)=[{&(0x7f00000000c0)="8000000038040000197a0300e60100006c000013000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x3ff8000000000}, {&(0x7f00000005c0)="b4065f2ab9075ba253e109154559f88f062320246c5ae74af8e236a42c0cd0b73085bf4313acfd026684e3be45cf8f03379864cd059401666557f67127a057d2cb8d6521890c5cbfe5eaf821257dfacfaf5ef8b4c06e941318d3eec42a910d1420306249520086172e5e2f0c2308655d2a82735e431f158af85763d2d76375e78b343d563d952660c79ecfad7ccb16689bcb4fed9533483595eb30e2671cd545", 0xa0, 0x4}], 0x4803, 0x0) 06:00:59 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000800000000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2268.789883][ T22] kauditd_printk_skb: 428 callbacks suppressed [ 2268.789891][ T22] audit: type=1400 audit(1579672859.864:347783): avc: denied { map } for pid=8090 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2268.836345][ T22] audit: type=1400 audit(1579672859.864:347784): avc: denied { map } for pid=8090 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 06:01:00 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x0, 0xbf080000}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) [ 2268.894295][ T22] audit: type=1400 audit(1579672859.864:347785): avc: denied { map } for pid=8090 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2268.898111][ T8088] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 06:01:00 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x20000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x8000, 0x5) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) write$cgroup_int(r3, &(0x7f0000000200), 0x12) ioctl$sock_inet_tcp_SIOCINQ(r3, 0x541b, &(0x7f0000000000)) r4 = fcntl$dupfd(r2, 0x0, r1) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40086602, 0x400007) write$cgroup_int(r5, &(0x7f0000000200), 0x12) getsockopt$IPT_SO_GET_ENTRIES(r5, 0x0, 0x41, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)=0xf7) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) [ 2268.945481][ T8088] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2268.955317][ T22] audit: type=1400 audit(1579672859.864:347786): avc: denied { map } for pid=8090 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2268.957196][ T8088] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock 06:01:00 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x960000000000) [ 2269.053322][ T22] audit: type=1400 audit(1579672859.864:347787): avc: denied { map } for pid=8090 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2269.077237][ T22] audit: type=1400 audit(1579672859.864:347788): avc: denied { map } for pid=8090 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 06:01:00 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000d00000000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2269.102914][ T22] audit: type=1400 audit(1579672859.864:347789): avc: denied { map } for pid=8090 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2269.129192][ T22] audit: type=1400 audit(1579672859.864:347790): avc: denied { map } for pid=8090 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2269.134108][ T8088] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 2269.154524][ T22] audit: type=1400 audit(1579672859.864:347791): avc: denied { map } for pid=8090 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 06:01:00 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000002800000000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:01:00 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x0, 0xfefdffff}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) [ 2269.193125][ T22] audit: type=1400 audit(1579672859.864:347792): avc: denied { map } for pid=8090 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2269.220272][ T8088] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 2269.226911][ T8088] EXT4-fs (loop3): mount failed 06:01:00 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x60710000000000) 06:01:00 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) write$cgroup_int(r1, &(0x7f0000000200), 0x12) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) [ 2269.310229][ T8088] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2269.368734][ T8088] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2269.407673][ T8088] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock 06:01:00 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000002900000000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2269.437686][ T8088] EXT4-fs: failed to create workqueue [ 2269.443199][ T8088] EXT4-fs (loop3): mount failed 06:01:00 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x70510000000000) 06:01:00 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x0, 0xfffffdfe}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) 06:01:00 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3, &(0x7f00000008c0)=[{&(0x7f00000000c0)="8000000038040000197a0300e60100006c000014000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x3ff8000000000}, {&(0x7f00000005c0)="b4065f2ab9075ba253e109154559f88f062320246c5ae74af8e236a42c0cd0b73085bf4313acfd026684e3be45cf8f03379864cd059401666557f67127a057d2cb8d6521890c5cbfe5eaf821257dfacfaf5ef8b4c06e941318d3eec42a910d1420306249520086172e5e2f0c2308655d2a82735e431f158af85763d2d76375e78b343d563d952660c79ecfad7ccb16689bcb4fed9533483595eb30e2671cd545", 0xa0, 0x4}], 0x4803, 0x0) 06:01:00 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000002b00000000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:01:00 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="14797374656d2eaa44c59931439dd7482d32a48ce68a0d20"]) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x6628, 0x0) ioctl$FS_IOC_GETFSLABEL(r4, 0x81009431, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40086602, 0x400007) write$cgroup_int(r5, &(0x7f0000000200), 0x12) write$FUSE_LK(r5, &(0x7f0000000000)={0x28, 0x0, 0x5, {{0xac, 0x3, 0x1, r0}}}, 0x28) ptrace$cont(0x20, r0, 0x0, 0x0) 06:01:00 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = syz_open_dev$binderN(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x800) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000040)={0x4, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$TCSETXF(r2, 0x5434, &(0x7f0000000000)={0x6, 0x5, [0x800, 0x2, 0xff, 0x3, 0x1], 0x1}) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x200000, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x6628, 0x0) ioctl$USBDEVFS_GET_CAPABILITIES(r4, 0x8004551a, &(0x7f0000000540)) ioctl$TIOCVHANGUP(r3, 0x5437, 0x0) r5 = dup(r1) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x6628, 0x0) sendmsg$NFT_MSG_GETTABLE(r6, &(0x7f0000000500)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000004c0)={&(0x7f0000000240)={0x4c, 0x1, 0xa, 0x5, 0x0, 0x0, {0x3, 0x0, 0x4}, [@NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x1}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x1}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40000}, 0x80800) r7 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x40200, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r7, 0x80045505, &(0x7f0000000140)=0x9) openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ppp\x00', 0x204002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 06:01:00 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000002c00000000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:01:00 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x0, 0x300000000000000}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) [ 2269.733931][ T8157] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2269.751043][ T8157] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 06:01:00 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = syz_open_dev$binderN(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x800) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000040)={0x4, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$TCSETXF(r2, 0x5434, &(0x7f0000000000)={0x6, 0x5, [0x800, 0x2, 0xff, 0x3, 0x1], 0x1}) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x200000, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x6628, 0x0) ioctl$USBDEVFS_GET_CAPABILITIES(r4, 0x8004551a, &(0x7f0000000540)) ioctl$TIOCVHANGUP(r3, 0x5437, 0x0) r5 = dup(r1) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x6628, 0x0) sendmsg$NFT_MSG_GETTABLE(r6, &(0x7f0000000500)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000004c0)={&(0x7f0000000240)={0x4c, 0x1, 0xa, 0x5, 0x0, 0x0, {0x3, 0x0, 0x4}, [@NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x1}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x1}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40000}, 0x80800) r7 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x40200, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r7, 0x80045505, &(0x7f0000000140)=0x9) openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ppp\x00', 0x204002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) [ 2269.812773][ T8157] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2269.824484][ T8157] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 2269.849113][ T8157] EXT4-fs (loop3): corrupt root inode, run e2fsck 06:01:00 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@loopback, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@empty}}, &(0x7f0000000040)=0xe8) r4 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) [ 2269.878390][ T8157] EXT4-fs (loop3): mount failed 06:01:01 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000002f00000000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:01:01 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x0, 0x400000000000000}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) [ 2269.980059][ T8157] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2269.990092][ T8157] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2270.001067][ T8157] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2270.014546][ T8157] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 2270.082737][ T8157] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 2270.114695][ T8157] EXT4-fs (loop3): mount failed 06:01:03 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x80000000000000) 06:01:03 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3, &(0x7f00000008c0)=[{&(0x7f00000000c0)="8000000038040000197a0300e60100006c000015000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x3ff8000000000}, {&(0x7f00000005c0)="b4065f2ab9075ba253e109154559f88f062320246c5ae74af8e236a42c0cd0b73085bf4313acfd026684e3be45cf8f03379864cd059401666557f67127a057d2cb8d6521890c5cbfe5eaf821257dfacfaf5ef8b4c06e941318d3eec42a910d1420306249520086172e5e2f0c2308655d2a82735e431f158af85763d2d76375e78b343d563d952660c79ecfad7ccb16689bcb4fed9533483595eb30e2671cd545", 0xa0, 0x4}], 0x4803, 0x0) 06:01:03 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) setxattr$security_ima(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x2) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) socket$inet6(0xa, 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x54) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0x0, 0x4) 06:01:03 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 06:01:03 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000003c00000000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:01:03 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x0, 0x800000000000000}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) 06:01:03 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000007400000000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2272.712111][ T8206] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2272.736464][ T8206] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 06:01:03 executing program 2: clone(0x900300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000180)="158dfbb81dd50700d3fd532425149d2253b912d488bbbd9dcf0ccb475a12ce9db060b71f69a6563dc8681c9098edf1a97c17ccff694c28b2acba1d7702ad79ff2d7e9fd63355c043f4a600ee5033f9c7bc8c56c64c300a4fd7267bda3552801f6dd532a59d") socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x6628, 0x0) ioctl$BLKPG(r4, 0x1269, &(0x7f0000000040)={0x8, 0x3, 0x8, &(0x7f0000000000)="62b6f6cab93f540f"}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x6620) 06:01:03 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x0, 0x6400000000000000}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) [ 2272.818134][ T8206] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock 06:01:03 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x8000a0ffffffff) [ 2272.887366][ T8206] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature 06:01:04 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000008200000000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2272.966336][ T8206] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 2272.998596][ T8206] EXT4-fs (loop3): mount failed [ 2273.085529][ T8206] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 06:01:04 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000004305000000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:01:04 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0xf0710000000000) [ 2273.237537][ T8206] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2273.259467][ T8206] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2273.303543][ T8206] EXT4-fs: failed to create workqueue [ 2273.316824][ T8206] EXT4-fs (loop3): mount failed 06:01:04 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3, &(0x7f00000008c0)=[{&(0x7f00000000c0)="8000000038040000197a0300e60100006c000016000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x3ff8000000000}, {&(0x7f00000005c0)="b4065f2ab9075ba253e109154559f88f062320246c5ae74af8e236a42c0cd0b73085bf4313acfd026684e3be45cf8f03379864cd059401666557f67127a057d2cb8d6521890c5cbfe5eaf821257dfacfaf5ef8b4c06e941318d3eec42a910d1420306249520086172e5e2f0c2308655d2a82735e431f158af85763d2d76375e78b343d563d952660c79ecfad7ccb16689bcb4fed9533483595eb30e2671cd545", 0xa0, 0x4}], 0x4803, 0x0) [ 2273.497065][ T8257] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2273.518071][ T8257] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2273.549495][ T8257] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2273.605130][ T8257] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 2273.623686][ T8257] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 2273.631667][ T8257] EXT4-fs (loop3): mount failed [ 2273.740471][ T8257] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2273.757253][ T8257] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2273.777370][ T8257] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2273.856922][ T22] kauditd_printk_skb: 314 callbacks suppressed [ 2273.856931][ T22] audit: type=1400 audit(1579672864.924:348107): avc: denied { watch } for pid=998 comm="udevd" path="/dev/loop3" dev="devtmpfs" ino=34085 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 [ 2273.894835][ T8257] EXT4-fs: failed to create workqueue [ 2273.902353][ T8257] EXT4-fs (loop3): mount failed [ 2273.931367][ T22] audit: type=1400 audit(1579672865.004:348108): avc: denied { map } for pid=8269 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2273.980612][ T22] audit: type=1400 audit(1579672865.034:348109): avc: denied { map } for pid=8269 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2274.004788][ T22] audit: type=1400 audit(1579672865.034:348110): avc: denied { map } for pid=8269 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2274.030572][ T22] audit: type=1400 audit(1579672865.034:348111): avc: denied { map } for pid=8269 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2274.056581][ T22] audit: type=1400 audit(1579672865.034:348112): avc: denied { map } for pid=8269 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2274.080829][ T22] audit: type=1400 audit(1579672865.034:348113): avc: denied { map } for pid=8269 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2274.125104][ T22] audit: type=1400 audit(1579672865.034:348114): avc: denied { map } for pid=8269 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2274.179368][ T22] audit: type=1400 audit(1579672865.044:348115): avc: denied { map } for pid=8269 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2274.227351][ T22] audit: type=1400 audit(1579672865.044:348116): avc: denied { map } for pid=8269 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 06:01:05 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x0, 0xbf08000000000000}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) 06:01:05 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x21, &(0x7f0000000000)) ptrace$setopts(0x4200, r1, 0x0, 0x3d) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = gettid() rt_sigqueueinfo(r5, 0x21, &(0x7f0000000000)) ptrace$cont(0x1f, r5, 0x2, 0x4) ptrace$cont(0x20, r0, 0x0, 0x0) 06:01:05 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000006000000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:01:05 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb2ac}, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000300)='nl80211\x00') socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x2840, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x21, &(0x7f0000000000)={0x1}) perf_event_open(&(0x7f0000000700)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) unshare(0x40000000) ioctl$TIOCGPKT(r0, 0x80045438, &(0x7f0000000000)) 06:01:05 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3, &(0x7f00000008c0)=[{&(0x7f00000000c0)="8000000038040000197a0300e60100006c000017000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x3ff8000000000}, {&(0x7f00000005c0)="b4065f2ab9075ba253e109154559f88f062320246c5ae74af8e236a42c0cd0b73085bf4313acfd026684e3be45cf8f03379864cd059401666557f67127a057d2cb8d6521890c5cbfe5eaf821257dfacfaf5ef8b4c06e941318d3eec42a910d1420306249520086172e5e2f0c2308655d2a82735e431f158af85763d2d76375e78b343d563d952660c79ecfad7ccb16689bcb4fed9533483595eb30e2671cd545", 0xa0, 0x4}], 0x4803, 0x0) 06:01:05 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0xf0ffffff7f0000) 06:01:06 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000806000000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2274.903032][ T8280] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2274.914115][ T8280] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2274.928408][ T8280] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock 06:01:06 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x100000000000000) 06:01:06 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x0, 0xfefdffff00000000}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) 06:01:06 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_int(r4, &(0x7f0000000200), 0x12) ioctl$KDGKBMETA(r4, 0x4b62, &(0x7f0000000000)) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$EVIOCSABS20(r5, 0x401845e0, &(0x7f0000000100)={0x3f, 0x1, 0x4, 0x73815937, 0x5af, 0xfffffffd}) [ 2275.025140][ T8280] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature 06:01:06 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000008906000000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:01:06 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) 06:01:06 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000608000000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2275.073900][ T8280] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 2275.088203][ T8280] EXT4-fs (loop3): mount failed 06:01:06 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x400000000000000) [ 2275.169182][ T8280] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2275.199308][ T8280] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 06:01:06 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$getown(r2, 0x9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r3, 0xcf, &(0x7f0000000400)=""/136) ptrace$peeksig(0x4209, 0x0, &(0x7f0000000000)={0x1, 0x1, 0x4}, &(0x7f0000000180)=[{}, {}, {}, {}]) r4 = fcntl$dupfd(r2, 0x0, r1) getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f0000000040)={0x6, 0x7, 'syz1\x00'}, &(0x7f0000000100)=0x28) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) [ 2275.239716][ T8280] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2275.261814][ T8280] EXT4-fs: failed to create workqueue [ 2275.278555][ T8280] EXT4-fs (loop3): mount failed 06:01:06 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3, &(0x7f00000008c0)=[{&(0x7f00000000c0)="8000000038040000197a0300e60100006c000018000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x3ff8000000000}, {&(0x7f00000005c0)="b4065f2ab9075ba253e109154559f88f062320246c5ae74af8e236a42c0cd0b73085bf4313acfd026684e3be45cf8f03379864cd059401666557f67127a057d2cb8d6521890c5cbfe5eaf821257dfacfaf5ef8b4c06e941318d3eec42a910d1420306249520086172e5e2f0c2308655d2a82735e431f158af85763d2d76375e78b343d563d952660c79ecfad7ccb16689bcb4fed9533483595eb30e2671cd545", 0xa0, 0x4}], 0x4803, 0x0) 06:01:06 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) 06:01:06 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe800000000d000000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:01:06 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) ioctl$FS_IOC_GETFLAGS(r3, 0x80086601, &(0x7f0000007b40)) ioctl$EVIOCGBITSND(r3, 0x80404532, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') bind$unix(r2, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x11, 0x800000003, 0x0) bind(r6, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r6, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r5, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001c000704000000000000000002000000", @ANYRES32=r7, @ANYBLOB="adff02000a000100f9012f98325d00005ea1f6e4670e685eeaaa766d33e6ce1c8b1427a088052990e3e5f8c97f16d210c0c1da27fb418577b0fdcecc210033bfc19d32304132941c17e7c46762137e9846526a1ad27ad53e013c6ea5c7e5b3ed1d93fc"], 0x28}, 0x1, 0x9effffff00000000}, 0x0) recvmsg$can_raw(r4, &(0x7f0000000500)={&(0x7f00000003c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000100)=""/17, 0x11}], 0x1, &(0x7f0000000480)=""/72, 0x48}, 0x10000) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000180)={'bridge_slave_0\x00', r7}) sendmsg$TIPC_NL_BEARER_ENABLE(r2, 0x0, 0x4) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0xc000, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) r10 = socket$inet_udplite(0x2, 0x2, 0x88) r11 = fcntl$dupfd(r10, 0x0, r9) connect(r11, &(0x7f0000000000)=@in={0x2, 0x0, @multicast1}, 0x80) r12 = socket$inet6_tcp(0xa, 0x1, 0x0) r13 = fcntl$dupfd(0xffffffffffffffff, 0x0, r12) connect(r13, &(0x7f0000000000)=@in={0x2, 0x0, @multicast1}, 0x80) r14 = socket$nl_route(0x10, 0x3, 0x0) r15 = socket(0x11, 0x800000003, 0x0) bind(r15, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r15, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r17 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r17, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route(r14, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000600)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=r16, @ANYBLOB="000000000000000008000400", @ANYRES32=0x0, @ANYBLOB="b666aaff176d15ceea5cca5337fbc874ad39162235cf000053f6bed4f044d5d946", @ANYRES32=0x0, @ANYBLOB="71f72dc582c032770b831acdf60c8b07e715e078b910a19847206ab656b86e65edcde638f0282e82f0e9be7cba054131c42d8379d5331cbd9ca325c3f8825f528dd688b02be30301ddf6f26793d4ca090fe252c684b62f36fa821b04b330a1410b751f2d61f7a14b5ca04ed86c0eb89b63d9b8d9d0f3b5c650635b002bd7343ee1d97f66735ce02661e8328c1f047c4af05fb7bf6979822456a0a33ddfc8437dbcf6ed6c5121b830c2b93f047e760ca13a4d10315bd3ab1374993dea10c568907a839231bfb813c9c1aba6a0380520e61588f26be99992"], 0x30}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)=@mpls_getnetconf={0x3c, 0x52, 0x4, 0x0, 0x25dfdbfc, {}, [@NETCONFA_IFINDEX={0x8}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x6}, @NETCONFA_IFINDEX={0x8}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x7fffffff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8}]}, 0x3c}}, 0x21dbf90800faa7b6) 06:01:06 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x4000000000000000) 06:01:06 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x6628, 0x0) setsockopt$sock_timeval(r1, 0x1, 0x42, &(0x7f0000000000)={0x77359400}, 0x10) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) [ 2275.734128][ T8344] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2275.761178][ T8344] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2275.779130][ T8344] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock 06:01:06 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe800000800e000000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:01:06 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) 06:01:06 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x7f00000000000000) [ 2275.807692][ T8344] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 2275.823555][ T8344] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 2275.830903][ T8344] EXT4-fs (loop3): mount failed [ 2275.920688][ T8364] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2275.937731][ T8344] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 06:01:07 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x3, 0x20) sendmsg$inet6(r0, &(0x7f0000002900)={&(0x7f0000000340)={0xa, 0x4e23, 0x0, @dev={0xfe, 0x80, [], 0xd}, 0x10001}, 0x1c, &(0x7f0000002880)=[{&(0x7f0000000400)="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", 0x1000}, {&(0x7f0000001400)="daab8fdf2c3869c8594e923dc8e731f03fef9bb3f6fb412099b46ffccbf8e21fbd23dc2e96aa0e8470f07336bd815063b47b9c6a278c74ace9106dfa6b03cf04dffb828807169091d0d8630dfbe123ba98924a4c62a546f94893add58545c1393b2c36ef7fc5d311ce45f3696b0d8f60d0a288c818e69bf1ac35916a94eef3ae16c2a8b5db42d4442ece3a310c60f40e48df3521d488f2ec051076993f46b2e652d8cc55a82a263513f0921e0fe86ab461319c7887d481dbe86233e49777e01092fd68e070c02b82c651e88721d7ca6579b315adabfdaebd84b9f4ce2010423d83e1dd5a4994338feb1190cff249daeb0588c88f9da1", 0xf6}, {&(0x7f0000001500)="5751ba0c6351fd52601cdf42c322754b9a48e66545324c22f8e44d2ad5f62e49fe5726ca8095e8f7c6ea84e5f14b92bf9301ad4bfd6235fe45bf6a72c352145c8d921a8812462eb221c47dc9d164fe2f48ccc7d678ca6a1374712971e8795eb289d2ea64d14eeba8f5c87e9991523a3edf8738520c2f6d69a8734d227ad3d363bc7e298ef457e3cc885b7e4fe6a7b765c7fabafdf85ff5b72bf43cc0b3a39a07e496898db56bac706bacdbe06c14a1e7b4e3e27e87", 0xb5}, {&(0x7f00000015c0)="a16140e2d29a43c28af3e4afb31443062e611b3e8c0c10cc3685db6ea48039d95cc1c00e28f0fedf6d40b46a94672dce29b3204a11ff48b8f098e4c9313a01de8b5f444ef32992dcd891857a38e0edb7b3a53875ee4c5fa347b4e144c5448eb18d4311fddfe39e7e42bbe95a8d54e7e27ec08bc5c19bd38015eecac5be48e8bdd8a8ef4f041e3ea3c02618dd218559c7289e4ae624fb8aac0ec33633d5d563e48b00a3d5faf81c30de339f", 0xab}, {&(0x7f0000001680)="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", 0x1000}, {&(0x7f0000002680)="4bd14a2a1cd1eaaaab303f29e87eb857565fd18dd6d3814338c297205c2444", 0x1f}, {&(0x7f00000026c0)="cb6cb4add2bd8fe64fc27e189763bdb689553becdbdb9f771b1180caf35120bf552f3357e148ed4930c435b9cd593248ff1fff7a27ebd0dd9cf18313a690e00f117da1beda827d74a343ad84bc7818951df8a24bbf1b41d7910a68ad42f440fc785dfce2e4475700f67f7a2f3bcdaa838bd9a0eeec7d8d3f4942e92ca2cf3a035fac0612adc11bb38130cf750986f0e3b9269d8fc916022802632a801884a6174a1d2d1a4b57809850670c9a5b4165e9cd8962", 0xb3}, {&(0x7f0000002780)="7b2c846b9183948fb1ac07398a509680c9aabdbc6526a2629566ef4908fd21f53e51169665badf2735ee0ac775a9347578dfdc8a550bc316288d8a014b7edb1ae255629f28c1c50a9f52f5432344e611faee634f65b9336b8c2d025599394ee06bafedafdb9a7b67ee79acd30e14ab3734f39b18bd0fb13f4ef91a518f837e7381bbac80da2316d094e68bcab3b8dcfd05b83dd9d55c78fbab24857b4df4b314a62e2ae5f7b24167088bc6c2e8be7ebaf46c938c78c3bd6998f1fd9428816ab029be687e662e2364924bc269ae85e2ac9648fbd16bc058d7820538", 0xdb}], 0x8}, 0x4000080) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r5 = accept(0xffffffffffffffff, &(0x7f0000000180)=@l2, &(0x7f0000000100)=0x80) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x6628, 0x0) ioctl$KDDELIO(r6, 0x4b35, 0x9) fsconfig$FSCONFIG_SET_PATH_EMPTY(0xffffffffffffffff, 0x4, &(0x7f0000000280)='selinux-*}-vmnet0%procvmnet1vboxnet1)keyringem1)\x00', &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff) pwrite64(r5, &(0x7f0000000200)="3b6899e8b91df9eb1bbe471e2d8dce99af978212cfd901ed75a1b0ef831bfd83b21abee01635028db8355ec84f13b403bc069501dc2b08d9c49444f69c460600f0171639096bd7d10bc99d3cc60bd4c6c781", 0x52, 0x1000) sched_getattr(r4, &(0x7f0000000040)={0x38}, 0x38, 0x0) r7 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x8000000004001fb) ioctl$USBDEVFS_SETINTERFACE(r7, 0x80085504, &(0x7f0000000300)={0xffff, 0x10001}) ptrace$cont(0x20, r1, 0x0, 0x0) 06:01:07 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe800000001f000000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2276.061714][ T8344] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 06:01:07 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) 06:01:07 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3, &(0x7f00000008c0)=[{&(0x7f00000000c0)="8000000038040000197a0300e60100006c000019000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x3ff8000000000}, {&(0x7f00000005c0)="b4065f2ab9075ba253e109154559f88f062320246c5ae74af8e236a42c0cd0b73085bf4313acfd026684e3be45cf8f03379864cd059401666557f67127a057d2cb8d6521890c5cbfe5eaf821257dfacfaf5ef8b4c06e941318d3eec42a910d1420306249520086172e5e2f0c2308655d2a82735e431f158af85763d2d76375e78b343d563d952660c79ecfad7ccb16689bcb4fed9533483595eb30e2671cd545", 0xa0, 0x4}], 0x4803, 0x0) 06:01:07 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000028000000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2276.134391][ T8344] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2276.152691][ T8344] EXT4-fs: failed to create workqueue [ 2276.163253][ T8344] EXT4-fs (loop3): mount failed 06:01:07 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) write$cgroup_int(r1, &(0x7f0000000200), 0x12) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000000)) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) epoll_create(0x6) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) ioctl$TIOCGPKT(r4, 0x80045438, &(0x7f0000000040)) [ 2276.279207][ T8394] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 06:01:07 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x0, 0x0, 0x64}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) 06:01:07 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0xfeffffff00000000) 06:01:07 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000029000000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:01:07 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) ioctl$FS_IOC_GETFLAGS(r3, 0x80086601, &(0x7f0000007b40)) ioctl$EVIOCGBITSND(r3, 0x80404532, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') bind$unix(r2, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x11, 0x800000003, 0x0) bind(r6, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r6, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r5, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001c000704000000000000000002000000", @ANYRES32=r7, @ANYBLOB="adff02000a000100f9012f98325d00005ea1f6e4670e685eeaaa766d33e6ce1c8b1427a088052990e3e5f8c97f16d210c0c1da27fb418577b0fdcecc210033bfc19d32304132941c17e7c46762137e9846526a1ad27ad53e013c6ea5c7e5b3ed1d93fc"], 0x28}, 0x1, 0x9effffff00000000}, 0x0) recvmsg$can_raw(r4, &(0x7f0000000500)={&(0x7f00000003c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000100)=""/17, 0x11}], 0x1, &(0x7f0000000480)=""/72, 0x48}, 0x10000) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000180)={'bridge_slave_0\x00', r7}) sendmsg$TIPC_NL_BEARER_ENABLE(r2, 0x0, 0x4) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0xc000, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) r10 = socket$inet_udplite(0x2, 0x2, 0x88) r11 = fcntl$dupfd(r10, 0x0, r9) connect(r11, &(0x7f0000000000)=@in={0x2, 0x0, @multicast1}, 0x80) r12 = socket$inet6_tcp(0xa, 0x1, 0x0) r13 = fcntl$dupfd(0xffffffffffffffff, 0x0, r12) connect(r13, &(0x7f0000000000)=@in={0x2, 0x0, @multicast1}, 0x80) r14 = socket$nl_route(0x10, 0x3, 0x0) r15 = socket(0x11, 0x800000003, 0x0) bind(r15, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r15, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r17 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r17, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route(r14, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000600)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=r16, @ANYBLOB="000000000000000008000400", @ANYRES32=0x0, @ANYBLOB="b666aaff176d15ceea5cca5337fbc874ad39162235cf000053f6bed4f044d5d946", @ANYRES32=0x0, @ANYBLOB="71f72dc582c032770b831acdf60c8b07e715e078b910a19847206ab656b86e65edcde638f0282e82f0e9be7cba054131c42d8379d5331cbd9ca325c3f8825f528dd688b02be30301ddf6f26793d4ca090fe252c684b62f36fa821b04b330a1410b751f2d61f7a14b5ca04ed86c0eb89b63d9b8d9d0f3b5c650635b002bd7343ee1d97f66735ce02661e8328c1f047c4af05fb7bf6979822456a0a33ddfc8437dbcf6ed6c5121b830c2b93f047e760ca13a4d10315bd3ab1374993dea10c568907a839231bfb813c9c1aba6a0380520e61588f26be99992"], 0x30}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)=@mpls_getnetconf={0x3c, 0x52, 0x4, 0x0, 0x25dfdbfc, {}, [@NETCONFA_IFINDEX={0x8}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x6}, @NETCONFA_IFINDEX={0x8}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x7fffffff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8}]}, 0x3c}}, 0x21dbf90800faa7b6) 06:01:07 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe800000002b000000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:01:07 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0xffefffffff7f0000) [ 2276.492780][ T8397] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2276.513513][ T8397] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2276.524534][ T8397] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock 06:01:07 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) write$P9_RXATTRCREATE(r1, &(0x7f0000000040)={0x7, 0x21, 0x2}, 0x7) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 06:01:07 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3, &(0x7f00000008c0)=[{&(0x7f00000000c0)="8000000038040000197a0300e60100006c00001a000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x3ff8000000000}, {&(0x7f00000005c0)="b4065f2ab9075ba253e109154559f88f062320246c5ae74af8e236a42c0cd0b73085bf4313acfd026684e3be45cf8f03379864cd059401666557f67127a057d2cb8d6521890c5cbfe5eaf821257dfacfaf5ef8b4c06e941318d3eec42a910d1420306249520086172e5e2f0c2308655d2a82735e431f158af85763d2d76375e78b343d563d952660c79ecfad7ccb16689bcb4fed9533483595eb30e2671cd545", 0xa0, 0x4}], 0x4803, 0x0) [ 2276.537804][ T8397] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 2276.551480][ T8397] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 2276.557971][ T8397] EXT4-fs (loop3): mount failed 06:01:07 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe800000002c000000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:01:07 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x0, 0x0, 0x300}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) 06:01:07 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe800000002f000000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2276.872063][ T8443] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 06:01:08 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x6628, 0x0) ioctl$SIOCGSTAMPNS(r1, 0x8907, &(0x7f0000000040)) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNDETACHFILTER(r4, 0x401054d6, 0x0) r5 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 06:01:08 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0xffffffff00000000) [ 2276.949131][ T8431] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2276.979813][ T8431] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 06:01:08 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000008035000000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2276.991778][ T8431] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2277.007946][ T8431] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature 06:01:08 executing program 5: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000000)={0x4}, 0x10) write(0xffffffffffffffff, &(0x7f0000000500)="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", 0xc1) 06:01:08 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0xffffffffa0008000) [ 2277.070875][ T8431] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 2277.105767][ T8431] EXT4-fs (loop3): mount failed 06:01:08 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x0, 0x0, 0x8bf}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) [ 2277.189644][ T8431] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2277.215574][ T8431] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 06:01:08 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe800000003c000000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2277.248090][ T8431] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2277.262212][ T8431] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 2277.283895][ T8431] EXT4-fs (loop3): corrupt root inode, run e2fsck 06:01:08 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='configfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./bu/file1,lowerdir=./file0\x00'/47]) rmdir(&(0x7f0000000140)='./bus/file0\x00') 06:01:08 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3, &(0x7f00000008c0)=[{&(0x7f00000000c0)="8000000038040000197a0300e60100006c00001b000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x3ff8000000000}, {&(0x7f00000005c0)="b4065f2ab9075ba253e109154559f88f062320246c5ae74af8e236a42c0cd0b73085bf4313acfd026684e3be45cf8f03379864cd059401666557f67127a057d2cb8d6521890c5cbfe5eaf821257dfacfaf5ef8b4c06e941318d3eec42a910d1420306249520086172e5e2f0c2308655d2a82735e431f158af85763d2d76375e78b343d563d952660c79ecfad7ccb16689bcb4fed9533483595eb30e2671cd545", 0xa0, 0x4}], 0x4803, 0x0) [ 2277.294358][ T8431] EXT4-fs (loop3): mount failed 06:01:08 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x0, 0x0, 0x6400}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) 06:01:08 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000040000000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:01:08 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0xffffffffff600000) [ 2277.488483][ T8490] overlayfs: missing 'workdir' [ 2277.500055][ T8490] overlayfs: missing 'workdir' [ 2277.541008][ T8493] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2277.597900][ T8493] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2277.630965][ T8493] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2277.664985][ T8493] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 2277.678956][ T8493] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 2277.687748][ T8493] EXT4-fs (loop3): mount failed [ 2277.749183][ T8493] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2277.770000][ T8493] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2277.787714][ T8493] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2277.858303][ T8493] EXT4-fs: failed to create workqueue [ 2277.870296][ T8493] EXT4-fs (loop3): mount failed 06:01:11 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x0, 0x0, 0xbf08}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) 06:01:11 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000543000000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:01:11 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x6628, 0x0) r2 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000001400)='/proc/self\x00', 0x20802, 0x0) dup2(r1, r2) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x6628, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x6628, 0x0) r4 = fcntl$dupfd(r0, 0x406, r3) ioctl$RTC_PIE_OFF(r4, 0x7006) r5 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r5, 0x0, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x20000, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', r6, &(0x7f0000000300)='./file0\x00', 0x2) tkill(r5, 0x41) ptrace$cont(0x18, r5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r5, 0x0, &(0x7f0000000080)) r7 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r8, 0x40086602, 0x400007) write$cgroup_int(r8, &(0x7f0000000200), 0x12) sendmsg$inet6(r8, &(0x7f0000000240)={&(0x7f0000000000)={0xa, 0x4e33, 0x7ff, @empty, 0x1}, 0x1c, &(0x7f0000000340)=[{&(0x7f0000000400)="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", 0x1000}, {&(0x7f0000000040)="1d5fd0a4220b2802002f44", 0xb}, {&(0x7f0000000100)="5bc5abe16c481bc68c93d9a61fa93e67e8c9e47993f0a4e3368d411250433a42984988f5bd9752d033b2bb55136fe4b85defc10e43ebf833880933fdd19812e881caf87b59b35218452db7f7adbf52ed4178dd29a3a24b3530401d4f0ba268c9b85e96dd410296a62cd0e0499cbdc50309cfb93db3a2a6009ad77b1a8d9313751b28ab1fc0affe9c399ca3e3e9ed68188835bb80dccad3bfb74f03acaae3f4d4e0e6537f12de311b1a1ee1a341af5e16b3248b5b6c778995e3db1b637f", 0xbd}], 0x7}, 0x80c) ptrace$cont(0x20, r5, 0x0, 0x0) 06:01:11 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x6628, 0x0) preadv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/219, 0xdb}], 0x1, 0x10001) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r2 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 06:01:11 executing program 5: r0 = socket(0x1d, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000180)={{0x2, 0x3, 0x60db4387, 0x0, 0x6}, 0x7, 0xff, 0x7ff}) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000300)='batadv\x00') sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x854608f247cdc2cc}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x40, r3, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x3ff}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x6}, @BATADV_ATTR_ORIG_ADDRESS={0xa}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x6}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}]}, 0x40}}, 0x8000) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000001c0)={@multicast2, @rand_addr, 0x0}, &(0x7f0000000200)=0xc) sendmsg$BATADV_CMD_GET_HARDIF(r0, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x50, r3, 0x0, 0x70bd28, 0x25dfdbfd, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x62fb}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_VLANID={0x6}, @BATADV_ATTR_MULTICAST_FANOUT={0x8}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r4}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x81}]}, 0x50}, 0x1, 0x0, 0x0, 0x20000000}, 0x8095) 06:01:11 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3, &(0x7f00000008c0)=[{&(0x7f00000000c0)="8000000038040000197a0300e60100006c00001c000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x3ff8000000000}, {&(0x7f00000005c0)="b4065f2ab9075ba253e109154559f88f062320246c5ae74af8e236a42c0cd0b73085bf4313acfd026684e3be45cf8f03379864cd059401666557f67127a057d2cb8d6521890c5cbfe5eaf821257dfacfaf5ef8b4c06e941318d3eec42a910d1420306249520086172e5e2f0c2308655d2a82735e431f158af85763d2d76375e78b343d563d952660c79ecfad7ccb16689bcb4fed9533483595eb30e2671cd545", 0xa0, 0x4}], 0x4803, 0x0) 06:01:11 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000008847000000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2280.267908][ T8517] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2280.281954][ T22] kauditd_printk_skb: 353 callbacks suppressed [ 2280.281963][ T22] audit: type=1400 audit(1579672871.354:348470): avc: denied { map } for pid=8525 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 06:01:11 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) r1 = epoll_create1(0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) fsetxattr$security_evm(r1, &(0x7f0000000100)='security.evm\x00', &(0x7f0000000180)=@v1={0x2, "fa186463a9e0"}, 0x7, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = gettid() rt_sigqueueinfo(r5, 0x21, &(0x7f0000000000)) r6 = gettid() rt_sigqueueinfo(r6, 0x21, &(0x7f0000000000)) ptrace$cont(0x1f, r6, 0x20000002, 0x0) 06:01:11 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x0, 0x0, 0x3000000}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) [ 2280.317109][ T8519] can: request_module (can-proto-0) failed. [ 2280.374924][ T8517] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2280.385888][ T22] audit: type=1400 audit(1579672871.374:348471): avc: denied { map } for pid=8527 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2280.418426][ T8519] can: request_module (can-proto-0) failed. [ 2280.429964][ T22] audit: type=1400 audit(1579672871.374:348472): avc: denied { map } for pid=8527 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2280.441620][ T8517] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2280.466752][ T8517] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature 06:01:11 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) mincore(&(0x7f0000ff9000/0x4000)=nil, 0x4000, &(0x7f0000000000)=""/81) 06:01:11 executing program 5: syz_open_dev$binderN(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x2) listxattr(&(0x7f0000000040)='./bus\x00', &(0x7f0000000200)=""/4096, 0x1000) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) poll(0x0, 0x0, 0x0) ioctl$BINDER_THREAD_EXIT(0xffffffffffffffff, 0x40046207, 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, 0x0}, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="c9f4fc96b23be1086aa00b548c1b42c83ff55fc0086dace21e8f00645cf45e566815b2"], 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) write$cgroup_int(r3, &(0x7f0000000200), 0x12) ioctl$VT_DISALLOCATE(r3, 0x5608) r4 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xffffffff, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r5, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x40086602, 0x400007) write$cgroup_int(r6, &(0x7f0000000200), 0x12) ioctl$TIOCL_UNBLANKSCREEN(r6, 0x541c, &(0x7f0000000140)) write$FUSE_DIRENTPLUS(r5, &(0x7f00000000c0)=ANY=[@ANYBLOB="8f"], 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r2, r4) [ 2280.470950][ T22] audit: type=1400 audit(1579672871.374:348473): avc: denied { map } for pid=8527 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2280.512450][ T8517] EXT4-fs (loop3): corrupt root inode, run e2fsck 06:01:11 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000008848000000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:01:11 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) [ 2280.519883][ T22] audit: type=1400 audit(1579672871.374:348474): avc: denied { map } for pid=8527 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2280.528697][ T8517] EXT4-fs (loop3): mount failed [ 2280.556311][ T22] audit: type=1400 audit(1579672871.374:348475): avc: denied { map } for pid=8527 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2280.602768][ T22] audit: type=1400 audit(1579672871.374:348476): avc: denied { map } for pid=8527 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 06:01:11 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000008864000000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2280.632815][ T22] audit: type=1400 audit(1579672871.374:348477): avc: denied { map } for pid=8527 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2280.658641][ T22] audit: type=1400 audit(1579672871.374:348478): avc: denied { map } for pid=8527 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 06:01:11 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/access\x00', 0x2, 0x0) vmsplice(r1, &(0x7f0000000040)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0xe) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x80800, 0x0) getsockopt$TIPC_IMPORTANCE(r2, 0x10f, 0x7f, &(0x7f0000000180), &(0x7f00000001c0)=0x4) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 06:01:11 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x0, 0x0, 0x8000000}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) 06:01:11 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) lgetxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)=@known='com.apple.FinderInfo\x00', &(0x7f0000000240)=""/211, 0xd3) write$cgroup_int(r1, &(0x7f0000000200), 0x12) ioctl$PPPIOCSPASS(r1, 0x40107447, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x0, 0x1f, 0x0, 0x3ff}, {0x8001, 0x20, 0x4, 0xdb7b6a82}, {0xe5, 0x0, 0x21, 0xfffff801}, {0x122, 0x0, 0x5, 0x4}, {0x7fff, 0x3, 0x1, 0x24000}]}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) [ 2280.684445][ T22] audit: type=1400 audit(1579672871.374:348479): avc: denied { map } for pid=8527 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2280.789560][ T8517] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2280.805895][ T8517] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2280.827735][ T8517] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2280.863785][ T8517] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature 06:01:12 executing program 5: socket(0x10, 0x4000000000000002, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x7, 0x5, 0x0, 0x0, 0xfffffffffffffffd, 0x1}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000e00)=[{{&(0x7f0000000480)=@in6={0xa, 0x0, 0x0, @initdev}, 0x80, &(0x7f0000000b00)=[{0xfffffffffffffffe}, {&(0x7f0000000600)=""/246, 0xf6}, {&(0x7f0000000940)=""/152, 0x98}, {&(0x7f0000000a00)=""/199, 0xc7}, {&(0x7f0000000180)=""/15, 0xf}, {&(0x7f0000000cc0)=""/37, 0x1f}, {&(0x7f0000000700)=""/36, 0x24}], 0x1}, 0x100}, {{&(0x7f0000000b80)=@nl=@proc, 0x80, &(0x7f0000000f80)=[{&(0x7f0000000c00)=""/168, 0xa8}, {&(0x7f0000002400)=""/4096, 0x1000}, {&(0x7f0000000e80)=""/103, 0x67}, {&(0x7f0000000f00)=""/117, 0x75}], 0x4, &(0x7f0000000d00)=""/204, 0xd5}, 0x62}], 0x2, 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000100), 0xe}, 0x32308, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_genetlink_get_family_id$nl80211(&(0x7f0000000300)='nl80211\x00') socket(0x10, 0x0, 0x0) r4 = socket(0x10, 0x4000000000000002, 0xc) write(r4, &(0x7f0000000000)="1f0000000104ff00fd4354c007110000f30503000a000100010423dcffdf00", 0x23c) r5 = accept(0xffffffffffffffff, &(0x7f0000000080)=@l2, 0x0) r6 = syz_genetlink_get_family_id$netlbl_mgmt(0x0) sendmsg$NLBL_MGMT_C_REMOVE(r5, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100a9100}, 0xc, &(0x7f0000000280)={&(0x7f0000000740)=ANY=[@ANYBLOB="fc00000094130465d1f4e061d56c5d64e45a5271a63c1058d78ea1a5900f62650daa05a700163c07a400000000004f1268505b789ce3a2ac7190d5521e3d1ae87665fb04f6d9ceae1dd8fa6a5a21fc74383be006ef6120548d20f7447987e5872109dd202263dd6fdf4385309222d1895f884efe1d9602144c6911bcbaad9ef4ab7f492122f992c18c386fdb694540964bd111ecba4b27872da68cfa677c7b19af054f4337a16265f22fa92a6c95409849b2458cbd3009b5ed040018bb1883ec960d72c1b7b4527d0fe896e59326b8", @ANYRES16=r6, @ANYBLOB="010028bd7000fbdbdf250204000008000400020000009e0001007b73656c696e7578737987f2656dea75736572295d757365927d005fd49133448515ddff6810b96186e96e548ebe2297500413137eadcbdd2fcaaeb2ca7ab84b09678ccc68dc20b366bf9b31ecff2a99aae32f9689f0980e4b3d4763120402dc1aa07bafc144c5c207964cc4c1d4c265d9ed1519d47f4c2bb3c84f46aa3a53318edd76ed5e53cdac7f6299efe510cea8f9cf1eed4fab256ccdea00001400050000000000000000000000000000000001210001006370757365742965746831657468317dd584f3eaab2a304f193576626f786e657431626465760000002da3"], 0xfc}, 0x1, 0x0, 0x0, 0x1}, 0x40000000) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x6628, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r8, 0x40086602, 0x400007) write$cgroup_int(r8, &(0x7f0000000200), 0x12) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r9, 0x6628, 0x0) sendmsg$NLBL_MGMT_C_REMOVE(r4, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYRES32=r5, @ANYRES16=r6, @ANYBLOB="00020863ed1de93eeec2a1a96dd97cc75f26bd7000fbdbdf2502000000080008000000020600010058000000f6bcb40cedf9d83bd04ab33157ad809121afaa", @ANYBLOB="ded64369c4e0c01f3470265a09de232e99b22d20d381e078349298a73edf5ec4e5ee5587666dd6a0426526e1e450d78abb74f53fe083ce9b91efaa21ae14297ebdb3d565dcd44a84806c4de756a4883ebdd051f39ce5257e46", @ANYRESOCT=r7, @ANYRES64=r8, @ANYRES64=r9], 0x7}, 0x1, 0x0, 0x0, 0x40040}, 0x20000004) sched_setattr(0x0, &(0x7f00000002c0)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) mkdir(0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r10 = syz_open_procfs(0x0, &(0x7f0000000440)='net/fib_trie\x00') preadv(r10, &(0x7f00000017c0), 0x199, 0x0) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x0, 0x0) chdir(&(0x7f0000000300)='./file0\x00') ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x8004e500, &(0x7f0000001340)) dup(0xffffffffffffffff) 06:01:12 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3, &(0x7f00000008c0)=[{&(0x7f00000000c0)="8000000038040000197a0300e60100006c00001d000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x3ff8000000000}, {&(0x7f00000005c0)="b4065f2ab9075ba253e109154559f88f062320246c5ae74af8e236a42c0cd0b73085bf4313acfd026684e3be45cf8f03379864cd059401666557f67127a057d2cb8d6521890c5cbfe5eaf821257dfacfaf5ef8b4c06e941318d3eec42a910d1420306249520086172e5e2f0c2308655d2a82735e431f158af85763d2d76375e78b343d563d952660c79ecfad7ccb16689bcb4fed9533483595eb30e2671cd545", 0xa0, 0x4}], 0x4803, 0x0) 06:01:12 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) writev(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000100)="2a3866d8bc748f0793c188cffa715883920e3242ea73c7ba4bf320e1c6a6e0d4a0a2f078fa105dfac98248614e0d15589ef474a224", 0x35}], 0x1) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r1) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x3, 0x70, 0x7, 0x77, 0x4, 0x4, 0x0, 0x3, 0x40, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x7}, 0x100, 0x8, 0x4, 0x3, 0x8, 0x8, 0x1}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x8) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x6628, 0x0) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x4000400203) ptrace$cont(0x20, r0, 0x0, 0x0) 06:01:12 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x0, 0x0, 0x64000000}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) 06:01:12 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000074000000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2280.939385][ T8517] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 2280.946006][ T8517] EXT4-fs (loop3): mount failed 06:01:12 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000e80000000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:01:12 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) write$cgroup_int(r1, &(0x7f0000000200), 0x12) ioctl$UI_END_FF_UPLOAD(r1, 0x406855c9, &(0x7f0000000180)={0xb, 0x3, {0x55, 0x0, 0x0, {0xead7, 0x2}, {0x2901, 0x1}, @period={0x59, 0xb189, 0x1, 0x80, 0xf4, {0x990, 0x101, 0x70, 0x93f1}, 0x2, &(0x7f0000000000)=[0x8001, 0x4fcf]}}, {0x0, 0x100, 0x7, {0x2, 0x80}, {0x9, 0x7f}, @period={0x59, 0x8, 0xffff, 0x3, 0x5, {0x401, 0x81, 0x5, 0x8000}, 0x9, &(0x7f0000000040)=[0x3, 0x8, 0x0, 0x8, 0x4, 0x1, 0xf000, 0x20, 0x2]}}}) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 06:01:12 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x10080, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) write$cgroup_int(r2, &(0x7f0000000200), 0x12) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000040)=r2) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ioctl$FS_IOC_FSGETXATTR(r2, 0x801c581f, &(0x7f0000000100)={0xffff, 0x400, 0x1e9ebdc8, 0x0, 0x3}) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40f00, 0x5, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) [ 2281.131559][ T8602] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 06:01:12 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x0, 0x0, 0xbf080000}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) [ 2281.206964][ T8602] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 06:01:12 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 2281.254191][ T8602] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock 06:01:12 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000003580000000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:01:12 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x21, &(0x7f0000000000)) ptrace$setopts(0x4206, r1, 0x1, 0x100050) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) [ 2281.350478][ T8602] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 2281.365390][ T8602] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 2281.372216][ T8602] EXT4-fs (loop3): mount failed 06:01:12 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000081000000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2281.458661][ T8602] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2281.502051][ T8602] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2281.518092][ T8602] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2281.573833][ T8602] EXT4-fs: failed to create workqueue [ 2281.593224][ T8602] EXT4-fs (loop3): mount failed 06:01:12 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3, &(0x7f00000008c0)=[{&(0x7f00000000c0)="8000000038040000197a0300e60100006c00001e000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x3ff8000000000}, {&(0x7f00000005c0)="b4065f2ab9075ba253e109154559f88f062320246c5ae74af8e236a42c0cd0b73085bf4313acfd026684e3be45cf8f03379864cd059401666557f67127a057d2cb8d6521890c5cbfe5eaf821257dfacfaf5ef8b4c06e941318d3eec42a910d1420306249520086172e5e2f0c2308655d2a82735e431f158af85763d2d76375e78b343d563d952660c79ecfad7ccb16689bcb4fed9533483595eb30e2671cd545", 0xa0, 0x4}], 0x4803, 0x0) 06:01:12 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x6628, 0x0) dup(0xffffffffffffffff) r2 = socket$inet6(0xa, 0x803, 0x2) r3 = socket(0x10, 0x3, 0x0) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r4, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)=@ipv6_newroute={0x24, 0x18, 0x1, 0x0, 0x0, {}, [@RTA_OIF={0x8, 0x4, r5}]}, 0x24}}, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8936, &(0x7f0000000000)={@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], @local}, 0x0, r5}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000440)=0x14) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x527604cb869504df, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x41100, 0xf, [], r6, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 06:01:12 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x0, 0x0, 0xfefdffff}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) 06:01:12 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000005e40)=[{{&(0x7f0000000080)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0}}, {{&(0x7f0000000840)={0xa, 0x4e24, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB="38000000000000005d7cfd1b792900000039000000000402000000000000000000000000000000ff0838ab0f"], 0x38}}], 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) write$cgroup_int(r1, &(0x7f0000000200), 0x12) dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000480)='nl80211\x00') sendmsg$NL80211_CMD_SET_BSS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x28, r2, 0x300, 0x70bd28, 0x25dfdbfd, {}, [@NL80211_ATTR_P2P_CTWINDOW={0x5}, @NL80211_ATTR_WDEV={0xc, 0x99, {0xff, 0x4}}]}, 0x28}, 0x1, 0x0, 0x0, 0x240449c4}, 0x40) recvmsg$can_raw(r1, &(0x7f0000000400)={&(0x7f0000000000)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/181, 0xb5}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000180)=""/71, 0x47}, {&(0x7f0000001900)=""/4096, 0x1000}, {&(0x7f0000000200)=""/230, 0xe6}, {&(0x7f0000000300)=""/65, 0x41}], 0x6}, 0x40010100) 06:01:12 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000082000000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:01:12 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) write$cgroup_int(r1, &(0x7f0000000200), 0x12) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000240)=""/181) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) write$cgroup_int(r2, &(0x7f0000000200), 0x12) r3 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_int(r4, &(0x7f0000000200), 0x12) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x6628, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x6628, 0x0) getsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f0000000600)={{{@in=@multicast2, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000004700)=0xe8) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r8, 0x40086602, 0x400007) write$cgroup_int(r8, &(0x7f0000000200), 0x12) accept$packet(r8, &(0x7f00000048c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000004900)=0x14) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000004940)={'batadv0\x00', 0x0}) r11 = socket$inet6(0xa, 0x803, 0x2) r12 = socket(0x10, 0x3, 0x0) r13 = socket(0x11, 0x800000003, 0x0) bind(r13, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r13, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r12, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000540)=ANY=[@ANYBLOB="240000001800010000000000000000000a000000000000000000000008000400", @ANYRES32=r14, @ANYBLOB="572cddc650062f7112fda51bd62930a7212c6218684c62faa10d5394a6385a119c8765af0fe3b6aaaee38a34dbda5096373b24d82b90f244707c99f8666d2be0831ac68164b26f96b8bfc3166d0085528a6339cef4c826970442597463b48bfbcd358c978ede4a6a1cfe1816cdb61a65c091aa"], 0x24}}, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r11, 0x8936, &(0x7f0000000000)={@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], @local}, 0x0, r14}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000004a40)={'team0\x00', 0x0}) r16 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r16, 0x40086602, 0x400007) write$cgroup_int(r16, &(0x7f0000000200), 0x12) getsockopt$inet_mreqn(r16, 0x0, 0x23, &(0x7f0000004a80)={@loopback, @initdev, 0x0}, &(0x7f0000004ac0)=0xc) r18 = socket$inet6(0xa, 0x803, 0x2) r19 = socket(0x10, 0x3, 0x0) r20 = socket(0x11, 0x800000003, 0x0) bind(r20, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r20, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r19, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=ANY=[@ANYBLOB="24000000180001000000000000000a000000000000000000000008fa04000000", @ANYRES32=r21, @ANYBLOB="a9e91853c85ad33c71769eb2e49f0342f1e42043c9625490fa46496d41cfacb5294b0153414d2160677291a63df96f70c731033936c2da99c6ff94b5f34a54518c27fb04f47b42d596c2dcb95641c22848d305e5e8b84c62225f1a7e0ccf9197e2e32bf8858eb93ba60d549a0ab8d6c67dc09bbf0f5329e9b3bb9cc650ef8d4425b34449b8f961918cd7a913c5e09980409f75e49faf707dad7b993aef764d10a1da0a8251ee9f1324388e8d76e73cf5c74a6e0f67d2e40f98c6fa2e334c0c83927bc9eb"], 0x24}}, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r18, 0x8936, &(0x7f0000000000)={@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], @local}, 0x0, r21}) r22 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r22, 0x6628, 0x0) getsockopt$inet_pktinfo(r22, 0x0, 0x8, &(0x7f0000004b00)={0x0, @remote, @initdev}, &(0x7f0000004b40)=0xc) r24 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r24, 0x6628, 0x0) getsockopt$inet_mreqn(r24, 0x0, 0x0, &(0x7f0000004c40)={@remote, @initdev, 0x0}, &(0x7f0000004c80)=0xc) r26 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r26, 0x6628, 0x0) pipe2(&(0x7f0000000300), 0x80000) r27 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r27, 0x6628, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r24, 0x29, 0x23, &(0x7f0000004cc0)={{{@in6=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) r29 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r29, 0x40086602, 0x400007) write$cgroup_int(r29, &(0x7f0000000200), 0x12) getsockname$packet(r29, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000004e40)=0x14) r31 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r31, 0x40086602, 0x400007) write$cgroup_int(r31, &(0x7f0000000200), 0x12) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000005300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000052c0)={&(0x7f0000000e40)=ANY=[@ANYBLOB="14040000", @ANYRES16=r3, @ANYBLOB="000225bd7000ffdbdf250000000008000100", @ANYRES32=r7, @ANYBLOB="7400020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000500030003000000080004000600000038000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000500030003000000080004000080000008000100", @ANYRES32=r9, @ANYBLOB="7c00020040000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e000000080004000200000008000600", @ANYRES32=r10, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000500030003000000080004000200000008000100", @ANYRES32=0x0, @ANYBLOB="0001020040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000050003000300000008000400", @ANYRES32=r31, @ANYBLOB="08000700000000003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000005000300060000000400040008000600", @ANYRES32=r15, @ANYBLOB="40000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000050003000300000008000400", @ANYRES32=0x0, @ANYBLOB="080007000000000040000100240001006d6f6465000000000000000000000000000000000000000000000000000000000500030005000000100004006c6f616462616c616e63650008000100", @ANYRES32=r17, @ANYBLOB="b40002003800010024000100616374697665706f727400000000000000000000000000000000000000000000050003000300000008000400", @ANYRES16=r23, @ANYBLOB="400001002400011071756575655f6964000000000000000000000000000000000000000000000000050003000300a8e7ef886805744953e3cf6e0000080004000600000000000000", @ANYRES32=r23, @ANYBLOB="38000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000500030003000000080004000200000008000100", @ANYRES32=r25, @ANYBLOB="3401020038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000050003000300000008000400ff0000003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=r28, @ANYRESDEC, @ANYRES32=r30, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000500030005000000110004006163746976656261636b75700000000040000100240001006d6f6465000000000000000000000000000000000000000000000000000000000500030005000000100004006c6f616462616c616e636500"], 0x1d}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000000)=0x4, 0x4) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BLKROGET(r1, 0x125e, &(0x7f0000000100)) r34 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r34, 0x40086602, 0x400007) write$cgroup_int(r34, &(0x7f0000000200), 0x12) write$binfmt_elf32(r34, &(0x7f0000001d40)=ANY=[], 0x0) r35 = fcntl$dupfd(r33, 0x0, r32) ioctl$PERF_EVENT_IOC_ENABLE(r35, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 06:01:12 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000004788000000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:01:12 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) ptrace$peekuser(0x3, r4, 0x7) 06:01:12 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x0, 0x0, 0xfffffdfe}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) [ 2281.839832][ T8664] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 06:01:12 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=@newlink={0x238, 0x10, 0xe3b, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, 0x6}, @IFLA_LINKINFO={0x210, 0x12, @ip6ip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x200, 0x2, [@tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @ipv4={[], [], @multicast1}}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @ipv4={[], [], @dev}}, @IFLA_IPTUN_LOCAL={0x14, 0x3, @loopback={0xfec0ffff00000000}}, @IFLA_IPTUN_LOCAL={0x1c, 0x2, @rand_addr="6c188a44711625f7e8e5d070c39a513b"}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @initdev={0xfe, 0x88, [0x0, 0x0, 0x3a, 0x0, 0x3], 0x0, 0x0}}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev}], @tunl6_policy, @tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="26235e58cad1850f722a1b12de5fb0c3"}, @IFLA_IPTUN_LOCAL={0x14, 0x4001, @remote}, @IFLA_IPTUN_FLAGS={0x8}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @ipv4}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x6}, @IFLA_IPTUN_LINK={0xffffffffffffff3f}, @IFLA_IPTUN_TTL={0x5}, @IFLA_IPTUN_TOS={0x5}, @IFLA_IPTUN_FWMARK={0x8}], @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_FLAGS={0x8}, @IFLA_IPTUN_ENCAP_LIMIT={0x5}], @IFLA_IPTUN_PROTO={0x5}, @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x6}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_SPORT={0x6}, @IFLA_IPTUN_ENCAP_SPORT={0x6}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x6}], @IFLA_IPTUN_FLAGS={0x8}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_FLAGS={0x8}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @empty}, @tunl_policy=[@IFLA_IPTUN_TTL={0x5}, @IFLA_IPTUN_TTL={0x5}, @IFLA_IPTUN_TOS={0x5}, @IFLA_IPTUN_ENCAP_FLAGS={0x3}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_ENCAP_FLAGS={0x6}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x6}], @tunl_policy=[@IFLA_IPTUN_ENCAP_DPORT={0x6}, @IFLA_IPTUN_ENCAP_DPORT={0x6}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x6}, @IFLA_IPTUN_TTL={0x5}, @IFLA_IPTUN_TTL={0x5}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FWMARK={0x8}]], @IFLA_IPTUN_PROTO={0x5}]}}}]}, 0x238}}, 0x0) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r1, 0xc0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=0x10000, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x7, 0x5}, 0x0, 0x0, &(0x7f0000000100)={0x4, 0x9, 0x9, 0x1}, &(0x7f0000000140)=0x8, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x7fff}}, 0x10) [ 2281.881768][ T8664] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 06:01:13 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000004888000000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:01:13 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x0, 0x0, 0x300000000000000}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) [ 2281.968981][ T8664] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2282.000899][ T8684] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 2282.027553][ T8664] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 2282.038629][ T8684] netlink: 304 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2282.062686][ T8664] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 2282.076345][ T8664] EXT4-fs (loop3): mount failed [ 2282.110418][ T8684] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 2282.118939][ T8684] netlink: 304 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2282.152104][ T8664] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2282.187256][ T8664] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2282.205050][ T8664] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2282.242065][ T8664] EXT4-fs: failed to create workqueue [ 2282.255576][ T8664] EXT4-fs (loop3): mount failed 06:01:13 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3, &(0x7f00000008c0)=[{&(0x7f00000000c0)="8000000038040000197a0300e60100006c00001f000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x3ff8000000000}, {&(0x7f00000005c0)="b4065f2ab9075ba253e109154559f88f062320246c5ae74af8e236a42c0cd0b73085bf4313acfd026684e3be45cf8f03379864cd059401666557f67127a057d2cb8d6521890c5cbfe5eaf821257dfacfaf5ef8b4c06e941318d3eec42a910d1420306249520086172e5e2f0c2308655d2a82735e431f158af85763d2d76375e78b343d563d952660c79ecfad7ccb16689bcb4fed9533483595eb30e2671cd545", 0xa0, 0x4}], 0x4803, 0x0) 06:01:13 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='sysfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0xc8000, 0xce) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x100000, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000100)=[@sack_perm, @mss={0x2, 0x8000000}, @timestamp, @timestamp, @sack_perm, @mss={0x2, 0x5}, @timestamp, @window={0x3, 0x2, 0x8}, @timestamp], 0x9) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='.\x00'], 0x2) mount$fuse(0x20000000, &(0x7f0000000580)='./file0\x00', 0x0, 0x7a04, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0xa) 06:01:13 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000006488000000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:01:13 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() getpid() r1 = gettid() rt_sigqueueinfo(r1, 0x21, &(0x7f0000000000)) wait4(r1, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 06:01:13 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x0, 0x0, 0x400000000000000}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) 06:01:13 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) r4 = socket$inet6(0xa, 0x803, 0x2) r5 = socket(0x10, 0x3, 0x0) r6 = socket(0x11, 0x800000003, 0x0) bind(r6, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r6, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)=@ipv6_newroute={0x24, 0x18, 0x1, 0x0, 0x0, {}, [@RTA_OIF={0x8, 0x4, r7}]}, 0x24}}, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x8936, &(0x7f0000000000)={@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], @local}, 0x0, r7}) r8 = socket$inet6(0xa, 0x803, 0x2) r9 = socket(0x10, 0x3, 0x0) r10 = socket(0x11, 0x800000003, 0x0) bind(r10, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r10, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)=@ipv6_newroute={0x24, 0x18, 0x1, 0x0, 0x0, {}, [@RTA_OIF={0x8, 0x4, r11}]}, 0x24}}, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r8, 0x8936, &(0x7f0000000000)={@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], @local}, 0x0, r11}) r12 = socket$inet6(0xa, 0x803, 0x2) r13 = socket(0x10, 0x3, 0x0) r14 = socket(0x11, 0x800000003, 0x0) bind(r14, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r14, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)=@ipv6_newroute={0x24, 0x18, 0x1, 0x0, 0x0, {}, [@RTA_OIF={0x8, 0x4, r15}]}, 0x24}}, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r12, 0x8936, &(0x7f0000000000)={@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], @local}, 0x0, r15}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@loopback}}, &(0x7f0000000040)=0xe8) sendmsg$NL80211_CMD_GET_SCAN(r3, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000280)={0x5c, 0x0, 0x2, 0x70bd2a, 0x25dfdbff, {}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}, @NL80211_ATTR_WIPHY={0x8}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r7}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r11}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1ff, 0x2}}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x5, 0x3}}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r15}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r16}]}, 0x5c}, 0x1, 0x0, 0x0, 0x24000001}, 0x4800) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup(r1) ptrace$cont(0x20, r0, 0x0, 0x0) 06:01:13 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000689000000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2282.483827][ T8719] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2282.493819][ T8719] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2282.505412][ T8719] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2282.527656][ T8719] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 2282.542459][ T8719] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 2282.549233][ T8719] EXT4-fs (loop3): mount failed 06:01:15 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe800000a000800000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:01:15 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x0, 0x0, 0x800000000000000}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) 06:01:15 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3, &(0x7f00000008c0)=[{&(0x7f00000000c0)="8000000038040000197a0300e60100006c000020000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x3ff8000000000}, {&(0x7f00000005c0)="b4065f2ab9075ba253e109154559f88f062320246c5ae74af8e236a42c0cd0b73085bf4313acfd026684e3be45cf8f03379864cd059401666557f67127a057d2cb8d6521890c5cbfe5eaf821257dfacfaf5ef8b4c06e941318d3eec42a910d1420306249520086172e5e2f0c2308655d2a82735e431f158af85763d2d76375e78b343d563d952660c79ecfad7ccb16689bcb4fed9533483595eb30e2671cd545", 0xa0, 0x4}], 0x4803, 0x0) 06:01:15 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) socketpair(0x5, 0x6, 0x31, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RREAD(r3, &(0x7f0000000180)={0xd9, 0x75, 0x1, {0xce, "54f1551b9ec244866f8ea10f66a2f12f625634e936d4569f560330a02611e285fc22ec54de08d1380c13b4680f85e9b0b61b0617a5d7c5b66af4a7bc95347be7533f3f972f757f3029b6d169cbb8769d5ac485322a1a4805f2f44f32573ca8da4f379537243e9a62a2d37d22da0d55191099d454bca63ceb7139ce265a0520fefc7be9e595f2712b2e72b9f0d1e523b26dff57201ef171ecc0c6eb6b5a204845fac4e444b0bbd3ece21bdb65ad03ccaa09bcb981c9a3fa134aad8b8d2ed16350cbeee1a78a04adc6765bfeafb3c8"}}, 0xd9) setsockopt$CAN_RAW_FD_FRAMES(r3, 0x65, 0x5, &(0x7f0000000000)=0x9, 0x4) ptrace$cont(0x20, r0, 0x0, 0x0) 06:01:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x2}, 0x80}, 0x0, 0xe, 0xffffffffffffffff, 0x1) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r0, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0}) lsetxattr$trusted_overlay_nlink(&(0x7f0000000080)='./bus\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', &(0x7f0000000100)={'L-'}, 0x16, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20000, 0x0, 0x0, 0x8}, 0x0, 0x10, 0xffffffffffffffff, 0x0) gettid() preadv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f0000001280)=""/4096, 0x1000}], 0x1, 0x0) timer_create(0x8, &(0x7f00000001c0), &(0x7f0000000040)) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(r1, 0x0, 0x8003, 0x8020001) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) socket$unix(0x1, 0x2, 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) fdatasync(0xffffffffffffffff) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x6628, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) write$cgroup_int(r3, &(0x7f0000000200), 0x12) r4 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x3014c0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000200)={0x0, r4, 0x20, 0x1, 0x0, 0x3fffc}) creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)) fdatasync(0xffffffffffffffff) socket$tipc(0x1e, 0x2, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) creat(0x0, 0x0) fdatasync(0xffffffffffffffff) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r5 = creat(0x0, 0x0) write$P9_RREMOVE(r5, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) fallocate(0xffffffffffffffff, 0x10, 0x0, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r7 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r7, &(0x7f0000000280), 0x1033b) fdatasync(r7) ioctl$EXT4_IOC_MOVE_EXT(r6, 0xc028660f, &(0x7f0000000200)={0x0, r7}) creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) creat(&(0x7f0000000040)='./bus\x00', 0x0) 06:01:16 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000400), 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240), 0x10, &(0x7f0000000300)={&(0x7f0000000280)=@canfd={{0x1, 0x1, 0x1}, 0x1a, 0x2, 0x0, 0x0, "65d9b212b417112ac1dd8b8c2da56ec04fe10b4502567d7860314101727780449d3db52d87fe84f5e70fdf6741edca33928c90c1ed03971fd64238f9f91f1b88"}, 0x48}, 0x1, 0x0, 0x0, 0x50}, 0x20000004) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r1, 0x8983, &(0x7f00000003c0)={0x6, 'ip6_vti0\x00', {0x3ff}}) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$sock_SIOCDELDLCI(r3, 0x8981, &(0x7f0000000100)={'team_slave_1\x00', 0x7fff}) ptrace$cont(0x20, r0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r6 = socket$netlink(0x10, 0x3, 0x6) r7 = syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00') r8 = socket$inet6(0xa, 0x803, 0x2) r9 = socket(0x10, 0x3, 0x0) r10 = socket(0x11, 0x800000003, 0x0) bind(r10, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r10, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="240000001800010000000000000000000a000000000000000000000008000400", @ANYRES32=r11, @ANYBLOB="20000000000000077544be343f154a1a990686a06b77c62c5247044b30264c7372c7607c42bed53a04dbed9c2c1c1879635feb"], 0x24}}, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r8, 0x8936, &(0x7f0000000000)={@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], @local}, 0x0, r11}) r12 = socket$inet6(0xa, 0x803, 0x2) r13 = socket(0x10, 0x3, 0x0) r14 = socket(0x11, 0x800000003, 0x0) bind(r14, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r14, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)=@ipv6_newroute={0x24, 0x18, 0x1, 0x0, 0x0, {}, [@RTA_OIF={0x8, 0x4, r15}]}, 0x24}}, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r12, 0x8936, &(0x7f0000000000)={@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], @local}, 0x0, r15}) r16 = socket$inet6(0xa, 0x803, 0x2) r17 = socket(0x10, 0x3, 0x0) r18 = socket(0x11, 0x800000003, 0x0) bind(r18, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r18, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r17, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)=@ipv6_newroute={0x24, 0x18, 0x1, 0x0, 0x0, {}, [@RTA_OIF={0x8, 0x4, r19}]}, 0x24}}, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r16, 0x8936, &(0x7f0000000000)={@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], @local}, 0x0, r19}) ioctl$sock_SIOCDELRT(r5, 0x890c, &(0x7f0000000600)={0x0, @in={0x2, 0x4e23, @loopback}, @hci={0x1f, 0x8, 0x1}, @can={0x1d, r19}, 0xfc00, 0x0, 0x0, 0x0, 0x7fff, &(0x7f00000005c0)='veth0_to_team\x00', 0x7, 0x8, 0x2}) accept(r1, &(0x7f0000001780)=@can={0x1d, 0x0}, &(0x7f0000001800)=0x80) accept$packet(r4, &(0x7f0000001840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001880)=0x14) r23 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r23, 0x40086602, 0x400007) write$cgroup_int(r23, &(0x7f0000000200), 0x12) getsockname$packet(r23, &(0x7f0000001980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000019c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001a00)={{{@in=@initdev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000001b00)=0xe8) r26 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r26, 0x40086602, 0x400007) write$cgroup_int(r26, &(0x7f0000000200), 0x12) getsockopt$inet_mreqn(r26, 0x0, 0x24, &(0x7f0000001c00)={@empty, @dev, 0x0}, &(0x7f0000001c40)=0xc) sendmsg$TEAM_CMD_PORT_LIST_GET(r6, &(0x7f0000002180)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000002140)={&(0x7f0000000680)=ANY=[@ANYBLOB="84040000", @ANYRES16=r7, @ANYBLOB="100028bd7000fcdbdf250300000008000100", @ANYRES32=r11, @ANYBLOB="5c0102003800010024000100616374697665706f727400000000000000000000000000000000000000000000050003000300000008000400", @ANYRES32=r15, @ANYBLOB="3c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000005000300060000000400040008000600", @ANYRES32=r20, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000500030003000000080004000300000074000100240001006270665f686173685f66756e6300000000000000000000000000000000000000050003000b00000044000400010005f720000000ff005306ff0000000000030905000000c107030506000000080004030700000002002009000000000101ff02ff070000070001080300000038000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000500030003000000080004000500000008000100", @ANYRES32=0x0, @ANYBLOB="040102003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=r21, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c00000000000000050003000300000008000400b90600004c000100240001006c625f74785f6d6574686f6400000000000002000000000000000000000000000500d608477062c7115587e88beb0903000500000019000400686173685f746f5f706f727458ed617070696e670000000040000100240001006d6f6465000000000000000000000000000000000000000000000000000000000500171344250000100004006c6f616462616c616e63650008000100", @ANYRES32=r22, @ANYBLOB="780002003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=r24, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000500030003000000080004000700000008000100", @ANYRES32=r25, @ANYBLOB="7801020040000100240001006d6f6465000000000000000000000000000000000000000000000000000000000500030005000000100004006c6f616462616c616e63650044000100240001006270665f686173685f66756e6300000000000000000000000000000000000000050003000b0000001400040006000801da080000b4001f1f0400000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000050003000300000008000400", @ANYRES32=0x0, @ANYBLOB="080007000000000038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000050003000300000008000400090000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=r27, @ANYBLOB="3c000100240001006c625f74785f6d6574686f6400000000000000000000000000000000000000000500030005000000090004006861736800000000"], 0x484}, 0x1, 0x0, 0x0, 0x8000}, 0x4080) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x6628, 0x0) write$tun(r5, &(0x7f0000000400)=ANY=[@ANYBLOB="020106007fff06000300d8f5521d7f3982c327fdf6983badca5a0d4fc5a72619bf9faf62682cf4167180df650970f92d09fbf497eff7035fb1b3c621bae255bafb4ffc6be9c1c0fd1389a6825b78a2f54673bd8e857c597f0230df02c40e705fb52bfee24911b9f84739c1efc33454af427dd6e6402f55f797cee4fc8312fc6089c4592d78ce25e446b236f442db8f278211908063accebd0eccea510845909283928270a02eedf2be8d00001700c3ab1c8e04d86cba7c47550a4ec3ac96270446a04ba4d7f4d590d1b4bc4a27f5940c4800"/233], 0x99) r28 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r29 = gettid() rt_sigqueueinfo(r29, 0x21, &(0x7f0000000000)) write$FUSE_LK(r28, &(0x7f0000000040)={0x28, 0xfffffffffffffffe, 0x4, {{0x8, 0x5, 0x2, r29}}}, 0x28) 06:01:16 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000000000100000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2284.947403][ T8742] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 06:01:16 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) write$cgroup_int(r0, &(0x7f0000000200), 0x12) connect$vsock_dgram(r0, &(0x7f0000000000)={0x28, 0x0, 0x903c37d98667f98d, @local}, 0x10) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ptrace$cont(0x20, r1, 0x0, 0x0) 06:01:16 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x0, 0x0, 0x6400000000000000}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) [ 2285.015312][ T8742] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 06:01:16 executing program 5: creat(&(0x7f0000000080)='./file0\x00', 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000040)={'\x00', 0x2}) syz_open_dev$char_usb(0xc, 0xb4, 0xf17) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000000c0)={0x1, &(0x7f0000000200)=[{0x6}]}) r1 = add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000240)="ff940642783ecb07d040fc5f13913e65ec263fc807c6c887f91d2ff54e8c94e47e71ee9c10dbfef4afa24d867dc9c2fbf94de7f6246d7d76386bf4f0e7b69ddec084ec25a39b918f1b040043e87393974f9401a218d1a54a6f1989a420a99b6d4588f91f15b46647e7582ee51f66530b9e75ab3e662b1b7954983aa1bd1ce1c91c8d8279c0ce22c8aaf467540a4a8be459", 0x91, 0xfffffffffffffffc) keyctl$update(0x2, r1, 0x0, 0x0) ioctl$TUNGETIFF(r0, 0x401054d6, 0x0) [ 2285.067271][ T8742] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2285.092203][ T8742] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature 06:01:16 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000000000200000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2285.159694][ T8742] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 2285.172602][ T8754] selinux_nlmsg_perm: 1014 callbacks suppressed [ 2285.172611][ T8754] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=65535 sclass=netlink_xfrm_socket pig=8754 comm=syz-executor.1 [ 2285.187685][ T8742] EXT4-fs (loop3): mount failed 06:01:16 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x0, 0x0, 0xbf08000000000000}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) 06:01:16 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000000000400000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2285.232619][ T8742] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2285.267264][ T8742] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2285.298494][ T8742] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2285.308718][ T22] kauditd_printk_skb: 471 callbacks suppressed [ 2285.308726][ T22] audit: type=1400 audit(1579672876.384:348951): avc: denied { map } for pid=8776 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2285.358603][ T8742] EXT4-fs: failed to create workqueue [ 2285.364172][ T22] audit: type=1400 audit(1579672876.414:348952): avc: denied { map } for pid=8776 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2285.396099][ T8742] EXT4-fs (loop3): mount failed [ 2285.401624][ T22] audit: type=1400 audit(1579672876.414:348953): avc: denied { watch } for pid=998 comm="udevd" path="/dev/loop3" dev="devtmpfs" ino=34085 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 [ 2285.426531][ T22] audit: type=1400 audit(1579672876.444:348954): avc: denied { map } for pid=8784 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2285.465456][ T22] audit: type=1400 audit(1579672876.444:348955): avc: denied { map } for pid=8784 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2285.488755][ T22] audit: type=1400 audit(1579672876.444:348956): avc: denied { map } for pid=8784 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 06:01:16 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000000000600000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2285.509014][ T8793] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12336 sclass=netlink_route_socket pig=8793 comm=syz-executor.1 [ 2285.519246][ T22] audit: type=1400 audit(1579672876.444:348957): avc: denied { map } for pid=8784 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2285.528602][ T8775] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=65535 sclass=netlink_xfrm_socket pig=8775 comm=syz-executor.1 06:01:16 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3, &(0x7f00000008c0)=[{&(0x7f00000000c0)="8000000038040000197a0300e60100006c001020000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x3ff8000000000}, {&(0x7f00000005c0)="b4065f2ab9075ba253e109154559f88f062320246c5ae74af8e236a42c0cd0b73085bf4313acfd026684e3be45cf8f03379864cd059401666557f67127a057d2cb8d6521890c5cbfe5eaf821257dfacfaf5ef8b4c06e941318d3eec42a910d1420306249520086172e5e2f0c2308655d2a82735e431f158af85763d2d76375e78b343d563d952660c79ecfad7ccb16689bcb4fed9533483595eb30e2671cd545", 0xa0, 0x4}], 0x4803, 0x0) [ 2285.551341][ T22] audit: type=1400 audit(1579672876.444:348958): avc: denied { map } for pid=8784 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2285.551358][ T22] audit: type=1400 audit(1579672876.444:348959): avc: denied { map } for pid=8784 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 06:01:16 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x0, 0x0, 0xfefdffff00000000}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) 06:01:16 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="8500000008000000550000000000000054000000000000009500bdae000000001ca87263370876476f7c567441b64da8daa2400b16e4bb454c39b790aa5c0e5be38c338ad0c400e1dcd8cc1815dc00b7b2aff819944fba3da573e9ca6395d565f67629a0bc396400807342bb4360"], &(0x7f0000000140)='GPL\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x1e}, 0x64) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001200)={0xffffffffffffffff, r0, 0x5}, 0x10) r1 = socket$pppl2tp(0x18, 0x1, 0x1) pread64(r1, &(0x7f0000000000)=""/177, 0xb1, 0x7) socket$nl_xfrm(0x10, 0x3, 0x6) [ 2285.647103][ T22] audit: type=1400 audit(1579672876.444:348960): avc: denied { map } for pid=8784 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2285.812659][ T8809] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2285.822655][ T8809] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2285.832560][ T8809] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2285.853506][ T8809] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 2285.868633][ T8809] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 2285.875818][ T8809] EXT4-fs (loop3): mount failed 06:01:19 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) 06:01:19 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000000000800000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:01:19 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3, &(0x7f00000008c0)=[{&(0x7f00000000c0)="8000000038040000197a0300e60100006c000021000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x3ff8000000000}, {&(0x7f00000005c0)="b4065f2ab9075ba253e109154559f88f062320246c5ae74af8e236a42c0cd0b73085bf4313acfd026684e3be45cf8f03379864cd059401666557f67127a057d2cb8d6521890c5cbfe5eaf821257dfacfaf5ef8b4c06e941318d3eec42a910d1420306249520086172e5e2f0c2308655d2a82735e431f158af85763d2d76375e78b343d563d952660c79ecfad7ccb16689bcb4fed9533483595eb30e2671cd545", 0xa0, 0x4}], 0x4803, 0x0) 06:01:19 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x49, 0x2, 0x5}, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x6628, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) r5 = openat$cgroup_ro(r4, &(0x7f0000000300)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40086602, 0x400007) write$cgroup_int(r5, &(0x7f0000000200), 0x12) setsockopt$netlink_NETLINK_NO_ENOBUFS(r5, 0x10e, 0x5, &(0x7f0000000000)=0x3, 0x4) vmsplice(r2, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r2) splice(r1, 0x0, r2, 0x0, 0x10000, 0x0) r6 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=ANY=[@ANYBLOB="6ee9dc909d4dede4f126f6f1eaa32bcea8580dae6a4949dc3a112c73ab0d0b65208505f0f156f26dbf49a50c6b380403da96b2f7ceef3501565fbb2e8d723e300faafb33a0f265cb66b05c97a64102d1bfddd17029b004aaf38605cbd2046fa898e4e826c96c5774decda5459c14212586cf32b8528131aec5302b78513428fecc53e9dc583d855e28d5b4eaca4b1c3242c134c95bb5bbf7be8993d6f0475902651cac4d3061f981c5bc0943cbdf31acc977660864", @ANYRES16=r6, @ANYBLOB="3f0200f100000001020000000000000a4100000014001462726f616463"], 0x3}, 0x1, 0xfffffff0}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r10, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000640)=ANY=[]}}, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) madvise(&(0x7f00002c0000/0x1000)=nil, 0x1000, 0x4) 06:01:19 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x6628, 0x0) r3 = fcntl$dupfd(r1, 0x406, r2) ioctl$UI_SET_PROPBIT(r3, 0x4004556e, 0x1b) ptrace$setregs(0xd, r0, 0x7, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 06:01:19 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000000060800000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:01:19 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) 06:01:19 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x6628, 0x0) vmsplice(r1, &(0x7f00000014c0)=[{&(0x7f0000000180)="d89f47894d0acd2592422ab245f6d9f147103957412e5a8ebbdd2409e84e0817f6bd2a49ee48d8a8ab2cf46223522e025a0ca855ffadb08bdb69a95c59770a979c1b2a5dbe7f3c53ea769749bb204dde1862c13648be219a719e19296177ff9bd912cc1d0670043764070bac256aeff85c69ea576a2760638e9e016263e98d6de8ad13047fb38b461907f8a5e810e2f67f07a3204f90da0dfd6f4f86ae7255efffe82a7776f075e6784e13da1db59875d292af", 0xb3}, {&(0x7f0000000240)="23b858d620c5c8d8a653bb5c2bdb16762d8b10c17a3a72d85515c738bcb9a82bbb4c3e0b77260a703f9164af032b4f83db86c5cb39840db8736ee1afc2dea2b38801496e1c26b0b62167515489628cc1c3f2a8fa448efedec320a840b7c698bf350f0f4fba3d05d409995692c493782b921c5d8601a9837c9fb1763faaa74cbfac40482f7fa641b3aefcb845ea6b3a9dc9a3c2e3c3ea7df8dd5b5a1b88ee631e73c7ff822782d548c32b548653a40288df34a57698351e60c31689de0d5405ca97fad7d2f86944447d5ea600515a0df7bc8f7002b9bb8f19241987c054", 0xdd}, {&(0x7f0000000000)="5bb00e20595a6c0c612092eab679267e665d188322b45c1b1dd39966f9aee28d01b2fcc165e8359d5e5e0483", 0x2c}, {&(0x7f0000000040)="f669aebd145071dd337e481440d9030c89a2ef6c215347f252717063082bdb9b99d5034d40c95d654a3f5bea01e030f57a61c781216bc451d1db14cf4211", 0x3e}, {&(0x7f0000000400)="f0d582eab63f01f6b2919010bf5ec86221baf90bdf96fd5855cdaf96ebf2fee7e4f6eb870cbfaf0328869725b2e8a785c2e42fe24407493f2e64195f0f59a24cd3e1db4076233942e07033376dd6abee77afe08e72885c62acb6faa1a4d5f93143060929356c79af390b3b8edd95d35c179b12ca7f81832778bad4b327fb9cde734227cc351cbb7246d86a4e565007bd8298f9195f123399b1c134b21d13ad517f4527a56a157ab9ea7a835320fe384819d7fb31ac842b5bb6f6e56683001ee6c565b9076e8b522495bbc8efda9a0c9f59f84cbf77b45a6aa067f6274558b797d0bbf764c73c57d449f17807297b6b75a6d2739dc677d0ba393e43157856206a60d91594fc8979e947aea77f5b8c4d0ef749aba2af7e18a8496eeebbecd6d5f6ee327b7446516f536d1d056c50941eb933230163ae172fef958d359a50016b830c87af696752bfbdae0f13dc3eb20c2b4e1c4ff76626da5ba932c5bd9afa986ee01fa9241d71671f8254f6b2683d942e405255c4673a408249909d002156c065797422137303fd23d8eef97f5b73bb491fbc72a67276d06a6fff1d54ba90edd060457cbc04dc0b10f50bdcbca0813121187ec74e28405d3ee53f00d7f72287187dbe4d9467cbe4ef7240d5f2ba89cbb6e19c37b271b2cfd0823cbb1949e791c92ecafb067b06cd7f8327274b5559851247dfdc51bf3348b9f5dbdb2e804ff9d1d2be5696512392ed8dd3a43dc35ae4211d5d9b7b7c3126d8484b31d7639a82b7bdb55dfc148cb296f05eaec7bff85f78e55a53cfbb38a3e0c3d0253147eb2df4bd8163cac013616e4a808e15ca457bcd4a8da91b2eb8239bd27d51254c28f1fd00d0060537681d8cec3942851c625dba29da2b88bb1ac9bced32ebe1a4662479242cda6283163e6909e1b64fe8c9db834aa856661bbd422b87f24e09d8fec08e2afafce8caabb8b1daa3368b2a667e657f41d3ef45603fb8c6f0ad809299b3752722a8fdbaa1f0964921cede6ccb7f9eb38f89cc15eaf35da946f4fcee57673ff808686ccf2d2515a8ec8a126950a5146127e35a19aea07e40b8d9455e03ab04576e8447663aed3334782efc2db89812a9cef0031a7d7e49e47239283de240a987d6640906cf56bc94103a0b716f3adcb00975d4b06ef652fee686f32076903034ddbf1a0b130cecd23bd84eacb360d3c7301e2a4290cd9aac8e95066cebb0dca75f21a6a4a8a26b4a79fdadb19a37e846ac73b6844f1067fadbf52f5bf1594beca54e72da2a6e36daf39f3b75c320589c268f8979b305d3f63e7b0651544ce70bf912bdb8db7af03b9bcf8cbbe5290eab79f2620fa40762e3a060d086c3d55f852865f060ac80c20cbca215be26c8f3c87de60f37fb243927e721f0352d30f913d5a3fccf120dcc4ca2c64f6fa9a086fb6bafdae39f979414c64145a257210659dde4e73625bf958a1c757ac79024c3831fbdad88c378d272354f261fb4d015d1f76257cfff6cf08ab965f4b109982245bf89d5bcd69fd9f84f2984f3033868a6ab10f0db7eed7a7a2532dc4da688d70f112e7f4e53cc02c8ad6a589ea68533921dc6704dd57e5a6e51cc5961500dcd3942db9ed7cb80eab67b5160483452f49ea4a8874236e600c5a8a3b427bb6a3ea63f7409aa7d0b3107ff25e626a3b8dddafff1509dda2150548454464ccd229675b4154076dc764c6e8cc11cb5ade32adfb17f2acb2c30f39b26257c33e47dfe3ab0b1210b29696ef4f89e477ce2a0ed20a3df6a2675642d1add370ab910b07aa16a3cbfba123e95bf9aab9e4d3037ca81f75379869c5172374b526cab21bca0472dcc294876dd8585379d07147a054be52c1d784e785ac1f34013bcf19e5384a55ac47841c25c16377eb5534b1948912aae2c5803e1ec48c5836192d498189a9089052a9f7bfc2d32546a90dff8aae046945894b93b86007af7aa971136b82e018321e0edcb1e62cda7790a3ba2fa95a49e4ce26d2d8714fbf187c3d0821002fe137959f63989e4e74c9cc42ab7eb9e1b655a801db76add6ddf4ed19a87767f0df92933e16a75cedfe98bc032fda9c9f6965ab9e81847c0c66b3a73b6ec962ad75268047adb942acf9055806e8c3069a388238b4b7a5f43629434140b9c3b3c13af2c591d2c495b6c96e4885f06f8bb74b328f59a340279308e276784773ee244735a631e8dfe3412971cd92f808141c9ac1e2dd6c938ea42274d5b2edd6dcec8cc3c547373b282a8153148e92298675a4957948a4f8fa8b9fdce25fceca043fcd9890ff79a76010f07c804eaf69e727874713c4f5e10874aa8cf312003bc2e000341e058310ef935c91dc94ce24c892564daf0e05abca91b339c2b13d4c43f542d7408b90d06806424757ac609ebb6ad0e0354d7e3b3040a1928ea6ab38ffaaf4ae4a8d3e9b9338bd738ec781fba099cd36976085fc5e31fab42ec113fcbe30cd23532856803fe3c18cc82a709e134ce7fdaaa3b60dc5ad372457d3bd8cbd6a81892cd0957ab6743877b5ab7c37a153c0400c9343f7d9de0c0dd3155819d6d7089f49ed211817106f2aadc1467a11e94c49e25904e819a5b381450bdac7ebbf27bcd2a5640382de2e06fc93ececa8d71a83662cad8a0cd60df1fea599a9d39d1970811a6c9e54e43659b1b5534b7213a505310ab480cad4d61747326a696e5a0459ebab22ce396bfe7afe3ab264fa25a1d7c9059b3f3023a49860f68a067f2e4e9dc1cb33d71f327d087e7445b65eeee808577e9a555cc04c6b74a13dfa37b40b338a2cfd411e65975aa08e31593d68f08df9ee45aea342a356f4923304dbb8cbeb4574227c1938b99b57e8e0bd56f8158b4a2600c7dfeefc4db9d05b70bdf4747d9d0e3c545c4a6703770352776e73c0398af8574341946915915e12d42870f6638e134a90d5c876b810f2efe4b9304cb43dcb619d247dd416561c9aa917871fdc818002479512bb0b882dded152143150619a4b6839ac116f47a66790bde3d9e01538e13330c6344687ff1515611edf98ca346a94315dd6acd20929417fc9595b3719eaa7d1f456a3aa3f4a7e76092be727584ea1626be0c43dec019f4186e9671ef030b359c176b926f320007c23b3b7e676c43e62af0f5f684d4e59f62c878907d115fa764d4cccba140b2511bf0b2ef8801e05b5c8e28a7ca0ca04394dad0e937d0f35420fe47febc2c70ba731f67af95b1fed0dcc727c4c852524b299df5616db0678de123643fa2a6f06eb9ee4b9cb0b496c94fddce5aa123c421263221ac6c983fa7c0f07e7ed1349c37df5b78dc4040fa8d2d08ca58924ff9e2586639fdc844b9180e60a9c30c6aaadf60f84ba70379dd7e4dc4702ef45aa9c4be39d6e30f70501dc6213c71ac3de08f47e33e6836920bb113cc4176bd008ebfc69ae1985eb4c71a49078847e18734b2acc033ba44c01f44d85759baf8507263dadb60e9c9b5bc17f9072dd581ad8ba766c1a4f83cc8a4d8967c3756eb0acf3ad959444d24305191298f8c114bb98b06d9b21c883cc61e0df4c64840f148d797f1608e6ca1b5e5771a433e0c53f15b429eb1566042ebc3f58e698457665d94629e5dfb8363d223f1f8ad4e0f0924b8413aaa226c4b13053491a8dbaf5281496bae6d27ee6c84c67d23c588d73eb6b69ab12e11c091c68374d1f560c8a1028257c49d10d01f68018e19c6bd49e69e246963b11adb5dd5c2b807d33b46c9c4768926a8d21c8bc9bea124bdfbe0631bd19001c2d2856984a46964587b5153da7f689fae1b1f9ddfa068397f4e50a5bc4c22c392debe4f78860ff78b6ce9108c19ad24a9894bbb683a716f8910db98e66694a7efe2798e7f3856d810fca83cfbb96ae505c3f88750fbb03bdbe4b6483d60e027d3e6e793cd74676f945daca4e0d0879b6f668d26e6433d535e01ec349830372ab0d203f08ccc0b3626861ccd6ce674b0342346644d215f0dfafcf4896765569ddadb63efa6b94de2eea3d3e3eec31b0ab23aa07eabba6a085e737cef04d2655c605cafef4cdf220b4b6c53e3defa4b7581184990841ba37219f41df512bcf6772b4da5821d38de56418b869c39ea4e065812888cc562a4db6c12ddedb9323077724482d122930e7ef3189c03283df7c3236e3e1ea82b655ae2d64c85ef115fc3178a5c5f986dcd7003d7e0a09f9ea488fc8fa6030990956fa14e7954bb6b79a670518dc498e78735e0b7043641ab25ce7dd2f2e9de9dff781482a8e51c8b014d236df98a93020f7d7c51a2b7d6fc277b096b459b5ae8be6ef7db3e34d9937d48cf2aab4e462a1c95ad19fa3ca7fc0a138a999bb8aca4c51263fc08ca58144c36552d5f0e0825b7dc4551e8fe58a13eb0e12800934138e2dd6effef8c6ff59dcd263a76669db8ae31519e64c5c69cc4c5eacdfe64d4c4fa664a58bf443e2098fccbe25a34537aaa0df6705b7a89745b5373afb078a50f308ba45095aa547b24f829c55d9b91f9f34cb61b655f3625e09d9e60b007989fb6d406ca5653bac3ee26d4e3ff05a11dfd5abaab784e0847d5fdd4e8aac4612787942d4dbe7fc4080255a3d8ed7bc5c19868aae7183dca449222788cdc5683390c4530c01b2007d2ace7a0023b768e480257f366d58265842aaf69430bd92bfb3b8fcbcdf65f03f8c0b959c7babd226adf49dbe0eccb4d86b727d11ae51389b79aa6a589b2e0a23ca3f9f504281bf1037cd60f0c380383c3fa52f94db5af0ab86192c0fc99265f39c81196c9bbce07a8a7773a1ba4d05df7910c34b4605caadb0c0d333dd3fdf5fec77498eebd8b30e0fa21ec67252c2ab3d1cd1f1146a756b388a509eafac2dfdf12362fd69f5631f2f21e2f7834846e6f85d632c9440856fc0151bf330b6a329b8141f94e4ffde7baab02405aae344d0538703e1d738420458f164fd7a08a0bfebe004a7a6ac8fc3f7dc820b4e9f769130f5b672b64b3de699c047b88d4d16ffabc0467fb5efee992b8005dccc4435dff95d056de21e4a2f3a3e52e40ecc593c548423ac5a2a347f86b3f66ac6d96fea781bd4900cac34eb7d980985534a736c72d27785edf7efb11ec7a5ea9bff48bc70a20cce7ed07b9f17b9158b7f1558f84101dbff2d848b11a36dee463b36f2387b5d27ddb6416b6c5179e53794f7d63da3f6036df02a787c770b9262d797bf9ff12510e33a76a2ff6f35e1df5317e4077e926fa7f1f4ecc0d90cdf6f1e953631e90f45e2f6ae08e14d0611e1e04a47a0b3dac11a930e2c1042e52f023f8d206f6616b0ef8b224c1e120f55aff9eec54e50203529852c7feca528687aa5229ff675231b0faf20fd82dca2219b65f3e738d0b3821c5c7f6acd1b55220e0e70bf650975a641702f69d9f66bfcbb31f7f064c256ab355e3c3019f4e5d90a68ff40c69c21c2ae48903cace8d998c252b329e00fd2495377b9085e6208468b092ffecc9e9a6b454b463b807561c3b79c9c6c738afab23085d7c50bb496ff72d3957d9b9337a61cacc0344eda902abdbc2b768e3410e9a38998680950ff37f3f449d041a01107a1cf38c5e226d1642d90e1cb79cf90755374f996dabcc026a56f9b5413ac9e374b02f29072da050ca9017498c2c2f26bd19fd7188368b0a7cc2ee619b0b1872607206dabdcd12618fc421eed1ce6bf95acc83e304bc020d5c802bc9a025b322149840a87b866f5c70826d3109119d81074f502402ca4cfa9a4e3bcdadf8643e0265cd1df3ae2374852c4a19a7779291a9b415e9b048a1a61979e86d853ebc648827da040891b69d3530319af2cb6a0c", 0x1000}, {&(0x7f0000001400)="86434797ae4d751d9545ad5b6450faea5af921eb9b0d3d8102f9a8cd50a112529df57007b3e900bc27c65c08058a44ec0070f3a077afe3f3cd1c22fc6e3f036d13fcb02c10ae1971c15fe9a08b0f65fce73e5a16a748b4e77b6431427a6f5a9bee9d4a9dcbbf01cd9ae3c2bdc5ef433e098ae93d24ba5cab8839525889d64cf9e1433d0c85b47d003bd041ffad022130b4379fd4df84cc3f523cda6b4f5263198ea22e86398f093f1aede320", 0xac}, {&(0x7f0000000100)}], 0x7, 0x0) tkill(r0, 0x21) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) write$cgroup_int(r2, &(0x7f0000000200), 0x12) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) write$cgroup_int(r3, &(0x7f0000000200), 0x12) sendmsg$nl_generic(r2, &(0x7f0000001680)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000003c0)={&(0x7f0000001540)={0x134, 0x3b, 0x800, 0x70bd26, 0x25dfdbfe, {0x19}, [@typed={0x8, 0x7e, 0x0, 0x0, @fd=r3}, @typed={0x14, 0x90, 0x0, 0x0, @ipv6=@mcast1}, @generic="4ee790b6acdbb8cb80e29698d15c4c04714dcdec93b760dfb20ec85109b80582ad73cb06e50f6e1eec24fa6b1036b8d1693c4f7424433c4c17eb178dcc4b6018806f821d152d9c1a97b881f37aea59e51a958f0a63670261fab40535a516f8b67b3aa8fc4f9e74c7", @nested={0x9a, 0xd, 0x0, 0x1, [@generic="458d45f4b96d28c224223c7890eec4502d27f0610fb50b879be1bcb834468ecc8812382b67183ed358d37bcd59d70c5dddac8b2ec071dc5b27783b5d194f419c6500e4742118c1168dac95385a3c41d5225e01bc8c506e05abb3758af24fbe3aecb1405ee8f3a021d0a94ea5c575169e8731364eb630a1f98b9943c0d0dcdeae49ccc3081d132646e081a7c5affe37c870a00ec69142"]}, @generic]}, 0x134}}, 0x240440d0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x6628, 0x0) sendmsg$nl_netfilter(r6, &(0x7f0000002780)={&(0x7f00000016c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000002740)={&(0x7f0000001700)={0x1020, 0x3, 0xb, 0x900, 0x70bd2b, 0x25dfdbfd, {0xc, 0x0, 0x7}, [@typed={0x1004, 0xb, 0x0, 0x0, @binary="aff21e5773e9d567d8be82124227dc4e28dddcf9f387151346d91e020130970bddc3c547632fe83089614ab2069873355ea72e216a84ca613fb96ab7dd1b910fd65045915ab2fb384b82968c56761fcee24e57032adadfe81cf94cb7649c5a64c60919cd163520291685353ef1c9c1d603cbb23bc73773e75572f36dc6a26bb0b48a53e313f66e99198aa36aa5363171b23106550110832253a5e2ebdbc827ad93f5edc5333a1eb6fe1d86cdbf92102991c04aa5f6a38b809937192017fdc87e91e9a0b2280ed224d7fab2e30cd083c2350bf1fd652598ca36be555904ec6c2e2eb453e41a7a8a62f05c992ac9ef98aad37229bebf4a0186c1170418f25f4f77b8fba92c09eff78bc4bb1dc1adc0a670306470b5c3ca0720a3b17ccebd58ba4f2c1037c54a07608ad756702d120499c1d4ed3094901514776bbfa9a65c55b5fb58af9fd6576d3978184a6b06dd03e448cf4d8b5a0b3ec0c7e6d5de16b5818b2c6f8d276dc949f4fc56c45ff989ea1455fd268fade75a9d3745f622e748a5e4abb5fdbe38b35f3ca6b7f63475f3cac6899a0f621b131ade254f1d837286163a7051269961e882d55c881cc1bedee96c75a79249a53757568d6bbae8e9e6509b18688472d4d3d318e1719d7c0d6f51bf0542e84bf87c4ec9d1018c6ded4075f1094916173347bc30fbacaa86ea27a2303734938d9249cb8362d87db56ec3e39147fdb519b4905f5e1f8da8cf47616a2c4290d39bb2e4d81798ee71517a9a80eed8d99d68f7f20a94c5ee3bfbbb4db9859490ac9c35f5481cfce291d39d5b9a0e4a96440d06b556c4b98a7c0f6e743312bfb51a68a2e05ed903a2d8139d1b1c4e933aeea5ff44e0a6998568e7203e91cfb3094c861bf5de5d3ad674c6602920f5f119c26ef3ddcf8b269890a82980bcdb4252e31f28bd7dc07b6021ad119184d99cdae0a1bdce0e522aa8e5aad9e8a6e51dbea92ac33bc86af156d5d4255b394e337fc16060da57816c12a0f9d9b2a7279ee41abf390b47bb6d54640a42b0da01739096cc5eefeae8e25ba5f6122471e7a33a4f6c1843cadf84a18e9661b24e50c42d2159c1cc678281805f4a7401d40c2207485b10571be0f757a6c9e7442ae9be2c3085c4c1b6fdee92a0555d4a1d4223e4cb9ace1d8ad4ca83439400a7bae7b348e491b6af80ab0c597cbc9c8cf344e1bdc002cc51b7dc85d08f9401cec4abcbba5f467191d8e99ebfbf9ac15ec18d7ef8aaa368ca4b004a4a0237a478f9e1fcc44111d1235569349146a2d965c2e2c9df4a57fe08f147f6e64236047e35b833f1f2b97696f7f5d9c6cb288b1575cda9ea653aacfc8ed539ff87fc5f5a73d254aae616f30d2fc4c0b5b5ce5d106f8f4c5a0f6e47ba788fc7633588427f9752dc9ca352729948ee726389dafe0c76649c83f3b2df78cd103700df177d295ee238cad4b0559a192667a0634d744a1fc4f75676c6901822f5ed3c694831c59ced74a77a1c2ee470fd5294d3b43838042f2ba7772902138b87fe7a008e95d33c278b3afbfee18b4d8680750a2ebba2d8f21b47d676db8232e3848a0fea7f7f1d3b4297d774922cafd66a2d9fd6f66cfa073b9e56112a4aa971d810103a34414c9a671c61a296735f10ef8645bd855efe8d71a9617607193f524bc664e3fd73740d790eec510d54cdaad273f5b0aa3891f56d4d59949ad56ffa97b2d96943a7630808988f657e8ca3275ba2e7a73bf12a27dca031020bd26a6a9b357c16f87d0561a80ec8024b17459f28570b5e08ff5ad9a5c0bbcc0ff05ac34e94119a6b83e6133e7c25b080edcbf8b81daab800230e7ba1e1f498ec1d050a7c3c7489a8ae985244b9b6d7a1e79a8f088e3543fbd9ed3bd28f66b328769fdd52b69f1664133a78bfc273d518ecfb6de3a47112b207bbdf62dba71342ac6ad1270f0b6be00af39d1f3da097434305b463e3d584ec548c40438af2e7ccae0da72d10f6871b2055b9336c241ad3e047970478656e845284707e32b72fc021472994331a45653f45b2d6563a172687c54cabc7820070f0b755cb3910b9a2c431527a6108f77f6fe45cafcd94cb2672bf0eb9574c9ac70534e200b33bf830c98ded715ed98c2034d327eb1db20225613b9ffbe1d7557bbb5fcf41f266c60b3d5e3c856a8d10dd3eb78dca9879326206e633891abc9cb0e15090fda4b6d1ac0fc304f8401a091374f5622688f8e8a61be2c6c0320bd299183de4ac5328fd91197661f23d1678c2922ccad775e1d94d70641241db919d23da77d6fbb274524ee6fc326dc2bcee3c11eaf3aa368bfcae5bd2d2728a5c80b6ffceebf3960330b06538f2f0cc2b0749894201e7bda721cb3cab5f3b01c42fbf1f508160aa96262d5e6846120407fb41c07a10ab793198bb0ea7c89f9e61d6e83d3261f9accd159a596a49d7bbb202808e2cf9eda2aea3e6519a9b801a37ff637a761ffa05dfbf15cfe4971eca9181dc149f9cfe6255d26b8fda7d74b71b5eea1fc245d04c94b91c64b3876560c5d5c9efc8d8dd2d44731bd8e730b07b1b38496e3325db242c1407d2017de66383004413e959288d0a355e4f371ea6dfe855fb3d9bd203588a04ba10857efc3d48034f9f7ae5f374567415d7b99eb8fe9c1f771c6bd18a9342f1caa734b3a65376fd210aeeb6532063f53f1adeb550187bbc124a8c8bd59ece771ab3664f0fe713052e4f5213a4aa6da4184af54080261026e037c414904e71cf976b1afe16db172843fa970f44d480af1228cc4cea8417b903fda0dceb528d744525dfced7aa0a42e0dbda519e9a4310599f0dce2cac3f9e570dce6f84e08a7a51f3f8c8ac77a15220b933a98c1f20b2a05d67e810843816d460851eceb59116f3b3b96eb08ffd809e30d1989b0b64bb40e1b15f4ee86136c581459312eee7e6374c2b6192b9729aa72dcbe3f270f05387c6e0bbd532fd4b0579f6ea0c64853afeec3da87d806c088ace6587f0b55aaf65f6b0815fd392c3beaf6ebbd85a3b61b173143f08460f795e2faa366a04c5a4f8b0dbbece63ef26de719aec5b0af21004031ed7f56a228e3108adb314ce877493fd7a26811ab9ad1e6b34fe66cca8ffbe8eace87d979ed2b80c019c8a7228be40fc7d5bdaa7793a03bad092c2b926ce950f5b3a0fa67253caedf14a13774f3bd018f75259342bc042afc6cee8a2cbf4769192fe9b58b38928990eb62d2c0156b7fd5334ca70a66171703b945422454d1009a37aec17807ad64e713097ff4e4d249a7b580d1265e6bed092cb456821ff14ab2a881a01eae2c4f27b3236c192cd38d2e8ab7cc9b8d6141e4dc6e9d12f06226b5eff8566b4da5fa515f44c6136f1c9d969b26098de57284c1336d3856e7714187d15e225a85bb387884ce91ccd563a98a4c5ba237f59e89154855b9718cd77f92ec1215263333ac8cac379653f51603b22c5b6ddc01dccccdab00b9ed24285197b7663c91e094c98512873bc41bdd6782d65e71ab616ef24de8b2fcc64f26674af24ae50a59a44f27124b326ae66e974c4ab528a63849d5779c7e9e2ef6aee366707396d3a590f94c26b785647e33e6bd11325ab7f94c0ecae9f059efc99c2d2fc690fe199e95b08807f68d4d15876dd558dfe03d08377772b5c832473937303695303175446c19822316588797a9e227957355a9f42ef9362ff12c13be4c1309a94221d1cd89048c7d9e50984d0638a536e83be7c893be4c3e3aade772aa482471a415d197c88f9e5af423840af59c678ccfe435b6eddf81b9b3bd10304a365fa367e2dbe2786b37547f54bea9f9357b503f41f9d68ad30b2d727ff9f3e3d9ee49f4623e64bec3153ca65664e3738369adb4af68dddb9bb542982ae1ef231ebb736abf6931445995a488ff4715ca341337d879e77830cdfdecc2ea636b369084bba167419948c4b0b8d9570578267685de921f21a58c54493293821550572ea544faac37d37a1c18938122d5d3c95402dd611891c9da42c9b43388ea36767d117653471579b7169c23ed4d35f43ac6b56c2872ed896f688660bd3307cef0c312115afe8e3c7dbfe498f2b1417f3e114656405c97e8d49cbdc1cfc2b5795d906053f85033953d8ac155be3f92b9cc420db552da643d74d1ac52a186337555a844e93cde8251f61582b515ccd9f3bd78b1076003704d245d4795f1825510d0af2573b69a9f9fc0ec225ff385ef06917a7504438247a0e980067274fd4de6250b64c7c00f352406441073d464f04588ad5b0725a2b4f7ba69a1eb6e0a7c1e856d10254cfead2b14bd7a258326df796ef8bce0298d792e56167fb162c67b3dd9ce3dfc1b340fc67f1166c06e679de2c7e9f4f3b6961da6c5c7f4db9057720c3b14564dc26b623618f16504f69e7f58cdc2c7d69f097f6f5f3ea30ab20c33d4e7a13728f30c188e82bb9f4df611a13bb5bdd4446c02e7da4b4899d4f2e27aed9c5de7e75469eb2da96c94a44f0ce83ce722f9303435687b0ca0309987f578d9ea02d73de6d81ed05706f4b2ab391ded678d4db83ed6d2a14b3c3573e1398b1606b722032941c0f941b0dae5f699cf5b4985d60daf9e53234e1d1a6cfdeb08895ec5fc291a251a102087db0aa5f90833728c8834ac05c612f397fdd420f4954a8bd850c2e9f1852d62f1ce11401ca4755400cd4f7736d537fe1feaeca57d1ab3534d42b14267f237f17b532617d7a9eec1336be29b7401db5224540eeb4046b101735d5fb31fd752006b7c8dcad76d3c404e4c3ec7b9d3a2f406ee37ef69f9a5f9428e794de092c8340fe78c51c7846a5b7d7fd93824b1a4d2cbee22c00b62086a6af2dee0a3e661e663ec2b07c8b644419f3b48ffe623c5706320c82d39335ea9f8994c8759af2f8198d42dd6cdf9b3909f6f0fa0d4518e38ed77a1e5b3081eb0799ea8b6cd1350612fd5283522a8b9375d1d625fb13aa585ff729aa8ac032cebb9d9de6de33390ae1f62c89c9094d4db5c7b4ef37e629ee1dcda7c80e97e5debb775b5133e57cc38764d13910ae842c33cdfb0c65a3eb97aba97bf93a53d7514898473ea06d6a614207fee729473ac3dd84196339a08ebb7f7fdd82365bddeea25fb3bf1c0a8181f72a83863eb95cf6e5c7a72f2681791cba256da8846f5f2a95073993d74d4f8507e3c615ecee368aeb632b7f6b70ee8eea3c15a52ccf55e2889699b0d37eb20b6498c4c9a5dfe39e25f5ea974fe4abc39eb3f7c7279d4e16897ed0db4622c4cc6e5682756ac82012171df384606b90e5e3493962a1aa2e154d7b8621bc952d449c82b7db396febddc84bdfaab9e975ea90b04c80ab01045171f3461dc4aeed4022a93b19790d8ea4fe4fa1e13c65e4040dea8face156a8ed7b28a6217124ec9a5e68f85a5aec6d5db396fa48be5efa2f86dfa2e4d1c10ff09e54009028753706a45908e4962f076fafa8724124d2a24b33e8d7dc98b1dc26229f15bbb5daa3963930293d12ba9206b726a9731b7e3aba01d46d92d093621a7bf1f647487858a8389b396e73cbc5a0376afead002bcd3184b5ae1de698236b5e167751fe8eef05441c9d931fcbbb681947c050f1f134d550a48779cd11effad3fbf11c94c505b17a668fa53efb6153fb4d6b4b788052053a51d478150427b53afeb1d18d8deed0e45c0f55dbe74fe5ed4a0f086cd6e359027fafb89259f5918cf63aeae92007db285360c90c0f451e44258345800006f3732e2c0fadaef82e2e9217167c2f5efd914fc7fc8c7c8fb2e36c23b3678a087a72d987538bdbd875f79d21671af4640d2cd963f50f"}, @nested={0x8, 0x69, 0x0, 0x1, [@typed={0x4, 0x5e}]}]}, 0x1020}, 0x1, 0x0, 0x0, 0x10}, 0x40001) r7 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='pids.current\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r8, 0x4018620d, &(0x7f0000000340)={0x73622a85, 0xa}) 06:01:19 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000000000d00000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2288.273058][ T8826] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2288.286409][ T8826] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2288.337618][ T8826] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2288.352166][ T8826] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 2288.367523][ T8826] EXT4-fs (loop3): corrupt root inode, run e2fsck 06:01:19 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x6628, 0x0) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000180)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r1, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x64, r2, 0x8, 0x70bd26, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @loopback}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'bond0\x00'}, @NLBL_UNLABEL_A_ACPTFLG={0x5}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @dev={0xfe, 0x80, [], 0x34}}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @initdev={0xac, 0x1e, 0x0, 0x0}}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @empty}]}, 0x64}, 0x1, 0x0, 0x0, 0x24810}, 0x80) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000040)={'vlan0\x00', &(0x7f0000000000)=@ethtool_sfeatures={0x3b, 0x3, [{0x2, 0x3ff}, {0x1, 0x10000}, {0x7, 0x1}]}}) ptrace$cont(0x20, r0, 0x0, 0x0) 06:01:19 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) 06:01:19 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$USBDEVFS_GET_SPEED(0xffffffffffffffff, 0x551f) ptrace$cont(0x20, r0, 0x0, 0x0) [ 2288.455238][ T8826] EXT4-fs (loop3): mount failed 06:01:19 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000000001f00000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2288.517748][ T8826] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2288.546870][ T8826] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 06:01:19 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000400)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e000000040000005803000000000000b801000000000000d0000000d0000000880200008802000088020000880200008802000004000000", @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB='\x00'/64], @ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d000000000000000000000000000000000000000000000000000280052454a4543540000000000000000000000000000000000000000000000000700000000000000ff020000000000000000000000000001fe8000000000000000000000000000aaffffff00ffffffff0000000000000000ffffff00ffffff00000000ff0000000069703665727370616e300000000000006970766c616e31000000000000000000ff00000000000000000000000000000000000000000000000000000000000000620005052200000000000000a800e80000000000000000000000000000000000000000000000000040004c4f470000000000000000000000000000000000000000000000000000000611d0e388021c8f30b19e017df5492e887d115d12bed6dd358514d5185d6fac0000000000000000000000000000000000000000000000000000000000000000000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d000000000000000000000000000000000000000000000000000280052454a45435400000000000000000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x3b8) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) [ 2288.585165][ T8826] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2288.640315][ T8826] EXT4-fs: failed to create workqueue [ 2288.678153][ T8826] EXT4-fs (loop3): mount failed 06:01:19 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3, &(0x7f00000008c0)=[{&(0x7f00000000c0)="8000000038040000197a0300e60100006c002621000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x3ff8000000000}, {&(0x7f00000005c0)="b4065f2ab9075ba253e109154559f88f062320246c5ae74af8e236a42c0cd0b73085bf4313acfd026684e3be45cf8f03379864cd059401666557f67127a057d2cb8d6521890c5cbfe5eaf821257dfacfaf5ef8b4c06e941318d3eec42a910d1420306249520086172e5e2f0c2308655d2a82735e431f158af85763d2d76375e78b343d563d952660c79ecfad7ccb16689bcb4fed9533483595eb30e2671cd545", 0xa0, 0x4}], 0x4803, 0x0) 06:01:19 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) 06:01:19 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000000002800000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:01:19 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = request_key(&(0x7f0000000480)='id_legacy\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000500)='&proc#}\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000340)='big_key\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='#$\x00', r1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x6628, 0x0) r6 = gettid() rt_sigqueueinfo(r6, 0x21, &(0x7f0000000000)) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x6628, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000180)={{{@in=@multicast2, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f0000000540)=0xe8) getresgid(&(0x7f0000000040), &(0x7f0000000100)=0x0, &(0x7f0000000280)) setsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f00000002c0)={r6, r8, r9}, 0xc) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r10, 0x40086602, 0x400007) write$cgroup_int(r10, &(0x7f0000000200), 0x12) fcntl$F_SET_FILE_RW_HINT(r10, 0x40e, &(0x7f0000000300)=0x2) ptrace$cont(0x20, r0, 0x0, 0x0) 06:01:19 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) write$cgroup_int(r1, &(0x7f0000000200), 0x12) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r3, 0x0, r2) pipe(&(0x7f0000000000)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x6628, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x6628, 0x0) write$P9_RMKDIR(r5, &(0x7f0000000040)={0x14, 0x49, 0x2, {0x4, 0x4}}, 0x14) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0xffff) ptrace$cont(0x20, r0, 0x0, 0x0) 06:01:19 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setpriority(0x0, r0, 0x6) r3 = fcntl$dupfd(r2, 0x0, r1) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_int(r4, &(0x7f0000000200), 0x12) setsockopt$IP_VS_SO_SET_EDIT(r4, 0x0, 0x483, &(0x7f0000000000)={0x0, @loopback, 0x4e21, 0x3, 'nq\x00', 0x0, 0x81, 0x75}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 06:01:19 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000000002900000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:01:19 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x6628, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000002, 0x10, r0, 0x6ca0a000) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000008fc0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) write$cgroup_int(r2, &(0x7f0000000200), 0x12) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f0000000400)={0x4, 0x6, 0xffffffffffffffff, 0x20, 0x8, 0xffffffffffffffff}) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x220d82, 0x0) fchown(r3, 0x0, 0x0) r4 = accept(0xffffffffffffffff, &(0x7f00000001c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000000c0)=0x80) r5 = socket(0x200000000000011, 0x4000000000080002, 0xdd86) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x40086602, 0x400007) write$cgroup_int(r6, &(0x7f0000000200), 0x12) flistxattr(r6, &(0x7f0000009000)=""/78, 0x4e) bind$packet(r5, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendmmsg$inet(r5, &(0x7f0000002b00)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="96c6322ea684879088175969ec15e10d40e4719016cbc15a36a88c6c843e12b1f5cb6a73613ceec274", 0x33}], 0x1, 0x0, 0x0, 0x534}}], 0x40001c0, 0x0) recvmmsg(r5, &(0x7f0000003fc0)=[{{&(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, 0x80, &(0x7f00000015c0)=[{&(0x7f0000000180)=""/157, 0x9d}, {&(0x7f0000000240)=""/242, 0xf2}, {&(0x7f0000000380)=""/22, 0x16}, {&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000001500)=""/186, 0xba}, {&(0x7f00000003c0)=""/18, 0x12}], 0x6, &(0x7f0000001640)=""/131, 0x83}, 0x9}, {{&(0x7f0000001700)=@nl=@unspec, 0x80, &(0x7f0000001d40)=[{&(0x7f0000001780)=""/69, 0x45}, {&(0x7f0000001800)=""/247, 0xf7}, {&(0x7f0000001900)=""/20, 0x14}, {&(0x7f0000001940)=""/15, 0xf}, {&(0x7f0000001980)=""/82, 0x52}, {&(0x7f0000001a00)=""/115, 0x73}, {&(0x7f0000001a80)=""/90, 0x5a}, {0x0}, {&(0x7f0000001bc0)=""/146, 0x92}, {&(0x7f0000001c80)=""/137, 0x89}], 0xa}, 0x20}, {{&(0x7f0000001e00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}, 0x7}, {{&(0x7f00000020c0)=@l2, 0x80, &(0x7f0000002580)=[{&(0x7f0000002140)=""/103, 0x67}, {&(0x7f00000021c0)=""/170, 0xaa}, {&(0x7f0000002280)=""/144, 0x90}, {&(0x7f0000002340)=""/172, 0xac}, {&(0x7f0000002480)=""/197, 0xc5}], 0x5, &(0x7f0000002600)=""/199, 0xc7}, 0xfffffffa}, {{&(0x7f0000002700)=@nfc_llcp, 0x80, 0x0}, 0xffffffc0}, {{&(0x7f0000003d00)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000003f00)=[{0x0}, {&(0x7f0000003e00)=""/216, 0xd8}], 0x2}}], 0x6, 0x1, &(0x7f0000004140)) r8 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f00000001c0)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICLIST(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000001e80)={0xd8, 0x0, 0xc08, 0x70bd27, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @remote}, @NLBL_UNLABEL_A_SECCTX={0x25, 0x7, 'system_u:object_r:getty_etc_t:s0\x00'}, @NLBL_UNLABEL_A_ACPTFLG={0x5}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @remote}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @loopback}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @mcast1}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @mcast2}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'batadv0\x00'}, @NLBL_UNLABEL_A_SECCTX={0x29, 0x7, 'system_u:object_r:random_device_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @multicast1}]}, 0xd8}, 0x1, 0x0, 0x0, 0xc0}, 0x4) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r7, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x40010}, 0xc, &(0x7f00000004c0)={&(0x7f00000041c0)={0x14, r8, 0x1, 0x70bd2a, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x8041) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r9, 0x40086602, 0x400007) write$cgroup_int(r9, &(0x7f0000000200), 0x12) recvmmsg(r9, &(0x7f0000008d00)=[{{&(0x7f0000001b00)=@phonet, 0x80, &(0x7f0000001b80)=[{&(0x7f0000001f80)=""/68, 0x44}, {&(0x7f0000002b40)=""/4096, 0x1000}, {&(0x7f0000002000)=""/118, 0x76}], 0x3}, 0xfffffff8}, {{&(0x7f0000002400)=@xdp, 0x80, &(0x7f00000028c0)=[{&(0x7f0000002080)=""/9, 0x9}, {&(0x7f0000002780)=""/239, 0xef}, {&(0x7f0000002880)=""/25, 0x19}], 0x3}, 0xfffffe01}, {{&(0x7f0000002900)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000003bc0)=[{&(0x7f0000002980)=""/133, 0x85}, {&(0x7f0000002a40)=""/61, 0x3d}, {&(0x7f0000002a80)=""/126, 0x7e}, {&(0x7f0000003b40)=""/84, 0x54}], 0x4, &(0x7f0000003c00)=""/181, 0xb5}, 0x2}, {{&(0x7f0000003d80)=@pppoe={0x18, 0x0, {0x0, @random}}, 0x80, &(0x7f0000003f40)=[{&(0x7f0000004280)=""/139, 0x8b}, {&(0x7f0000004340)=""/191, 0xbf}, {&(0x7f0000004400)=""/149, 0x95}, {&(0x7f0000003cc0)=""/42, 0x2a}, {&(0x7f00000044c0)=""/229, 0xe5}, {&(0x7f00000045c0)=""/237, 0xed}], 0x6, &(0x7f00000046c0)=""/84, 0x54}, 0xffff309f}, {{0x0, 0x0, &(0x7f00000057c0)=[{&(0x7f0000004740)=""/4096, 0x1000}, {&(0x7f0000005740)=""/94, 0x5e}, {&(0x7f0000004200)=""/45, 0x2d}], 0x3, &(0x7f0000005800)=""/192, 0xc0}, 0x800}, {{&(0x7f00000058c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000005d00)=[{&(0x7f0000005940)=""/6, 0x6}, {&(0x7f0000005980)=""/181, 0xb5}, {&(0x7f0000005a40)=""/120, 0x78}, {&(0x7f0000005ac0)=""/123, 0x7b}, {&(0x7f0000005b40)=""/33, 0x21}, {&(0x7f0000005b80)=""/224, 0xe0}, {&(0x7f0000005c80)}, {&(0x7f0000005cc0)=""/5, 0x5}], 0x8, &(0x7f0000005d80)=""/94, 0x5e}, 0x3}, {{&(0x7f0000005e00)=@generic, 0x80, &(0x7f0000006340)=[{&(0x7f0000005e80)=""/199, 0xc7}, {&(0x7f0000005f80)=""/83, 0x53}, {&(0x7f0000006000)=""/66, 0x42}, {&(0x7f0000006080)=""/237, 0xed}, {&(0x7f0000006180)=""/209, 0xd1}, {&(0x7f0000006280)=""/32, 0x20}, {&(0x7f00000062c0)=""/94, 0x5e}], 0x7, &(0x7f00000063c0)=""/208, 0xd0}, 0x3}, {{0x0, 0x0, &(0x7f0000006580)=[{&(0x7f00000064c0)=""/160, 0xa0}], 0x1, &(0x7f00000065c0)=""/36, 0x24}, 0x401}, {{0x0, 0x0, &(0x7f0000008a80)=[{&(0x7f0000006600)=""/250, 0xfa}, {&(0x7f0000006700)=""/4096, 0x1000}, {&(0x7f0000007700)=""/4096, 0x1000}, {&(0x7f0000008700)=""/134, 0x86}, {&(0x7f00000087c0)=""/237, 0xed}, {&(0x7f00000088c0)=""/226, 0xe2}, {&(0x7f00000089c0)=""/141, 0x8d}], 0x7}, 0xa1}, {{&(0x7f0000008b00)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000008bc0)=[{&(0x7f0000008b80)=""/41, 0x29}], 0x1, &(0x7f0000008c00)=""/221, 0xdd}, 0x7116}], 0xa, 0xa020, &(0x7f0000008f80)) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r4, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10001204}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x3c, r8, 0x0, 0x70bd2b, 0x25dfdbfe, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @mcast2}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4040080}, 0x8804) sendmsg$NLBL_UNLABEL_C_ACCEPT(r3, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x28, r8, 0x10, 0x70bd2c, 0x25dfdbfb, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'erspan0\x00'}]}, 0x28}, 0x1, 0x0, 0x0, 0x800}, 0x8000) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r10, 0x6628, 0x0) ioctl$BLKFRASET(r10, 0x1264, &(0x7f0000005c80)=0x100) sendmsg$NLBL_UNLABEL_C_LIST(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x44, r8, 0x4, 0x70bd2c, 0x25dfdbfc, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'gretap0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth1_virt_wifi\x00'}, @NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}]}, 0x44}, 0x1, 0x0, 0x0, 0x4000800}, 0x40001) 06:01:19 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x0, 0x0, 0x0, 0x64}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) [ 2288.872589][ T8879] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2288.936993][ T8879] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2288.961565][ T8879] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2288.973187][ T8879] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature 06:01:20 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = socket$netlink(0x10, 0x3, 0x5) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000001c00)={@broadcast, @local}, &(0x7f0000001c40)=0xc) sendmsg$BATADV_CMD_TP_METER(r1, &(0x7f0000001d40)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000001d00)={&(0x7f0000001c80)={0x4c, r2, 0xe0a, 0x70bd25, 0x4, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r3}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0xfc000000}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xa7}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x8}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x7fff}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x20000000) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) [ 2288.999019][ T8879] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 2289.032919][ T8879] EXT4-fs (loop3): mount failed 06:01:20 executing program 5: r0 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) write$cgroup_int(r1, &(0x7f0000000200), 0x12) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, 0x0) 06:01:20 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) [ 2289.089844][ T8879] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2289.107728][ T8879] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2289.127709][ T8879] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock 06:01:20 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000000002b00000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:01:20 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3, &(0x7f00000008c0)=[{&(0x7f00000000c0)="8000000038040000197a0300e60100006c000022000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x3ff8000000000}, {&(0x7f00000005c0)="b4065f2ab9075ba253e109154559f88f062320246c5ae74af8e236a42c0cd0b73085bf4313acfd026684e3be45cf8f03379864cd059401666557f67127a057d2cb8d6521890c5cbfe5eaf821257dfacfaf5ef8b4c06e941318d3eec42a910d1420306249520086172e5e2f0c2308655d2a82735e431f158af85763d2d76375e78b343d563d952660c79ecfad7ccb16689bcb4fed9533483595eb30e2671cd545", 0xa0, 0x4}], 0x4803, 0x0) 06:01:20 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)='fs.fat\x00'/22, 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ff", 0xc2) ftruncate(r1, 0xc2) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='cgroup.controllers\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x6628, 0x0) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000140)={0x7ff}, 0x4) accept$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000000c0)=0x14) [ 2289.199337][ T8879] EXT4-fs: failed to create workqueue [ 2289.210923][ T8879] EXT4-fs (loop3): mount failed 06:01:20 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) write$cgroup_int(r3, &(0x7f0000000200), 0x12) write$P9_RLOPEN(r3, &(0x7f0000000000)={0x18, 0xd, 0x2, {{0x10, 0x4, 0x3}, 0x4}}, 0x18) r4 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 06:01:20 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000000002c00000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:01:20 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x0, 0x0, 0x0, 0x8bf}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) [ 2289.333652][ T8925] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2289.387238][ T8925] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2289.422952][ T8925] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock 06:01:20 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_int(r4, &(0x7f0000000200), 0x12) ioctl$KDGKBMETA(r4, 0x4b62, &(0x7f0000000000)) ptrace$cont(0x20, r0, 0x0, 0x0) 06:01:20 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000000002f00000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2289.491229][ T8925] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 2289.508112][ T8925] EXT4-fs (loop3): corrupt root inode, run e2fsck 06:01:20 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x6628, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000000)={0x0, 0x2, 0x3, 0x9}) ptrace$cont(0x20, r0, 0x0, 0x0) [ 2289.549691][ T8940] FAT-fs (loop5): bogus number of reserved sectors [ 2289.566458][ T8925] EXT4-fs (loop3): mount failed 06:01:20 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x0, 0x0, 0x0, 0x6400}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) [ 2289.607254][ T8940] FAT-fs (loop5): Can't find a valid FAT filesystem 06:01:20 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000000003c00000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:01:20 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000000004000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:01:20 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(r3, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x4, 0x1, 0x3, 0x0, 0x0, {0xa, 0x0, 0x4}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x4000) ptrace$cont(0x20, r0, 0x0, 0x0) [ 2289.762044][ T8925] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2289.872084][ T8940] FAT-fs (loop5): bogus number of reserved sectors [ 2289.887203][ T8940] FAT-fs (loop5): Can't find a valid FAT filesystem [ 2289.917198][ T8925] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2289.927859][ T8925] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2289.956574][ T8925] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 2289.970952][ T8925] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 2289.978568][ T8925] EXT4-fs (loop3): mount failed 06:01:21 executing program 1: clone(0x4000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) r1 = geteuid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r5) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f0000000300), &(0x7f0000000340)=0x0, &(0x7f0000000400)) r8 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r9) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r10, 0x6628, 0x0) statx(r10, &(0x7f0000000440)='./file0\x00', 0x400, 0x1, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='system.posix_acl_default\x00', &(0x7f0000000580)={{}, {0x1, 0x2}, [{0x2, 0x1, r1}, {0x2, 0x1, r3}, {0x2, 0x0, r5}, {0x2, 0x4, r6}, {0x2, 0x2, r7}, {0x2, 0x4, r9}], {0x4, 0x3}, [{0x8, 0x4, r11}], {0x10, 0x3}, {0x20, 0x3}}, 0x5c, 0x2) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r13 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0xd0080, 0x0) r14 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r14, 0x6628, 0x0) poll(&(0x7f0000000040)=[{r13, 0x200}, {r12, 0x2100}, {r14, 0x40}], 0x3, 0x7f) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r16, 0x0, r15) r17 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r17, 0x6628, 0x0) r18 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r18, 0x6628, 0x0) r19 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r19, 0x40086602, 0x400007) write$cgroup_int(r19, &(0x7f0000000200), 0x12) r20 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r20, 0x6628, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0xff) ptrace$cont(0x20, r0, 0x0, 0x0) 06:01:21 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3, &(0x7f00000008c0)=[{&(0x7f00000000c0)="8000000038040000197a0300e60100006c000023000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x3ff8000000000}, {&(0x7f00000005c0)="b4065f2ab9075ba253e109154559f88f062320246c5ae74af8e236a42c0cd0b73085bf4313acfd026684e3be45cf8f03379864cd059401666557f67127a057d2cb8d6521890c5cbfe5eaf821257dfacfaf5ef8b4c06e941318d3eec42a910d1420306249520086172e5e2f0c2308655d2a82735e431f158af85763d2d76375e78b343d563d952660c79ecfad7ccb16689bcb4fed9533483595eb30e2671cd545", 0xa0, 0x4}], 0x4803, 0x0) 06:01:21 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f0000000400)={0x0, 0x0, 0x7, 0x0, [], [{0x1ff, 0x5, 0x8, 0x65c3dc7d, 0x4, 0x600}, {0xfffffffb, 0x6, 0x3, 0x8, 0x20}], [[], [], [], [], [], [], []]}) 06:01:21 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000000054300000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:01:21 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x0, 0x0, 0x0, 0xbf08}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) 06:01:21 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x9, 0x400000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f0000000100)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x6, @perf_config_ext={0x9, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) io_submit(0x0, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000100)="e669389f", 0x4}]) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r5, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r6 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r6}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f00000002c0)=0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000980)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x1a00}}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x8}}, {@max_read={'max_read', 0x3d, 0x1000}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}], [{@fowner_eq={'fowner', 0x3d, r7}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYPTR64=&(0x7f00000002c0)=ANY=[]], 0x37e) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYBLOB="000eedc80527dcc1ac000000000000"], 0xf) fallocate(0xffffffffffffffff, 0x3, 0x0, 0x8020003) writev(0xffffffffffffffff, &(0x7f0000000380)=[{0x0}], 0x1) ioctl$TIOCGPGRP(r2, 0x540f, 0x0) r8 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r9 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000080)={'sit0\x00', 0x0}) setsockopt$packet_int(r9, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) bind$packet(r9, &(0x7f0000000300)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @random="65ed59501ed8"}, 0x14) sendmmsg(r9, &(0x7f00000026c0)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000400)="1565940920f0eea59939e446589f3a30d60e2017f051975bdac17f461fb45154dde274481056d4c55c6442ae492871c96ae5b1ec09822ca7b997ab4b9cd99a44f41b5e2801594342087e49633a9aa51b871bb1f921e59a79641fc8135872e0ccf35e7f8879aa99364dec5535d38bf31aa069", 0x72}, {&(0x7f0000000200)="1b2eb69804b9e2f9d37a9b0a63ce0480675ca8398d1a34fd44835089919da82ce3a724e04431642bad1e2e090961dc2acadef8f2b2be9476bb85ac2f", 0x3c}, {&(0x7f0000000480)="3167a2e9de08f2e2076b3935e470f9983ef01dea9502f0ec65ab2892e4112999006dbb6c949dbe3a4eea024b68b9d367cb92f4c17f88f5535820c076b493441435ffa345bf0255d396192821fc4958068cd68c708e620798759717b4693d4017843a5acca20ae10624bc8eda7d6e2767101dd45b458dbb9937c0a761c9319333ca6e3506e500f0f1607c15e90a6206ae288e79e485b76c888f3b91c4522445e55a7ce0", 0xa3}, {&(0x7f0000000540)="0e4d3521ebbdc26c18bd6fc5b653ad0223f2a06a739f15f1005f66f02ac5324b381244b912b7736a3046482df1f4a7cbc16bc85dab1d308e2aa9fec6ed288a3f00ca5eac1964d5b76e1d32cd3b4a910662c8da5a33082e3ee7d03d106a884c1d1400320574f6eef511a4c1f6c690328e0b3b234371a2c9b7e3e5da2309ac33ea94554baf6a225c6277613bbb1e2308b214f8c5581dc900bc67d4326d663ff230420b81e517f0bde08139cd9d", 0xac}], 0x4, &(0x7f0000000640)}}, {{&(0x7f0000000700)=@hci={0x1f, 0x3, 0x1}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000780)="2d069350fe76c0c8679f005b3881508585e3bcc83fa989e57e1cd072a12530c22800ab18df54ea711cfd66e5749f2466a382f02c1fada72ae72e65d649217a7316f366ed6f52c1cb", 0x48}, {&(0x7f0000000ac0)="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", 0x1000}, {&(0x7f0000000680)="5ae6c92cb6cf5fded44229769241bc011a34701adc", 0x15}, {&(0x7f0000000800)="7bfe0a063a7e1e04bca74f948439815986db6a7f4785c2afcc97a30aa86b004c1bcc229487e0a61e6cb4a4f5e9dcf05576975ef7b5f9f96943ad9f4b4b49a7d00b616b855306805e862c1c51a516e56938beec49819509a52e70e13c", 0x5c}, {&(0x7f0000000880)="2fafd0551d81823336a74bd9dcddf4471e89", 0x12}], 0x5}}, {{&(0x7f0000001ac0)=@sco={0x1f, @fixed={[], 0x10}}, 0x80, &(0x7f0000001c00)=[{&(0x7f0000001b40)="2eb26eec82b3f631d5596777f111bfa91eb88c8713737c24f87847ee164e62456ef03f51b5b10dfa084df620ee0cbc0948312fc3969e7dd56de224eea9", 0x3d}, {&(0x7f0000001b80)="113f3705c6a8db2b363c27ba0c546d1ef4c1b253b42cfccedc01e62e37123d41e58ac31afc4f382bcf4b298b7c1d79d83e20d3491d340e5d10fb27aec560801f193b5f96033526a31fd68fad913401e1", 0x50}], 0x2, &(0x7f0000001c40)=[{0xb0, 0x108, 0x1, "45bcd131ec377f4ceb0eefa25c96758b75d8d1067d92328a032143374bcc62c3e4b3032a71699de489e5bca8291bfb790faa8f6f314798f3d0983b2a10694ea6ab2c1efbfe394a10fadd1755cd6c5779bc9ff609087c5f32b6211325b447a6b7e9e141e1c564d0c2d9ead7d3b5c541bf2863ff362b7779d3d1ec8d27fbc0e2b6b1f2d9867241377a5b2eff397a845c717600758dd8caedb863aa"}, {0xc0, 0x10b, 0x4, "133b4ec64f058cf4c010234591f3b4e3ce7ffd51c804d7089c793b9908949754dfcdf9526da6fec02699e54285c06013aeaea38be90fc1b18fcf84a0088531a6d84ae815f805c6a0788bf4847dbca8ae51f09c655e8142026be9392f01572cbf83ac8768598579e9d71a8b9d6313a8dc51dc921ab67e373acb821059546dea3925006548e5e9eb70ee1a2b419726dc79bcb2259efebd55d6852b0e58f40eb595a9af659daf78e8cfaf49eba72d"}], 0x170}}, {{0x0, 0x0, &(0x7f0000001ec0)=[{&(0x7f0000001dc0)="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", 0xfc}], 0x1, &(0x7f0000001f00)=[{0x110, 0x115, 0x7fff, "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"}], 0x110}}, {{&(0x7f0000002040)=@vsock={0x28, 0x0, 0x0, @local}, 0x80, &(0x7f00000020c0)}}, {{&(0x7f0000002100)=@rc={0x1f, @any, 0xff}, 0x80, &(0x7f0000002640)=[{&(0x7f0000002180)="005fc9cc104f", 0x6}, {&(0x7f00000021c0)="3f830c580f8a52902c02b3eb428aaa6763c7d2a0a57498b4de4d736b8b72f0a2b032c0d5415865d76232c3e5d80fabad61594df4d83ae31f1614855adbeda3e14632ec2b1e0b7ce2c8607fcc413807b480a834aa5c51ff34a7dfc3749d30738f7fd7a3e8d0a6b3ede8989eb88d1d55402cddf48a08ab0a546692f0a86c8aad676119641775837dc1f075b740d0ebeae9c49b00677180cc321da4e69b96fa5502566995f0782349026864b218b0d58655929cd8", 0xb3}, {&(0x7f0000002280)="daf09ec4e9eca18c8c0aa644988fa609233b8c107854198266a920357d17e410c5a9d9a8715b2a16524be8beb9fa9e9487cd6e0c2d00dee77408464ab4554d25ee16884bb334ed3d3f7b74384a2f69b4c26a575ff79e46fb71ac225d1c639c0a71ea2e0c8e74a283a283bb1a22974282a1fee79b91cd4176b0692b7c6fb931ec38ef93466327e49093816e324156c00d189c92daf602c16a2dc1a5b9588b0dc01d53531c7c2dfdece9a9e82290536c8c033d501f5c80cf963040b2a4a1137df9befb08a1ea16c5f8fab2934423ae4b2989b1352ce51cc1bbe8bdd6eecdaa8a49bca5448e36af0eeead33e36971c84387293ee4c7b8478a9c48", 0xf9}, {&(0x7f0000002380)="3c32c598fa3b543281f24be8fa186c74d973c82913d55525e91d06f993a74b5e0b972c8a12c1dc3fa4675ad86405cd83650937a7427e92856f4a49dab1ba2f903d031331e880322d0b4f355313307370180eb936ae03ccd022116fa6e420be6bfb3b44fc9115534f66aba21a80c6a2a674bb81807ce4765069d7df0715aaf8742effa0e6cab79d4a5b2c54d7e69a691ca2312c776f3304ec8da833c099f2e94bbaa796c70e78665ef34669601d6d44b11267165f5149550607bfb8a7534d71bbc335c80541e28bc38ae7f2bf39e0727279e26ce3d1202ecb87c32671a55c0ce139fce92e", 0xe4}, {&(0x7f0000002840)="bb87c009649c2fefc21aecb6072b8505c35a77e716a32ddb1814ce1942bcd11ea83c5578fe2cc70c70cd0cd87986e2d3f2eb0f0fa12826f561fee11fd27e7a6846ce56a8b461f5c1af75801baa4b03379380755344c128a0ceead78a04da6023792106459fdd0823c480b5275d3351e5e546bb24bba8a6cd4c6a770893264dc7b5bcc49efbb18b6557fba24467371e25cba3802e09c4a1fb1fbd59cb462a558ce8ab93ed3152fd69b26fcd9427b339c4ca4a3914c9df2ce51d72f0561b8ef87eb7207be5733b", 0xc6}, {&(0x7f0000002580)="7a235c593165d75efd3a41db0c3fcb6115ae71874a8055e47ba9425b2a0e67945205b86a04297e1c90cc5ea328655de12cabcfa4", 0x34}, {&(0x7f00000025c0)="91f26c53b9f2148e4d37f90901cbdb7bbdbd482a372541e8474d28add35a7fa182f15763d1c08c506c6c815b1d800cf07a290beca93edf6bae844b0697758e83be09b1070a54bc6b190f490aa984b4a74d628f12907137e48f5affcad74f8f916d438e640178", 0x66}], 0x7}}], 0x6, 0x0) bind$inet(r9, &(0x7f0000000300)={0x2, 0x4e23, @multicast2}, 0x10) lseek(r8, 0x0, 0x3) fcntl$dupfd(r8, 0x0, 0xffffffffffffffff) 06:01:21 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000000007400000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:01:21 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x0, 0x0, 0x0, 0x3000000}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) 06:01:21 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x40200, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x6628, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xfdffffff, 0x56, 0x0, 0x0, 0x0, [], 0x0, 0x9, r2, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) [ 2290.287336][ T9015] fuse: Bad value for 'fd' 06:01:21 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) [ 2290.327395][ T22] kauditd_printk_skb: 427 callbacks suppressed [ 2290.327403][ T22] audit: type=1400 audit(1579672881.394:349388): avc: denied { map } for pid=9013 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2290.389356][ T22] audit: type=1400 audit(1579672881.414:349389): avc: denied { map } for pid=9017 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 06:01:21 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe80000000000e8000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:01:21 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x9, 0x400000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f0000000100)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x6, @perf_config_ext={0x9, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) io_submit(0x0, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000100)="e669389f", 0x4}]) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r5, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r6 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r6}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f00000002c0)=0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000980)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x1a00}}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x8}}, {@max_read={'max_read', 0x3d, 0x1000}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}], [{@fowner_eq={'fowner', 0x3d, r7}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYPTR64=&(0x7f00000002c0)=ANY=[]], 0x37e) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYBLOB="000eedc80527dcc1ac000000000000"], 0xf) fallocate(0xffffffffffffffff, 0x3, 0x0, 0x8020003) writev(0xffffffffffffffff, &(0x7f0000000380)=[{0x0}], 0x1) ioctl$TIOCGPGRP(r2, 0x540f, 0x0) r8 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r9 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000080)={'sit0\x00', 0x0}) setsockopt$packet_int(r9, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) bind$packet(r9, &(0x7f0000000300)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @random="65ed59501ed8"}, 0x14) sendmmsg(r9, &(0x7f00000026c0)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000400)="1565940920f0eea59939e446589f3a30d60e2017f051975bdac17f461fb45154dde274481056d4c55c6442ae492871c96ae5b1ec09822ca7b997ab4b9cd99a44f41b5e2801594342087e49633a9aa51b871bb1f921e59a79641fc8135872e0ccf35e7f8879aa99364dec5535d38bf31aa069", 0x72}, {&(0x7f0000000200)="1b2eb69804b9e2f9d37a9b0a63ce0480675ca8398d1a34fd44835089919da82ce3a724e04431642bad1e2e090961dc2acadef8f2b2be9476bb85ac2f", 0x3c}, {&(0x7f0000000480)="3167a2e9de08f2e2076b3935e470f9983ef01dea9502f0ec65ab2892e4112999006dbb6c949dbe3a4eea024b68b9d367cb92f4c17f88f5535820c076b493441435ffa345bf0255d396192821fc4958068cd68c708e620798759717b4693d4017843a5acca20ae10624bc8eda7d6e2767101dd45b458dbb9937c0a761c9319333ca6e3506e500f0f1607c15e90a6206ae288e79e485b76c888f3b91c4522445e55a7ce0", 0xa3}, {&(0x7f0000000540)="0e4d3521ebbdc26c18bd6fc5b653ad0223f2a06a739f15f1005f66f02ac5324b381244b912b7736a3046482df1f4a7cbc16bc85dab1d308e2aa9fec6ed288a3f00ca5eac1964d5b76e1d32cd3b4a910662c8da5a33082e3ee7d03d106a884c1d1400320574f6eef511a4c1f6c690328e0b3b234371a2c9b7e3e5da2309ac33ea94554baf6a225c6277613bbb1e2308b214f8c5581dc900bc67d4326d663ff230420b81e517f0bde08139cd9d", 0xac}], 0x4, &(0x7f0000000640)}}, {{&(0x7f0000000700)=@hci={0x1f, 0x3, 0x1}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000780)="2d069350fe76c0c8679f005b3881508585e3bcc83fa989e57e1cd072a12530c22800ab18df54ea711cfd66e5749f2466a382f02c1fada72ae72e65d649217a7316f366ed6f52c1cb", 0x48}, {&(0x7f0000000ac0)="0e062190142c4842a6f1be51818a3910b63ab5862a74fa813ab5827d9c255739c874d4ab8c53165d4562a1a0388eb72c024109f5a7d4a33b6403c7a07f87b09002cd47a06a5a19bb3bbb272767adc7607ad747b774a152e78c262015608a754ebff0ad5e94eb70050f9ede7b0597bb634d36cb43394e1e9299cefff3b4f90ba445e2dfff673a163fa6e38626d36298929e116658f2b1c5b8c60691466d0a83b3a06f878db1a3e92614067b48180a6f4b8eb8e684ce0b2547fcebb31883b94e2e368bf149200668547d5249df7a9cce6a924ff901d87ad83cdc88b65d1d2a9252cf16e6e43317fb96c441015033ca238a3d71e52e866d3bf88844d316e46affb3a03015c485541c17237c4ad030f34a9425e361661ecfc680024e53878315bd047feb419a861a665afe509f8cdfa3d47fc741595a63f8dca599d627f4c57e7411a8e37b3ba2b522d85c50c1890c97441f56b820f4a28d4cba26af5a3c18670d2d50a49c7903acb496a19ede937f90d1bd7bb1e4552956563862bbbc0e0a2f40b92a3b5f568239187c3eb232d5ab22163e72812d7106ca03f19ad9ecb564ba32d6a30899b37506b2f8bd3afd803b7fae45a966ffb91cbcdf0d6a85a844fffbf0496e97641a6e636170f6670e0f7afb1b89ea54aef9fb35ff2dad9a1c4a9be27001d8f88eec311a855921f379733d9e635ff07fbe97eb52c0c8dd28e812264068be872c3d006768bffe19bcb663cb1332cf3754b35ef18be76d15993d1237cff3a5cda734e7eb028c8ebfacd739069fe530a6a51c04c387c57e3a523a11a9dd0ab9f36766bffde5e909c4477d51dcf4e34a5aca5dee51951c0f47af118d6d909f522677493421ebd0f3abe401dcc65278c368062bc6eefd2eef4c231b7bb9d6ca99324f5c70a83fb49c9b045bf59dc15b43fb3330062a26747d800653b15c5bb3190bb92197cb20863eacc10153622c1badadeac00e55c7ee3e1ede4f5d0ab1cd6e3556c494a58dc1eeab4801addcbb5f3d803adb9e688df5fb3ff65bc20985a0606cc95415341175a51033c1efac34740e133f50809ef7d34c60b33ae77dc15203cf770d6f3bd479d5ce5971001d968cf7766db10b0c8dafbbe9ccd43a1c1a42695b289dd46559e065bf5f79b7af063a86f5c7a80c61c43f6817750af46398f2b4468c894f1cbe1e8ac03ca36edbcc67472ad896ed2c39de714d985e62bbdca7837b708ee2426eac3f8b917f4280b725c53688de6804e76bd241ff6c84f28457f7aeaaa1b1e154572d3fecb0fb1e8d5692db8ba9bf6985e54d72c2f8207311d30426766ed2bc4cfed1cd41905f49a07b09d22baec42517daacee07fd19bb70596b514a64c3bb095e8fddfc71cfeedc6e481f19abeeeafbc524a967570cdd1c748979df905dd8810a33ae71cb06e51fc412e1993b5ae037030f7ffce926aade0b1717adf2c68751ef91865d3476672c06fc6ace30292c1ae1e35b769e71fc0de0fb8fdb88206f6efea523f8dc4e3638a32cbd0922980a64878d00dca914991f08137e83b4da27e71e615c90e94793c6f8e234052475a2dc87fbb3a84ecaae448bef7468d9fd56eb38f72e04fb2975eeacded72fce806e2adbc2d9c9a4b612735df26d6a6fca6a90762b7f19387224d7b5fd9dcbae6438a6d392807afd5ad929464afa424aa7a5538fa994f014d514565b2ece8464c068d85c4680dfcefdefe8f3a2811b60cfaff50a8691efe4c36c3333c2727d1152c0e9f9aab3f9772aa6b975a1987c8a542d9e976128055cf4ce385f6fbca9e6bb844dff8a39012327629839cfcc0331067a6676afd080504c52c58bb802d7bb488e75900e6fd6bb3f27349b3b522f62d5b6ee088d2c5c247a2c5b4b60356a79f1ad64693d9c7ebae5d4d6980ff6121f57aa7f0997c1c1cb55490e2d1b52cf0452d2fb337e1597786708e5cac85941745f4a1bb2555424a96b603a3b015d2574e68b05a722c4023f1843b8570706750333da4f8f9b21528053bd4cf952b91677d18ea9f98da0890d9b0b168cfc8a261aca23563193ce23e8d92741717122903077e184c5dd42f352cfb1bbdad69f5d66a72e1518e8d800224fb515ae292a5f8365b71bc74c85fd74d648c32be26c132ef2a71817399664f596b8fc4c512d423cf3da13eb0a232125cf06a13c86e52b7ca207821ecdccca616dc8dda20bfb7ac7561e551264b7ce990bbcac31dd03669a7652ec046d0ae1a5aa1b957dba55fe1d4cd17c12b2f583680197a0e4c440c5c85173b79818af67849f0599e97aa9316cff8fad8f8894aae77634542545c845968ba3c18cbadc490ddf930fe134968a6ba17a2cff0dccf295a5794035cbdce546e35489abca1aa0507550e7e41510290e0e9761dc9077ca671a72c55f78d66df19fb9ac0b561e89d0a16204f8c001af9cbda7aa52e43c1ded961db230e5dafc8e8663197cf3e23e1cc8be5e9ab2056dded5d109d7f2b17cb634c212071b949a29eef62d464766bd7098aefdc1c8ad1b7867997aaa97b394becebffe46469478eae14769bc80fa38f63a2661d00b0a4aebe47b63c99fad9bc75156bb7f23275c4a764b29dba3549b92063eef6ea35b14b95b604b96b867820c4c6391371636e0534beb69dd3ab75278373af610a06e26804c9e7242d219d38fe7373e68b57dda37e766055d6008e5f73a3bc00d281c848d240033d0fb91978834132f4a3464f960218f82b92b69f16dc200c4a16b3556d6f348bdc74749d485254ce9f7da273080b88ea1f99e514320b028a0e0b248dbc0c39aec2b20ed96f1d9872dcc5202760ee6d85900a608e5884dd159b38d0b4ee2198c0a3b40f5215660801665a12709a1b82461a5f84431d07481bc65c1310c6bb898efbbe7d074597bae3afa4befc8e69bbeca0e79bb9b6de50f307069d6c4efcb660c46ff734d07a8f601386f6871f119fa934ca19fcfea7c6604e5aa82abc10192137561a1c872daca69d2dbb78907617378842d1c5c18c448b0e2645972d42d5ed774015bdd227ed8767df6cceac988cfbd400f9c7a4057c4da4a64304430553c796a142ea2f0b3e66c9e108fb7fadf1005a1dadd3742a3ca91e9a0338146329ea135afaed2f20462e488e131fea749abe0d677afce738abe3563a00c94300f661d2a8e4939b954044ee6a9f8de66648526a70769fa7585e8696263dd6d178912d766cd999e8a018e07259072513236a338d555e14697a748652b76ca3518391a01f11cc3ac4c4339e1343c2f22ab2465a345d971a115bb80a7fbfbfa8b858e4510ae4a96a8328b983f164a66654a52e4e2ff293d9016c60690b33edd4647c223d185fd1e5603ad8f6e207a44ac9985a9d85adb1e116120d88b327ff72ff1a0dc1e0f38c1db2bd8c38ff676dc43541b971b576f39521748e0a9818840b7cf45ec985dedab63cc961244fd72c07abb7b7e181cbfb0c1a82fa25510f92549135b2ba7bd095ce983a63401a8208086cd329c7cdbec0127092cfb7385f608b14a46bceeb3ef4a3eb5abc927eae07b437b9615c37e32744074f4151276022d850267985522389ff12e89b4339dc65d3d8ea60ccc03d0be06608ac62f725ae749457af46b7f1f29676be3913f3f53a64beea6da149f4360e45c74e41a937c17f0e6451191c33270627a9ce84cfafd7209715ee746b7b72f1ff604e54ccc2199487ed65d2023f44a94f196dc6b31db477fff6b24c9caca2feeca8469f52f5186b06532a7e9bf2a4f788d105bd2d62148ddcab06aea97cad32fc13a0833f8cd3acc0fbb27de1acbbc41fa0d4a1819eaf932d1c9d93839fcbd95e0329bf8ef7f1d827b4d8ff479be87239b72997431c7832caa87d3b0d4da6675adcc561766019354b42b09107e37c923a5e2a3786951e1d23a1904fdfe4f6a8a957a85138c1b25ab99b8107fd8add564f35b61b32206ba2865136d3a30ff70e295f91b9dd4d147a4702d47417bb1a3b10ac36e4f11a4588f93f15bcae22fed9df12a18f4e04be8d75a54c405a3e97d193961c2cac38b5b7e546b6cb8992c2de5e763064ab0d76a899284364e135156b921840b0add3f73cb7f220e3375043ae13c39fb08e1fb105fb81a6c15e68e777b3204659e315f7432d4cad5edc330cb65340db757ced1acce6b10c119352d7306ba59791e7e5e32851ef49e2607585cd208019efd56f63040f5f59b5f365753c1436fa0bb72332cb73aaa26e9d098cfe84374fecbf429f674cd86a5e3e896b5914d705b4d8e4245e86f4b47607fb88ae16c858c2500aa09b11727b261eba9b33621a8be83854d95e02718d12c3f896e7d9496b071ac484fcd8390ba2a438de8f388cafbc3be545815d60caa232d7cd8addd0637f4461956a3d550df0eba2c6da249bb5203d55b8f646e70174237172af10e4e7338cdf0115ee5edc18ef1391e5b6f9b97a4100d15f92f9e50391fd157b744e7b47e65c488b846748d8e529f6ba6c4cd793b5c8846ff06932e0c594672d3ef161ef91b484f5b78e55c9820339246021c59b25440db1e2c535678d1644d690a9fa5464018a7b15c7c14c11a51ec4e69e56dcfd89e7530ac19be652965461e46ad64d00df9e391e9e294e51420105cf89f47d5ec3c06c12538713daebcc576cb56a3541ac90e54a3962a622c3cf984efb69ea50ffadcda7af05feb5ea83f9369bca1ae03a3cf112eb60d4aebc6ac0af02d0be2382f74fa5457408f04a90295bfdfe161c551a90c40df1c285bf79f7e90817ea04527eb90bdd94ddd5e25b6031ccfcfde1efb07291c7ef0f0ef0c7c1d4c6f01963f881876715227f18e611bb3558a386b7558b1852777dfccebc383627bb236c523be531ba9a23f6fbd3f3d5dd1ddc25987445fa153ca98d2f6d660ab35b1e0e18576c7a4c7e49ef5c54d1979aa08670989bfca6ea363a26aca271e6eee16aa8285b3e427d36ab08ac65533288865ed4ecbe9fe2e4a192fa4f4a0e17822ac4b962f812cb85cbfcf5715df85446ab0f615a6990a72d1e651a66b21c27fcf457422b34d4e2d4841bc31ba880f01868db3f49c403bd1d0164f9543b16a82030a7714e12f5b0abb54a0dde3baaff07eeef9ff0b2fa44280fa3a2926b93b50051b2c70a30a39185888409ce0e5d80c041ca77f4a4ed803b76f3b3887115cd8acdb52552cb3db2f41edab2f795d8a10b4fde1adde8e559c062c7d6b7e7655a47e504ef7c0cd6d8791d19b0d48c4716169b2a67cdf7961296c89b0fa9b2be2871923e098b516a8cd116b0cd0e920c76efaa9eaaed296d5ac918873902ee3a9891541ac78179eb8f90cf39dc23c22df6255a3950f460e6b2a9b61f9022932fbf8f501a14ad712e904c2792588eb6674d08f41a566df7edda49eb858ef8ba8268861c3624b5682b737c6285e230ab88bcd1f758cb53a5bfeaaaa5c03d783a6d779e6f35d8c931271e7eb8f7b79fb8ad0b02f67da840dc5c144ec4f39b4fef417a88fc5c3e63c12f0c97af138e9e5eb3007a6a96f4639b25eddaf82ea6cd9da6ac8c2a2c2b779272953f3175b99e1c6a4c5944d8955f8fcc50ae64f3896f526677a3ebfe019dd5388aaf347bb8215810c148360b1134869daae67aef9f605e84201e2e752eca4cb091f03b9670e1f522efe56e802fe93bd40c54b015cfbdd663d14defb402a36ea0c46ffb87a01f24a97fe134ead22d1c923e071ecc08885bf845a158c68b8cd9a2a15ccdbd1b7426790ccd5b85b288f37b43ccf5b4c1b5f4b12aa826f222adda622a4893dae1d3da422d090c9cdec0a20f05b9b6993284a29267ae3c9f711681e", 0x1000}, {&(0x7f0000000680)="5ae6c92cb6cf5fded44229769241bc011a34701adc", 0x15}, {&(0x7f0000000800)="7bfe0a063a7e1e04bca74f948439815986db6a7f4785c2afcc97a30aa86b004c1bcc229487e0a61e6cb4a4f5e9dcf05576975ef7b5f9f96943ad9f4b4b49a7d00b616b855306805e862c1c51a516e56938beec49819509a52e70e13c", 0x5c}, {&(0x7f0000000880)="2fafd0551d81823336a74bd9dcddf4471e89", 0x12}], 0x5}}, {{&(0x7f0000001ac0)=@sco={0x1f, @fixed={[], 0x10}}, 0x80, &(0x7f0000001c00)=[{&(0x7f0000001b40)="2eb26eec82b3f631d5596777f111bfa91eb88c8713737c24f87847ee164e62456ef03f51b5b10dfa084df620ee0cbc0948312fc3969e7dd56de224eea9", 0x3d}, {&(0x7f0000001b80)="113f3705c6a8db2b363c27ba0c546d1ef4c1b253b42cfccedc01e62e37123d41e58ac31afc4f382bcf4b298b7c1d79d83e20d3491d340e5d10fb27aec560801f193b5f96033526a31fd68fad913401e1", 0x50}], 0x2, &(0x7f0000001c40)=[{0xb0, 0x108, 0x1, "45bcd131ec377f4ceb0eefa25c96758b75d8d1067d92328a032143374bcc62c3e4b3032a71699de489e5bca8291bfb790faa8f6f314798f3d0983b2a10694ea6ab2c1efbfe394a10fadd1755cd6c5779bc9ff609087c5f32b6211325b447a6b7e9e141e1c564d0c2d9ead7d3b5c541bf2863ff362b7779d3d1ec8d27fbc0e2b6b1f2d9867241377a5b2eff397a845c717600758dd8caedb863aa"}, {0xc0, 0x10b, 0x4, "133b4ec64f058cf4c010234591f3b4e3ce7ffd51c804d7089c793b9908949754dfcdf9526da6fec02699e54285c06013aeaea38be90fc1b18fcf84a0088531a6d84ae815f805c6a0788bf4847dbca8ae51f09c655e8142026be9392f01572cbf83ac8768598579e9d71a8b9d6313a8dc51dc921ab67e373acb821059546dea3925006548e5e9eb70ee1a2b419726dc79bcb2259efebd55d6852b0e58f40eb595a9af659daf78e8cfaf49eba72d"}], 0x170}}, {{0x0, 0x0, &(0x7f0000001ec0)=[{&(0x7f0000001dc0)="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", 0xfc}], 0x1, &(0x7f0000001f00)=[{0x110, 0x115, 0x7fff, "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"}], 0x110}}, {{&(0x7f0000002040)=@vsock={0x28, 0x0, 0x0, @local}, 0x80, &(0x7f00000020c0)}}, {{&(0x7f0000002100)=@rc={0x1f, @any, 0xff}, 0x80, &(0x7f0000002640)=[{&(0x7f0000002180)="005fc9cc104f", 0x6}, {&(0x7f00000021c0)="3f830c580f8a52902c02b3eb428aaa6763c7d2a0a57498b4de4d736b8b72f0a2b032c0d5415865d76232c3e5d80fabad61594df4d83ae31f1614855adbeda3e14632ec2b1e0b7ce2c8607fcc413807b480a834aa5c51ff34a7dfc3749d30738f7fd7a3e8d0a6b3ede8989eb88d1d55402cddf48a08ab0a546692f0a86c8aad676119641775837dc1f075b740d0ebeae9c49b00677180cc321da4e69b96fa5502566995f0782349026864b218b0d58655929cd8", 0xb3}, {&(0x7f0000002280)="daf09ec4e9eca18c8c0aa644988fa609233b8c107854198266a920357d17e410c5a9d9a8715b2a16524be8beb9fa9e9487cd6e0c2d00dee77408464ab4554d25ee16884bb334ed3d3f7b74384a2f69b4c26a575ff79e46fb71ac225d1c639c0a71ea2e0c8e74a283a283bb1a22974282a1fee79b91cd4176b0692b7c6fb931ec38ef93466327e49093816e324156c00d189c92daf602c16a2dc1a5b9588b0dc01d53531c7c2dfdece9a9e82290536c8c033d501f5c80cf963040b2a4a1137df9befb08a1ea16c5f8fab2934423ae4b2989b1352ce51cc1bbe8bdd6eecdaa8a49bca5448e36af0eeead33e36971c84387293ee4c7b8478a9c48", 0xf9}, {&(0x7f0000002380)="3c32c598fa3b543281f24be8fa186c74d973c82913d55525e91d06f993a74b5e0b972c8a12c1dc3fa4675ad86405cd83650937a7427e92856f4a49dab1ba2f903d031331e880322d0b4f355313307370180eb936ae03ccd022116fa6e420be6bfb3b44fc9115534f66aba21a80c6a2a674bb81807ce4765069d7df0715aaf8742effa0e6cab79d4a5b2c54d7e69a691ca2312c776f3304ec8da833c099f2e94bbaa796c70e78665ef34669601d6d44b11267165f5149550607bfb8a7534d71bbc335c80541e28bc38ae7f2bf39e0727279e26ce3d1202ecb87c32671a55c0ce139fce92e", 0xe4}, {&(0x7f0000002840)="bb87c009649c2fefc21aecb6072b8505c35a77e716a32ddb1814ce1942bcd11ea83c5578fe2cc70c70cd0cd87986e2d3f2eb0f0fa12826f561fee11fd27e7a6846ce56a8b461f5c1af75801baa4b03379380755344c128a0ceead78a04da6023792106459fdd0823c480b5275d3351e5e546bb24bba8a6cd4c6a770893264dc7b5bcc49efbb18b6557fba24467371e25cba3802e09c4a1fb1fbd59cb462a558ce8ab93ed3152fd69b26fcd9427b339c4ca4a3914c9df2ce51d72f0561b8ef87eb7207be5733b", 0xc6}, {&(0x7f0000002580)="7a235c593165d75efd3a41db0c3fcb6115ae71874a8055e47ba9425b2a0e67945205b86a04297e1c90cc5ea328655de12cabcfa4", 0x34}, {&(0x7f00000025c0)="91f26c53b9f2148e4d37f90901cbdb7bbdbd482a372541e8474d28add35a7fa182f15763d1c08c506c6c815b1d800cf07a290beca93edf6bae844b0697758e83be09b1070a54bc6b190f490aa984b4a74d628f12907137e48f5affcad74f8f916d438e640178", 0x66}], 0x7}}], 0x6, 0x0) bind$inet(r9, &(0x7f0000000300)={0x2, 0x4e23, @multicast2}, 0x10) lseek(r8, 0x0, 0x3) fcntl$dupfd(r8, 0x0, 0xffffffffffffffff) [ 2290.427171][ T22] audit: type=1400 audit(1579672881.414:349390): avc: denied { map } for pid=9017 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2290.458969][ T22] audit: type=1400 audit(1579672881.414:349391): avc: denied { map } for pid=9017 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2290.489568][ T9019] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2290.490248][ T22] audit: type=1400 audit(1579672881.414:349392): avc: denied { map } for pid=9017 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2290.525067][ T22] audit: type=1400 audit(1579672881.414:349393): avc: denied { map } for pid=9017 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2290.550820][ T22] audit: type=1400 audit(1579672881.424:349394): avc: denied { map } for pid=9017 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2290.560488][ T9019] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 06:01:21 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) [ 2290.577085][ T22] audit: type=1400 audit(1579672881.424:349395): avc: denied { map } for pid=9017 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2290.612826][ T22] audit: type=1400 audit(1579672881.424:349396): avc: denied { map } for pid=9017 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2290.638671][ T22] audit: type=1400 audit(1579672881.424:349397): avc: denied { map } for pid=9017 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2290.705086][ T9019] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2290.737399][ T9019] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 2290.761844][ T9019] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 2290.845867][ T9019] EXT4-fs (loop3): mount failed [ 2290.846031][ T9049] fuse: Bad value for 'fd' [ 2290.903153][ T9019] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2290.914376][ T9019] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2290.937241][ T9019] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock 06:01:22 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x202081, 0x0) ioctl$PPPIOCGFLAGS(r1, 0x8004745a, &(0x7f0000000180)) wait4(r0, 0x0, 0x1000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40086602, 0x400007) write$cgroup_int(r5, &(0x7f0000000200), 0x12) getsockname$netlink(r5, &(0x7f0000000000), &(0x7f0000000040)=0xc) ptrace$cont(0x20, r0, 0x0, 0x0) 06:01:22 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000000358000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:01:22 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3, &(0x7f00000008c0)=[{&(0x7f00000000c0)="8000000038040000197a0300e60100006c000024000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x3ff8000000000}, {&(0x7f00000005c0)="b4065f2ab9075ba253e109154559f88f062320246c5ae74af8e236a42c0cd0b73085bf4313acfd026684e3be45cf8f03379864cd059401666557f67127a057d2cb8d6521890c5cbfe5eaf821257dfacfaf5ef8b4c06e941318d3eec42a910d1420306249520086172e5e2f0c2308655d2a82735e431f158af85763d2d76375e78b343d563d952660c79ecfad7ccb16689bcb4fed9533483595eb30e2671cd545", 0xa0, 0x4}], 0x4803, 0x0) 06:01:22 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x7fff, 0x10002e) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000040)='wlan0&keyring-{ppp1}^selinux\x00') socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet6(0xa, 0x803, 0x2) r6 = socket(0x10, 0x3, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x6628, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000540)={{{@in, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000000340)=0xe8) write$FUSE_ENTRY(r1, &(0x7f0000000400)={0x90, 0xfffffffffffffffe, 0x8, {0x0, 0x3, 0x1d, 0x789, 0x1, 0xffff, {0x6, 0x6, 0x2, 0x7, 0x9, 0x3, 0x5ea, 0x5, 0x7fffffff, 0x0, 0x3f, r8, 0xee00, 0x50, 0x9}}}, 0x90) r9 = socket(0x11, 0x800000003, 0x0) bind(r9, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @broadcast, 'lo\x00'}}, 0x80) getsockname$packet(r9, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=ANY=[@ANYBLOB="240000001800010000000000000000000a000000000000000000000008000400", @ANYRES32=r10, @ANYBLOB="49b2f3d62ac985f27a4d133072a2d63804c2ef91801a07996b093e183506fcd7e9fb2b21068f59ab7c362a1990b205f7bf788aa0ba7cd51f3e52601cd2ca819da8f4"], 0x24}}, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x8936, &(0x7f0000000000)={@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], @local}, 0x0, r10}) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000100)={r10, 0x1, 0x6, @remote}, 0x10) r11 = gettid() ptrace$cont(0x20, r11, 0x0, 0x800009) r12 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r12, 0x40086602, 0x400007) write$cgroup_int(r12, &(0x7f0000000200), 0x12) ioctl$TIOCCONS(r12, 0x541d) 06:01:22 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) connect$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x800, 0x0, @dev={0xfe, 0x80, [], 0x11}}, 0x1c) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r3) r4 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) write(0xffffffffffffffff, &(0x7f0000000180)="1c0000002200", 0x6) splice(r2, 0x0, r3, 0x0, 0x10000, 0x0) [ 2290.958957][ T9019] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 2290.972703][ T9019] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 2290.979341][ T9019] EXT4-fs (loop3): mount failed 06:01:22 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x0, 0x0, 0x0, 0x8000000}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) 06:01:22 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4200, r0, 0x2, 0x0) tkill(r0, 0x3c) tkill(r0, 0x2d) getpid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x6628, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000180)={0x0, 0x0}) ptrace$cont(0x18, r2, 0x3, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) write$cgroup_int(r3, &(0x7f0000000200), 0x12) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, &(0x7f0000000000)={{0x2b, @loopback, 0x4e21, 0x21, 'dh\x00', 0x1, 0x5, 0x400033}, {@empty, 0x4e22, 0x2, 0x4, 0xfffffffe, 0x7ff}}, 0x44) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x406, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) [ 2291.045619][ T9062] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=9062 comm=syz-executor.5 [ 2291.061373][ T9062] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=9062 comm=syz-executor.5 [ 2291.076058][ T9062] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=9062 comm=syz-executor.5 06:01:22 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000000008100000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2291.090613][ T9062] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=9062 comm=syz-executor.5 [ 2291.133628][ T9067] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 06:01:22 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x0, 0x0, 0x0, 0x64000000}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) [ 2291.154888][ T9062] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=9062 comm=syz-executor.5 [ 2291.171278][ T9067] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 06:01:22 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x8c000, 0x0) sendmsg$can_raw(r1, &(0x7f00000001c0)={&(0x7f0000000040), 0x10, &(0x7f0000000180)={&(0x7f0000000100)=@can={{0x2, 0x0, 0x1, 0x1}, 0x7, 0x2, 0x0, 0x0, "e982a2e7e0ddcd7d"}, 0x10}, 0x1, 0x0, 0x0, 0xc000}, 0x40101) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 06:01:22 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x40003c) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) write$cgroup_int(r1, &(0x7f0000000200), 0x12) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000000)=0xddcb) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r1, 0x28, &(0x7f0000000100)}, 0x10) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40086602, 0x400007) getegid() write$cgroup_int(r5, &(0x7f0000000200), 0x12) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r6) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x4, 0x0) [ 2291.200267][ T9067] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2291.218769][ T9062] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=9062 comm=syz-executor.5 06:01:22 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000000008200000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2291.264794][ T9067] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 2291.290468][ T9067] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 2291.292078][ T9062] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=9062 comm=syz-executor.5 06:01:22 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x0, 0x0, 0x0, 0xbf080000}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) [ 2291.336573][ T9062] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=9062 comm=syz-executor.5 [ 2291.352637][ T9067] EXT4-fs (loop3): mount failed 06:01:22 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe800000ffffdd8600000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2291.387038][ T9062] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=9062 comm=syz-executor.5 [ 2291.413376][ T9062] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=9062 comm=syz-executor.5 06:01:22 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$9p(r0, &(0x7f00000002c0)="a0", 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000180)) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x4, 0x0, &(0x7f0000000000)) [ 2291.440039][ T9067] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2291.459056][ T9067] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2291.473400][ T9067] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock 06:01:22 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3, &(0x7f00000008c0)=[{&(0x7f00000000c0)="8000000038040000197a0300e60100006c000124000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x3ff8000000000}, {&(0x7f00000005c0)="b4065f2ab9075ba253e109154559f88f062320246c5ae74af8e236a42c0cd0b73085bf4313acfd026684e3be45cf8f03379864cd059401666557f67127a057d2cb8d6521890c5cbfe5eaf821257dfacfaf5ef8b4c06e941318d3eec42a910d1420306249520086172e5e2f0c2308655d2a82735e431f158af85763d2d76375e78b343d563d952660c79ecfad7ccb16689bcb4fed9533483595eb30e2671cd545", 0xa0, 0x4}], 0x4803, 0x0) 06:01:22 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000000478800000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:01:22 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getpriority(0x0, r0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 06:01:22 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x0, 0x0, 0x0, 0xfefdffff}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) [ 2291.510910][ T9067] EXT4-fs: failed to create workqueue [ 2291.537907][ T9067] EXT4-fs (loop3): mount failed 06:01:22 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000000488800000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:01:22 executing program 5: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x15}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0, 0x15}, {0x0}, {&(0x7f0000000140)=""/54, 0x36}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) write$cgroup_int(r3, &(0x7f0000000200), 0x12) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r3, 0x8004e500, &(0x7f0000000200)=r4) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x6628, 0x0) ioctl$UI_SET_EVBIT(r5, 0x40045564, 0x12) 06:01:22 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x0, 0x0, 0x0, 0xfffffdfe}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) [ 2291.755269][ T9127] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2291.798750][ T9127] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2291.808670][ T9127] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2291.820108][ T9127] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 2291.834712][ T9127] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 2291.842295][ T9127] EXT4-fs (loop3): mount failed [ 2291.900032][ T9127] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2291.918859][ T9127] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2291.929495][ T9127] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2291.952357][ T9127] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 2291.966741][ T9127] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 2291.973692][ T9127] EXT4-fs (loop3): mount failed 06:01:25 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) write$cgroup_int(r3, &(0x7f0000000200), 0x12) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000000)=r3, 0x4) r4 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 06:01:25 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000000648800000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:01:25 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x0, 0x0, 0x0, 0x300000000000000}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) 06:01:25 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x0, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x654283, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@loopback}}, &(0x7f0000000440)=0xe8) lstat(&(0x7f0000000480)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_int(r4, &(0x7f0000000200), 0x12) fstat(r4, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0, 0x0}, &(0x7f0000000600)=0xc) mount$fuse(0x0, &(0x7f00000002c0)='./bus\x00', &(0x7f0000000300)='fuse\x00', 0x808000, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9024}}], [{@subj_role={'subj_role'}}, {@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '#'}}, {@smackfsdef={'smackfsdef', 0x3d, 'ppp0procWselinux*user&'}}, {@uid_lt={'uid<', r5}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@uid_gt={'uid>', r6}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}]}}) getpeername$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) syz_genetlink_get_family_id$nl80211(&(0x7f0000000000)='nl80211\x00') connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$UI_SET_SNDBIT(r7, 0x4004556a, 0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x208000, 0x0) accept(0xffffffffffffffff, &(0x7f0000000100)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, &(0x7f0000000080)=0x80) madvise(&(0x7f0000495000/0x400000)=nil, 0x404000, 0x15) madvise(&(0x7f00001d3000/0x4000)=nil, 0x4000, 0x13) 06:01:25 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3, &(0x7f00000008c0)=[{&(0x7f00000000c0)="8000000038040000197a0300e60100006c000025000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x3ff8000000000}, {&(0x7f00000005c0)="b4065f2ab9075ba253e109154559f88f062320246c5ae74af8e236a42c0cd0b73085bf4313acfd026684e3be45cf8f03379864cd059401666557f67127a057d2cb8d6521890c5cbfe5eaf821257dfacfaf5ef8b4c06e941318d3eec42a910d1420306249520086172e5e2f0c2308655d2a82735e431f158af85763d2d76375e78b343d563d952660c79ecfad7ccb16689bcb4fed9533483595eb30e2671cd545", 0xa0, 0x4}], 0x4803, 0x0) 06:01:25 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x6628, 0x0) r2 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000040)='NLBL_CALIPSO\x00') sendmsg$NLBL_CALIPSO_C_ADD(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x44, r2, 0x8, 0x70bd26, 0x25dfdbfd, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x2}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8}, @NLBL_CALIPSO_A_DOI={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x44}, 0x1, 0x0, 0x0, 0x805}, 0x840) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 06:01:25 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe800000ffffa88800000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:01:25 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x0, 0x0, 0x0, 0x400000000000000}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) [ 2294.360247][ T9154] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2294.449243][ T9154] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2294.472913][ T9154] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock 06:01:25 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x21, &(0x7f0000000000)) ptrace$setregs(0xd, r1, 0xfffffffffffffff8, &(0x7f0000000000)="aab84827eeed7e237ef112d79910b94610c0a1409a20c655e2867fa63da08efbc9a2f16388ef1ebce2fcfa73e4efabfb162a14f0a3fac47cca2abbc50ebb8247c4fb241a0a7ee79014983389c7d95f5f7e9d96283decbdbe816828690a") vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 06:01:25 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe800000ffffca8800000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:01:25 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x0, 0x0, 0x0, 0x800000000000000}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) [ 2294.498038][ T9154] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 2294.516534][ T9154] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 2294.524828][ T9154] EXT4-fs (loop3): mount failed [ 2294.577310][ T9154] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 06:01:25 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000000068900000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2294.635008][ T9154] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 06:01:25 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe800000ffffff8900000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2294.676468][ T9154] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2294.687398][ T9154] EXT4-fs: failed to create workqueue [ 2294.700863][ T9154] EXT4-fs (loop3): mount failed 06:01:25 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3, &(0x7f00000008c0)=[{&(0x7f00000000c0)="8000000038040000197a0300e60100006c00ec25000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x3ff8000000000}, {&(0x7f00000005c0)="b4065f2ab9075ba253e109154559f88f062320246c5ae74af8e236a42c0cd0b73085bf4313acfd026684e3be45cf8f03379864cd059401666557f67127a057d2cb8d6521890c5cbfe5eaf821257dfacfaf5ef8b4c06e941318d3eec42a910d1420306249520086172e5e2f0c2308655d2a82735e431f158af85763d2d76375e78b343d563d952660c79ecfad7ccb16689bcb4fed9533483595eb30e2671cd545", 0xa0, 0x4}], 0x4803, 0x0) 06:01:25 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x0, 0x0, 0x0, 0x6400000000000000}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) [ 2294.956493][ T9206] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2294.981133][ T9206] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2295.003425][ T9206] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2295.029068][ T9206] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 2295.053466][ T9206] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 2295.062878][ T9206] EXT4-fs (loop3): mount failed [ 2295.110253][ T9206] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2295.125483][ T9206] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2295.147968][ T9213] fuse: Bad value for 'fd' [ 2295.164504][ T9206] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2295.193482][ T9206] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 2295.218172][ T9206] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 2295.237537][ T9206] EXT4-fs (loop3): mount failed 06:01:26 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x80000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x48280) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xb, 0x12, r2, 0x0) syz_mount_image$f2fs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB='n']) mlock(&(0x7f0000005000/0x1000)=nil, 0x1000) mlock(&(0x7f0000001000/0x2000)=nil, 0x2000) mlock(&(0x7f0000003000/0x4000)=nil, 0x4000) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x1, 0x481}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000340)=[{&(0x7f0000000780)="83", 0x1}], 0x1) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda6, 0x4) sendto$inet(r0, &(0x7f0000000800)="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", 0x139, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860ac5cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x20c49a, 0x0, 0x27) 06:01:26 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) write$cgroup_int(r1, &(0x7f0000000200)=0x117f, 0xfffffd09) r2 = accept(r1, 0x0, &(0x7f0000000000)) ptrace$setopts(0x4206, r0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000180)={0x0, {0x2, 0x4e24, @local}, {0x2, 0x4e20, @remote}, {0x2, 0x4e22, @rand_addr=0x6d}, 0x20, 0x0, 0x0, 0x0, 0x7, 0x0, 0x4, 0x5, 0x8}) tkill(r0, 0x3c) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x6c, r5, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x2, {{0x4, 0x1, @in6={0xa, 0x0, 0x0, @local}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) sendmsg$TIPC_NL_LINK_SET(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x50}, 0xc, &(0x7f0000000880)={&(0x7f0000000500)={0x34c, r5, 0x400, 0x70bd2d, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x4}, @TIPC_NLA_LINK={0xa4, 0x4, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xd8f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fffffff}]}]}, @TIPC_NLA_LINK={0x14c, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xab48}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x401}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7ff}]}, @TIPC_NLA_LINK_PROP={0x54, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1ffe00}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x28}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x40}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xed0}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xbd4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}]}, @TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xd512}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x20}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffff4342}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3ec}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x2}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2}]}, @TIPC_NLA_BEARER={0xc8, 0x1, [@TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x40}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x44c}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4, 0xf, @local, 0x3}}, {0x14, 0x2, @in={0x2, 0x4e20, @remote}}}}, @TIPC_NLA_BEARER_NAME={0xf, 0x1, @l2={'ib', 0x3a, 'ip6tnl0\x00'}}, @TIPC_NLA_BEARER_NAME={0xe, 0x1, @l2={'eth', 0x3a, 'bond0\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xff}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x1, @remote}}, {0x14, 0x2, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}}}}]}, @TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x200}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x2e73}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_REF={0x8}]}, @TIPC_NLA_SOCK={0x28, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xabe8}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7fff}]}]}, 0x34c}, 0x1, 0x0, 0x0, 0x40000}, 0x8040000) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) write$cgroup_int(r3, &(0x7f0000000200), 0x12) connect(r3, &(0x7f0000000440)=@l2tp={0x2, 0x0, @local}, 0x80) ptrace$cont(0x18, r0, 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x40086602, 0x400007) write$cgroup_int(r6, &(0x7f0000000200), 0x12) setsockopt$IP_VS_SO_SET_DEL(r6, 0x0, 0x484, &(0x7f0000000900)={0x3a, @empty, 0x4e20, 0x0, 'sed\x00', 0x3, 0xffff, 0x49}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000440)) r7 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r2, &(0x7f0000000400)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="d0000000", @ANYRES16=r7, @ANYBLOB="000429bd7000fcdbdf250e0000000800050001000000080005000300000008000400fcffffff08000600ff00000064000100060004004e240000070006007272000008000800030000000800050003000000060001000200000008000800f3000000060001000200000014000300ac1414bb0000000000000000000000000600020049000000090006006e6f6e65000000001400010006000200060000000800080009000000140700000000000000766600080009004b00000008000500841300000800050041000000"], 0xd0}, 0x1, 0x0, 0x0, 0x8000}, 0x1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = fcntl$dupfd(r9, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) [ 2295.408536][ T22] kauditd_printk_skb: 392 callbacks suppressed [ 2295.408544][ T22] audit: type=1400 audit(1579672886.484:349790): avc: denied { watch } for pid=998 comm="udevd" path="/dev/loop3" dev="devtmpfs" ino=34085 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 [ 2295.450195][ T22] audit: type=1400 audit(1579672886.494:349791): avc: denied { map } for pid=9222 comm="syz-executor.5" path="/root/syzkaller-testdir942393922/syzkaller.OMpt4Z/75/bus" dev="sda1" ino=17916 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 2295.481100][ T22] audit: type=1400 audit(1579672886.504:349792): avc: denied { map } for pid=9224 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2295.504765][ T22] audit: type=1400 audit(1579672886.504:349793): avc: denied { map } for pid=9224 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2295.529031][ T22] audit: type=1400 audit(1579672886.504:349794): avc: denied { map } for pid=9224 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2295.571883][ T22] audit: type=1400 audit(1579672886.504:349795): avc: denied { map } for pid=9224 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2295.597899][ T22] audit: type=1400 audit(1579672886.514:349796): avc: denied { map } for pid=9224 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2295.622781][ T22] audit: type=1400 audit(1579672886.514:349797): avc: denied { map } for pid=9224 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2295.651844][ T22] audit: type=1400 audit(1579672886.514:349798): avc: denied { map } for pid=9224 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2295.680165][ T22] audit: type=1400 audit(1579672886.514:349799): avc: denied { map } for pid=9224 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 06:01:28 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x29, &(0x7f0000000000)) ptrace$setopts(0x4206, r1, 0x0, 0x21) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000180)="459939eed10b719a23fb337eefd3e558c85e8bf2fd9d8c3fc1bb836e2e8d11619a04f5cb0e83e4fec7b73b2e63790be4a9199e789141de") socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 06:01:28 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe800000008000a000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:01:28 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x0, 0x0, 0x0, 0xbf08000000000000}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) 06:01:28 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) write$cgroup_int(r1, &(0x7f0000000200), 0x12) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000000)={0x7, 0x31, 0xd, 0x16, 0x3, 0x3f, 0x6, 0x57, 0x1}) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f00000001c0)) tkill(r0, 0x3c) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) write$cgroup_int(r2, &(0x7f0000000200), 0x12) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) write$cgroup_int(r3, &(0x7f0000000200), 0x12) accept$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f0000000100)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000180)={'team0\x00', r4}) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 06:01:28 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3, &(0x7f00000008c0)=[{&(0x7f00000000c0)="8000000038040000197a0300e60100006c000026000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x3ff8000000000}, {&(0x7f00000005c0)="b4065f2ab9075ba253e109154559f88f062320246c5ae74af8e236a42c0cd0b73085bf4313acfd026684e3be45cf8f03379864cd059401666557f67127a057d2cb8d6521890c5cbfe5eaf821257dfacfaf5ef8b4c06e941318d3eec42a910d1420306249520086172e5e2f0c2308655d2a82735e431f158af85763d2d76375e78b343d563d952660c79ecfad7ccb16689bcb4fed9533483595eb30e2671cd545", 0xa0, 0x4}], 0x4803, 0x0) 06:01:28 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x2d80000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000640), 0x4) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}, 0x8010, 0x6, 0x80, 0x3, 0x1}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[], 0x133) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x91, 0x7}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={r1, 0x0, &(0x7f0000000240)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={r1, &(0x7f0000000080), &(0x7f0000000240)}, 0x20) dup2(r1, 0xffffffffffffffff) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/bus/input/handlers\x00', 0x0, 0x0) 06:01:28 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x18, r0, 0x0, 0xffffffffffffffff) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000000)=0xfffffffe) 06:01:28 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe80000088a8ffff00000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2297.501437][ T9239] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2297.531233][ T9239] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 06:01:28 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x0, 0x0, 0x0, 0xfefdffff00000000}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) [ 2297.549234][ T9239] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock 06:01:28 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) write$cgroup_int(r1, &(0x7f0000000200), 0x12) read$eventfd(r1, &(0x7f0000000040), 0x8) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) write$cgroup_int(r2, &(0x7f0000000200), 0x12) ioctl$BLKROTATIONAL(r2, 0x127e, &(0x7f0000000100)) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self\x00', 0x400200, 0x0) [ 2297.591542][ T9239] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature 06:01:28 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe80000088caffff00000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:01:28 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = gettid() rt_sigqueueinfo(r1, 0x21, &(0x7f0000000000)) wait4(r1, 0x0, 0x1, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) [ 2297.639375][ T9239] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 2297.659032][ T9239] EXT4-fs (loop3): mount failed 06:01:28 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe80000086ddffff00000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:01:28 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x6628, 0x0) sendmsg$NFQNL_MSG_CONFIG(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000040)={&(0x7f0000000180)={0x4c, 0x2, 0x3, 0x201, 0x0, 0x0, {0x1, 0x0, 0x2}, [@NFQA_CFG_FLAGS={0x8, 0x5, 0x1, 0x0, 0x27}, @NFQA_CFG_CMD={0x8, 0x1, {0x2, 0x0, 0x28}}, @NFQA_CFG_QUEUE_MAXLEN={0x8, 0x3, 0x1, 0x0, 0x7}, @NFQA_CFG_QUEUE_MAXLEN={0x8, 0x3, 0x1, 0x0, 0x1}, @NFQA_CFG_CMD={0x8, 0x1, {0x3, 0x0, 0x11}}, @NFQA_CFG_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFQA_CFG_QUEUE_MAXLEN={0x8, 0x3, 0x1, 0x0, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x24002805}, 0x20000084) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/avc/hash_stats\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r2, 0x6, 0x15, &(0x7f0000000240)=0x6, 0x4) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 06:01:28 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) [ 2297.741287][ T9239] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2297.758781][ T9239] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2297.769695][ T9239] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock 06:01:28 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) fcntl$setownex(r1, 0xf, &(0x7f0000000000)={0x2}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r3, 0x0, r2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_int(r4, &(0x7f0000000200), 0x12) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x800) ptrace$cont(0x20, r0, 0x0, 0x0) 06:01:28 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3, &(0x7f00000008c0)=[{&(0x7f00000000c0)="8000000038040000197a0300e60100006c002126000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x3ff8000000000}, {&(0x7f00000005c0)="b4065f2ab9075ba253e109154559f88f062320246c5ae74af8e236a42c0cd0b73085bf4313acfd026684e3be45cf8f03379864cd059401666557f67127a057d2cb8d6521890c5cbfe5eaf821257dfacfaf5ef8b4c06e941318d3eec42a910d1420306249520086172e5e2f0c2308655d2a82735e431f158af85763d2d76375e78b343d563d952660c79ecfad7ccb16689bcb4fed9533483595eb30e2671cd545", 0xa0, 0x4}], 0x4803, 0x0) [ 2297.798832][ T9239] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 2297.824486][ T9239] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 2297.834860][ T9239] EXT4-fs (loop3): mount failed [ 2298.009051][ T9292] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2298.019933][ T9292] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2298.030977][ T9292] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock 06:01:29 executing program 5: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) r1 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = socket$inet(0x2, 0x2, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) poll(&(0x7f0000000000)=[{}, {}, {}], 0x2, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r7}]]}}}]}, 0x38}}, 0x0) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) getsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f00000000c0), &(0x7f0000000140)=0x4) 06:01:29 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) creat(&(0x7f00000001c0)='./file0\x00', 0x90) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_int(r4, &(0x7f0000000200), 0x12) sendmsg$NFQNL_MSG_CONFIG(r4, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x14203080}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x40, 0x2, 0x3, 0x301, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CFG_FLAGS={0x8}, @NFQA_CFG_PARAMS={0x9, 0x2, {0x7, 0x1}}, @NFQA_CFG_MASK={0x8}, @NFQA_CFG_QUEUE_MAXLEN={0x8, 0x3, 0x1, 0x0, 0x8fd5}, @NFQA_CFG_MASK={0x8, 0x4, 0x1, 0x0, 0x6}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000044}, 0x0) ptrace$cont(0x20, r0, 0x0, 0x0) 06:01:29 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) 06:01:29 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe80000089ffffff00000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:01:29 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) write$cgroup_int(r1, &(0x7f0000000200), 0x12) getsockopt$TIPC_SOCK_RECVQ_DEPTH(r1, 0x10f, 0x84, &(0x7f0000000000), &(0x7f0000000040)=0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40086602, 0x400007) write$cgroup_int(r5, &(0x7f0000000200), 0x12) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000240)={{{@in=@broadcast, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@initdev}}, &(0x7f0000000100)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in=@local, @in=@dev={0xac, 0x14, 0x14, 0x2d}, 0x4e20, 0xd0e4, 0x4e20, 0x0, 0x2, 0x20, 0x20, 0xff, 0x0, r6}, {0x3, 0x9, 0x1, 0x5, 0x1, 0x0, 0x800, 0x2}, {0x5, 0x1000, 0x4, 0x863}, 0x9, 0x6e6bb7, 0x0, 0x1, 0x0, 0x3}, {{@in6=@dev={0xfe, 0x80, [], 0x2d}, 0x4d6, 0xff}, 0xa, @in=@loopback, 0x3505, 0x1, 0x3, 0x6, 0x4, 0x0, 0x4}}, 0xe8) 06:01:29 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3, &(0x7f00000008c0)=[{&(0x7f00000000c0)="8000000038040000197a0300e60100006c000027000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x3ff8000000000}, {&(0x7f00000005c0)="b4065f2ab9075ba253e109154559f88f062320246c5ae74af8e236a42c0cd0b73085bf4313acfd026684e3be45cf8f03379864cd059401666557f67127a057d2cb8d6521890c5cbfe5eaf821257dfacfaf5ef8b4c06e941318d3eec42a910d1420306249520086172e5e2f0c2308655d2a82735e431f158af85763d2d76375e78b343d563d952660c79ecfad7ccb16689bcb4fed9533483595eb30e2671cd545", 0xa0, 0x4}], 0x4803, 0x0) [ 2298.052929][ T9292] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 2298.068432][ T9292] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 2298.075364][ T9292] EXT4-fs (loop3): mount failed 06:01:29 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000000000000010000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:01:29 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) 06:01:29 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x6628, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)=0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) write$cgroup_int(r3, &(0x7f0000000200), 0x12) write$P9_RLOPEN(r3, &(0x7f0000000480)={0x18, 0xd, 0x2, {{0x1, 0x1, 0x4}}}, 0x18) ptrace$cont(0x20, r2, 0x8000, 0x7) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) sendmsg$NFNL_MSG_CTHELPER_NEW(r6, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x14, 0x0, 0x9, 0xc00, 0x0, 0x0, {0x5, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x1001}, 0x20008841) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) r7 = gettid() rt_sigqueueinfo(r7, 0x21, &(0x7f0000000400)) write$P9_RGETLOCK(r1, &(0x7f0000000240)={0x1f, 0x37, 0x1, {0x0, 0x3, 0x2, r7, 0x1, '%'}}, 0x1f) sendmsg$NFNL_MSG_CTHELPER_DEL(r6, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, 0x2, 0x9, 0x101, 0x0, 0x0, {0x0, 0x0, 0x3}, [@NFCTH_NAME={0x9, 0x1, 'syz1\x00'}, @NFCTH_QUEUE_NUM={0x8}, @NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0xc}]}, 0x30}, 0x1, 0x0, 0x0, 0x404}, 0x8000) set_thread_area(&(0x7f0000000200)={0x172, 0x20100000, 0xffffffffffffffff, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1}) [ 2298.290507][ T9315] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2298.305631][ T9315] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2298.319775][ T9315] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock 06:01:29 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe800000ffffffffa0008000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:01:29 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) [ 2298.416563][ T9315] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature 06:01:29 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000000000000000001000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:01:29 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) 06:01:29 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000000000000000002000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2298.496235][ T9315] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 2298.522837][ T9315] EXT4-fs (loop3): mount failed 06:01:29 executing program 1: clone(0x22206400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x6628, 0x0) r5 = socket$inet6(0xa, 0x803, 0x2) r6 = socket(0x10, 0x3, 0x0) r7 = socket(0x11, 0x800000003, 0x0) bind(r7, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r7, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)=@ipv6_newroute={0x24, 0x18, 0x1, 0x0, 0x0, {}, [@RTA_OIF={0x8, 0x4, r8}]}, 0x24}}, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x8936, &(0x7f0000000000)={@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], @local}, 0x0, r8}) setsockopt$inet_mreqn(r4, 0x0, 0x20, &(0x7f0000000000)={@multicast1, @multicast2, r8}, 0xc) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 06:01:29 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@known='system.advise\x00', &(0x7f0000000180)=""/98, 0x62) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) execveat(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) utimensat(r0, &(0x7f0000000440)='./file0/../file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) write$cgroup_int(r1, &(0x7f0000000200), 0x12) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f00000005c0)='nl80211\x00') sendmsg$NL80211_CMD_SET_BEACON(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000180)={0x1c, r3, 0x1, 0x70bd29}, 0xfffffffffffffe9d}}, 0x0) r4 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x6628, 0x0) ioctl$sock_SIOCDELRT(r5, 0x890c, &(0x7f00000004c0)={0x0, @llc={0x1a, 0x18, 0x40, 0x0, 0x2, 0x1}, @sco={0x1f, @none}, @phonet={0x23, 0x1f, 0x4e, 0x20}, 0x0, 0x0, 0x0, 0x0, 0x5f61, &(0x7f0000000480)='ip6gretap0\x00', 0x2}) write$cgroup_type(r4, &(0x7f0000002d00)='threaded\x00', 0xfffffd18) getsockopt$inet_mreqn(r4, 0x0, 0x24, &(0x7f0000000240)={@local, @remote, 0x0}, &(0x7f00000002c0)=0xc) sendmsg$NL80211_CMD_GET_MPATH(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x98ba3d6abd4602a0}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x60, r3, 0xc, 0x70bd27, 0x25dfdbfc, {}, [@NL80211_ATTR_MAC={0xa, 0x6, @local}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x2}}, @NL80211_ATTR_MAC={0xa, 0x6, @local}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r6}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @random="5df19fd754ee"}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x100ca005) r7 = socket$inet6(0xa, 0x803, 0x2) r8 = socket(0x10, 0x3, 0x0) r9 = socket(0x11, 0x800000003, 0x0) bind(r8, &(0x7f0000000080)=@generic={0x2c, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r9, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)=@ipv6_newroute={0x24, 0x18, 0x1, 0x0, 0x0, {}, [@RTA_OIF={0x8, 0x4, r10}]}, 0x24}}, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8936, &(0x7f0000000000)={@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], @local}, 0x0, r10}) sendmsg$NL80211_CMD_DEL_MPATH(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="28000000d4f81a4ffa6003db713a6de455e67f32f576250028ed18fc7ffe51ded8910e2443138bf391c1522e1cc541e2e5081d8a382bbde58852f2bd745d5438b565c3aeb4dd1036821b45e7393b49c6c71305135037b67f9bdff6d11cbc5815c0578fe0cedd6329d337fe33d55911c774d59e37e65815a74f18e4a2105bbe2a8e03c5cabc7f4626f961ac099b8f", @ANYRES16=r3, @ANYBLOB="04002cbd7000fddbdf25180000000a000600ffffffffffff000008000300", @ANYRES32=r10, @ANYBLOB], 0x28}}, 0x4040094) syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000400)='NLBL_UNLBL\x00') [ 2298.585857][ T9315] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2298.658350][ T9315] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2298.730911][ T9315] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2298.809803][ T9315] EXT4-fs: failed to create workqueue [ 2298.820671][ T9315] EXT4-fs (loop3): mount failed 06:01:32 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/vmallocinfo\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r1, &(0x7f00000001c0)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x20, 0x4, 0x8, 0x3, 0x0, 0x0, {0x1, 0x0, 0x3}, [@CTA_TIMEOUT_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x20}}, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 06:01:32 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) 06:01:32 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x5) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) fsetxattr$trusted_overlay_origin(r2, &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f0000000100)='y\x00', 0x2, 0x2) ptrace$cont(0x20, r0, 0x0, 0x0) 06:01:32 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3, &(0x7f00000008c0)=[{&(0x7f00000000c0)="8000000038040000197a0300e60100006c000429000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x3ff8000000000}, {&(0x7f00000005c0)="b4065f2ab9075ba253e109154559f88f062320246c5ae74af8e236a42c0cd0b73085bf4313acfd026684e3be45cf8f03379864cd059401666557f67127a057d2cb8d6521890c5cbfe5eaf821257dfacfaf5ef8b4c06e941318d3eec42a910d1420306249520086172e5e2f0c2308655d2a82735e431f158af85763d2d76375e78b343d563d952660c79ecfad7ccb16689bcb4fed9533483595eb30e2671cd545", 0xa0, 0x4}], 0x4803, 0x0) 06:01:32 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) open(&(0x7f000000fffa)='./bus\x00', 0x103042, 0x0) r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYPTR], 0x8) r1 = socket$inet6(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) close(r1) r5 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x6628, 0x0) dup2(r5, r6) r7 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) sendfile(r1, r7, 0x0, 0x8000fffffffe) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 06:01:32 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000000000000000004000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:01:32 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8bf}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) [ 2301.213940][ T22] kauditd_printk_skb: 314 callbacks suppressed [ 2301.213950][ T22] audit: type=1400 audit(1579672892.284:350114): avc: denied { map } for pid=9382 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 06:01:32 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000000000000000006000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2301.312971][ T9380] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2301.354321][ T22] audit: type=1400 audit(1579672892.284:350115): avc: denied { map } for pid=9382 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2301.397425][ T9380] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2301.408069][ T22] audit: type=1400 audit(1579672892.284:350116): avc: denied { map } for pid=9382 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2301.453732][ T22] audit: type=1400 audit(1579672892.284:350117): avc: denied { map } for pid=9382 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2301.490236][ T9380] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2301.505744][ T22] audit: type=1400 audit(1579672892.284:350118): avc: denied { map } for pid=9382 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 06:01:32 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000000000000000008000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:01:32 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='fdinfo/3\x00') ioctl$GIO_FONT(r1, 0x4b60, &(0x7f00000001c0)=""/148) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f0000000100)='y\x00', 0x2, 0x3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) [ 2301.551909][ T22] audit: type=1400 audit(1579672892.314:350119): avc: denied { map } for pid=9382 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2301.606782][ T22] audit: type=1400 audit(1579672892.314:350120): avc: denied { map } for pid=9382 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2301.643736][ T9380] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature 06:01:32 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6400}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) [ 2301.659146][ T22] audit: type=1400 audit(1579672892.314:350121): avc: denied { map } for pid=9382 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2301.710737][ T22] audit: type=1400 audit(1579672892.314:350122): avc: denied { map } for pid=9382 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 06:01:32 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000)={0xffffff00, 0x4000000}, 0xc) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) [ 2301.757809][ T9380] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 2301.764500][ T22] audit: type=1400 audit(1579672892.314:350123): avc: denied { map } for pid=9382 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2301.817204][ T9380] EXT4-fs (loop3): mount failed 06:01:32 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000000000000000608000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:01:33 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) r1 = pidfd_open(r0, 0x0) readahead(r1, 0x5a, 0x1) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) r2 = gettid() rt_sigqueueinfo(r2, 0x21, &(0x7f0000000000)) getpriority(0x2, r2) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 06:01:33 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x1, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r1, &(0x7f0000000400)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x19c, r2, 0x8, 0x70bd28, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DAEMON={0x68, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @rand_addr="9a45eb71fb113cfe53e8f090f9688594"}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0xb}}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x5}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0xf188}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x7}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @remote}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e22}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_DAEMON={0x50, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x1b}}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x8}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0_to_bridge\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}]}, @IPVS_CMD_ATTR_SERVICE={0x58, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x30, 0x26}}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'rr\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0xe6}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x1d}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x80}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x1}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}]}, @IPVS_CMD_ATTR_DAEMON={0x2c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}]}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x6, 0x3, 0x4}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x6}]}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x2}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e22}]}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e24}]}, @IPVS_CMD_ATTR_SERVICE={0x10, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x0, 0x3}}]}]}, 0x19c}, 0x1, 0x0, 0x0, 0x4000000}, 0x4800) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) [ 2302.039981][ T9380] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2302.091421][ T9380] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2302.152131][ T9380] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2302.173853][ T9380] EXT4-fs: failed to create workqueue [ 2302.187226][ T9380] EXT4-fs (loop3): mount failed 06:01:33 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3, &(0x7f00000008c0)=[{&(0x7f00000000c0)="8000000038040000197a0300e60100006c00042a000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x3ff8000000000}, {&(0x7f00000005c0)="b4065f2ab9075ba253e109154559f88f062320246c5ae74af8e236a42c0cd0b73085bf4313acfd026684e3be45cf8f03379864cd059401666557f67127a057d2cb8d6521890c5cbfe5eaf821257dfacfaf5ef8b4c06e941318d3eec42a910d1420306249520086172e5e2f0c2308655d2a82735e431f158af85763d2d76375e78b343d563d952660c79ecfad7ccb16689bcb4fed9533483595eb30e2671cd545", 0xa0, 0x4}], 0x4803, 0x0) [ 2302.375617][ T9435] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2302.385842][ T9435] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2302.395810][ T9435] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2302.409985][ T9435] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 2302.439622][ T9435] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 2302.448530][ T9435] EXT4-fs (loop3): mount failed [ 2302.570513][ T9435] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2302.585997][ T9435] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2302.608695][ T9435] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock 06:01:33 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f0000000300)=0x2000000000005ea, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fb, &(0x7f0000000540)={0x2, 0x4e23, @local}, 0x10) r1 = socket(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x6846de70341668c9) recvmsg(r0, &(0x7f00000003c0)={0x0, 0x5, &(0x7f0000000380)=[{&(0x7f0000000400)=""/199, 0xfffffe80}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000340)=""/42, 0x2a}], 0x2, 0x0, 0x181, 0x200f09}, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0xf43185f1) 06:01:33 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x21, &(0x7f0000000000)) ptrace$peeksig(0x4209, r1, &(0x7f0000000000)={0x80000001, 0x1, 0x9}, &(0x7f0000000400)=[{}, {}, {}, {}, {}, {}, {}, {}, {}]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) openat$pidfd(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self\x00', 0x121200, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r5, 0x4200, 0x0) r6 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f0000000000), 0x10000}]) r8 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r5, r8, 0x0, 0x8400ffff0010) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0xc) r10 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r11) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='overlay\x00', 0x2804, &(0x7f0000000240)={[{@metacopy_on='metacopy=on'}, {@nfs_export_off='nfs_export=off'}, {@xino_auto='xino=auto'}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@xino_auto='xino=auto'}], [{@uid_eq={'uid', 0x3d, r9}}, {@dont_measure='dont_measure'}, {@seclabel='seclabel'}, {@appraise_type='appraise_type=imasig'}, {@hash='hash'}, {@fowner_lt={'fowner<', r11}}]}) 06:01:33 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf08}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) 06:01:33 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe800000000000000000000d000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:01:33 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000000340)=[{{&(0x7f0000000180)={0xa, 0x4e20, 0x0, @local, 0x800}, 0x1c, &(0x7f0000001400)=[{&(0x7f0000000400)="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", 0x1000}, {&(0x7f00000001c0)="a7a4223c1bc3759e21525ab33e2966df46c1b347bc381ccdc5b89f1d0ffc9706199bd685c6f0a7453bb5", 0x2a}, {&(0x7f0000000200)="576ac5c98360d612c172ed185d943ef30c878495efb43c9b1f571d5e7922ad1486eae8c9516f25cbaef3fd211f07b78e5fd2bdb9360708bfbe792077bee7c0e5d9fec0d22c95f9c4df214de812d85c135c1264", 0x53}, {&(0x7f0000000280)="c02a62e6cefbd3d59f4b56687ea71c7ead419bcfc51480", 0x17}, {&(0x7f00000002c0)="6461ec0e1afe343769256dafb98837ad5a0d36a913ffd756be845a2dc6c94e624e86df93c65f23766e78c354bfc98d63482432fa1c5ff0d39cd9b6c737800f5933944c81928065e31eb97bc9990721c860cecc1d576d1b5f30f2f8dd0578df2ab9c64eedc8dafc6d8341c95ead6bc3e073b3320134681d4db9e446acc289a0", 0x7f}], 0x5, &(0x7f0000001480)=[@dstopts={{0x38, 0x29, 0x37, {0x1, 0x3, [], [@hao={0xc9, 0x10, @mcast1}, @ra={0x5, 0x2, 0xfff9}, @padn={0x1, 0x1, [0x0]}, @pad1]}}}, @dontfrag={{0x14, 0x29, 0x3e, 0x3}}, @rthdr_2292={{0x58, 0x29, 0x39, {0x2f, 0x8, 0x0, 0x42, 0x0, [@mcast1, @empty, @rand_addr="e841b5c0300a01554caac466233c1299", @mcast2]}}}], 0xa8}}], 0x1, 0x40010) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = gettid() rt_sigqueueinfo(r2, 0x21, &(0x7f0000000000)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000000100)=0xc) ptrace$setregs(0xd, r3, 0x6, &(0x7f0000000000)="2f254650770f0f158b1b85eeeafa4b3c8487ba24377f") socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ptrace$cont(0x20, r1, 0x0, 0x0) [ 2302.632160][ T9435] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature 06:01:33 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe800000000000000000001f000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2302.675706][ T9435] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 2302.711023][ T9435] EXT4-fs (loop3): mount failed 06:01:33 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3, &(0x7f00000008c0)=[{&(0x7f00000000c0)="8000000038040000197a0300e60100006c00042b000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x3ff8000000000}, {&(0x7f00000005c0)="b4065f2ab9075ba253e109154559f88f062320246c5ae74af8e236a42c0cd0b73085bf4313acfd026684e3be45cf8f03379864cd059401666557f67127a057d2cb8d6521890c5cbfe5eaf821257dfacfaf5ef8b4c06e941318d3eec42a910d1420306249520086172e5e2f0c2308655d2a82735e431f158af85763d2d76375e78b343d563d952660c79ecfad7ccb16689bcb4fed9533483595eb30e2671cd545", 0xa0, 0x4}], 0x4803, 0x0) 06:01:33 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) 06:01:33 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() getpid() r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000080)={0x10}, 0x10) r3 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000240)="617377ec1ece5834f9a6927b9bb369715af2bbd4fa4eb759c0bfaf8c", 0x1c, 0xfffffffffffffffc) r4 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r4, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r5 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r4, r5, r4}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, 0x0, &(0x7f0000000340)=@keyring={'key_or_keyring:', r5}) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x40000000011, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) 06:01:33 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = socket$inet6(0xa, 0x803, 0x2) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000340)={{{@in=@dev, @in=@broadcast, 0xfffe, 0x400, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x80000000000001}, {{@in6=@loopback, 0x0, 0x32}, 0x0, @in=@empty}}, 0xe8) sendmmsg(r1, &(0x7f0000008440)=[{{0x0, 0x536, 0x0}}], 0x400000000000107, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r4 = gettid() rt_sigqueueinfo(r4, 0x21, &(0x7f0000000000)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000100)='system\x00'}, 0x30) tkill(r5, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCGETS(r6, 0x5401, &(0x7f0000000040)) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 06:01:34 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000000000000000028000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:01:34 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) [ 2302.949450][ T9471] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 06:01:34 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000000000000000029000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2303.026527][ T9471] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2303.119054][ T9471] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2303.152375][ T9471] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 2303.169985][ T9471] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 2303.178808][ T9471] EXT4-fs (loop3): mount failed [ 2303.234185][ T9471] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2303.245652][ T9471] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2303.255673][ T9471] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2303.266458][ T9471] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 2303.281123][ T9471] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 2303.304702][ T9471] EXT4-fs (loop3): mount failed 06:01:35 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe800000000000000000002b000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:01:35 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) 06:01:35 executing program 1: r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x21, &(0x7f0000000000)) ptrace$setopts(0x4206, r0, 0x8000000000000000, 0x100000) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x202000, 0x0) connect$unix(r2, &(0x7f0000000180)=@abs={0x1, 0x0, 0x4e21}, 0x6e) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x40086602, 0x400007) write$cgroup_int(r6, &(0x7f0000000200), 0x12) write$selinux_create(r6, &(0x7f0000000200)=@access={'system_u:object_r:crond_var_run_t:s0', 0x20, '/sbin/dhclient', 0x20, 0x2}, 0x49) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ptrace$cont(0x9, r0, 0xb44, 0x0) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000040)={0x14, 0x67, 0x2, {0x80, 0x4, 0x6}}, 0x14) 06:01:35 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) add_key$user(&(0x7f0000000180)='user\x00', 0x0, &(0x7f0000000240), 0x0, 0xfffffffffffffffc) r4 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r4, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r5 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r4, r5, r4}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x40000000011, 0xffffffffffffffff, 0x0) 06:01:35 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3, &(0x7f00000008c0)=[{&(0x7f00000000c0)="8000000038040000197a0300e60100006c00042c000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x3ff8000000000}, {&(0x7f00000005c0)="b4065f2ab9075ba253e109154559f88f062320246c5ae74af8e236a42c0cd0b73085bf4313acfd026684e3be45cf8f03379864cd059401666557f67127a057d2cb8d6521890c5cbfe5eaf821257dfacfaf5ef8b4c06e941318d3eec42a910d1420306249520086172e5e2f0c2308655d2a82735e431f158af85763d2d76375e78b343d563d952660c79ecfad7ccb16689bcb4fed9533483595eb30e2671cd545", 0xa0, 0x4}], 0x4803, 0x0) 06:01:35 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe800000000000000000002c000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2304.594445][ T9512] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2304.606291][ T9512] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2304.627319][ T9512] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock 06:01:35 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64000000}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) [ 2304.702026][ T9512] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 2304.758982][ T9512] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 2304.801316][ T9512] EXT4-fs (loop3): mount failed 06:01:35 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe800000000000000000002f000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2304.913721][ T9512] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2304.995008][ T9512] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2305.006793][ T9512] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2305.017972][ T9512] EXT4-fs: failed to create workqueue [ 2305.024808][ T9512] EXT4-fs (loop3): mount failed 06:01:37 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 06:01:37 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) add_key$user(&(0x7f0000000180)='user\x00', 0x0, &(0x7f0000000240), 0x0, 0xfffffffffffffffc) r4 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r4, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r5 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r4, r5, r4}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x40000000011, 0xffffffffffffffff, 0x0) 06:01:37 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf080000}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) 06:01:37 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe800000000000000000003c000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:01:37 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3, &(0x7f00000008c0)=[{&(0x7f00000000c0)="8000000038040000197a0300e60100006c00042d000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x3ff8000000000}, {&(0x7f00000005c0)="b4065f2ab9075ba253e109154559f88f062320246c5ae74af8e236a42c0cd0b73085bf4313acfd026684e3be45cf8f03379864cd059401666557f67127a057d2cb8d6521890c5cbfe5eaf821257dfacfaf5ef8b4c06e941318d3eec42a910d1420306249520086172e5e2f0c2308655d2a82735e431f158af85763d2d76375e78b343d563d952660c79ecfad7ccb16689bcb4fed9533483595eb30e2671cd545", 0xa0, 0x4}], 0x4803, 0x0) 06:01:37 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x1f, r0, 0x3, 0xfffffffffffffffe) 06:01:37 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000000000000000040000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2306.132517][ T9542] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2306.156359][ T9542] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2306.170749][ T9542] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock 06:01:37 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000000000000000543000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2306.210140][ T9542] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature 06:01:37 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x10000, 0x0) ioctl$UI_END_FF_ERASE(r1, 0x400c55cb, &(0x7f0000000040)={0xa, 0x400, 0x1}) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) write$cgroup_int(r2, &(0x7f0000000200), 0x12) fcntl$setsig(r2, 0xa, 0x37) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x6628, 0x0) ioctl$TCSETSF(r3, 0x5404, &(0x7f0000000100)={0x8f4, 0x81, 0x80, 0x6820efca, 0x5, "17fc3bbb22fd874e4d9093a9a292ea61b220a3"}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 06:01:37 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfefdffff}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) [ 2306.275943][ T9542] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 2306.282788][ T22] kauditd_printk_skb: 328 callbacks suppressed [ 2306.289449][ T22] audit: type=1400 audit(1579672897.344:350452): avc: denied { create } for pid=9538 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 06:01:37 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x6628, 0x0) r2 = socket$inet6(0xa, 0x803, 0x2) r3 = socket(0x10, 0x3, 0x0) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r4, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="240000001800010000000000000000000a000000000000000000000008000400", @ANYRES32=r5, @ANYBLOB=' '], 0x24}}, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8936, &(0x7f0000000000)={@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], @local}, 0x0, r5}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x4, [], r5, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ptrace$cont(0x18, r0, 0x0, 0x0) r9 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(r9, 0x0, 0x488, &(0x7f0000000000)={{0x84, @broadcast, 0x4e24, 0x0, 'lblcr\x00', 0x24, 0x401, 0x37}, {@multicast1, 0x4e23, 0x10000, 0xf8, 0x0, 0x1}}, 0x44) [ 2306.341854][ T9542] EXT4-fs (loop3): mount failed [ 2306.350103][ T22] audit: type=1400 audit(1579672897.364:350453): avc: denied { watch } for pid=998 comm="udevd" path="/dev/loop3" dev="devtmpfs" ino=34085 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 06:01:37 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000000000000000074000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2306.453829][ T22] audit: type=1400 audit(1579672897.524:350454): avc: denied { map } for pid=9568 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2306.503015][ T22] audit: type=1400 audit(1579672897.524:350455): avc: denied { map } for pid=9568 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2306.533398][ T9542] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2306.547516][ T22] audit: type=1400 audit(1579672897.524:350456): avc: denied { map } for pid=9568 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2306.591157][ T9542] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 06:01:37 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfe}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) [ 2306.601949][ T22] audit: type=1400 audit(1579672897.524:350457): avc: denied { map } for pid=9568 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2306.648072][ T22] audit: type=1400 audit(1579672897.524:350458): avc: denied { map } for pid=9568 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2306.671112][ T9542] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2306.692586][ T22] audit: type=1400 audit(1579672897.534:350459): avc: denied { map } for pid=9568 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2306.718322][ T9542] EXT4-fs: failed to create workqueue [ 2306.738537][ T22] audit: type=1400 audit(1579672897.534:350460): avc: denied { map } for pid=9568 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2306.739083][ T9542] EXT4-fs (loop3): mount failed [ 2306.787191][ T22] audit: type=1400 audit(1579672897.534:350461): avc: denied { map } for pid=9568 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 06:01:38 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) add_key$user(&(0x7f0000000180)='user\x00', 0x0, &(0x7f0000000240), 0x0, 0xfffffffffffffffc) r4 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r4, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r5 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r4, r5, r4}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x40000000011, 0xffffffffffffffff, 0x0) 06:01:38 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000000000000000e80000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:01:38 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3, &(0x7f00000008c0)=[{&(0x7f00000000c0)="8000000038040000197a0300e60100006c00002e000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x3ff8000000000}, {&(0x7f00000005c0)="b4065f2ab9075ba253e109154559f88f062320246c5ae74af8e236a42c0cd0b73085bf4313acfd026684e3be45cf8f03379864cd059401666557f67127a057d2cb8d6521890c5cbfe5eaf821257dfacfaf5ef8b4c06e941318d3eec42a910d1420306249520086172e5e2f0c2308655d2a82735e431f158af85763d2d76375e78b343d563d952660c79ecfad7ccb16689bcb4fed9533483595eb30e2671cd545", 0xa0, 0x4}], 0x4803, 0x0) 06:01:38 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 06:01:38 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) 06:01:38 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0xe83, &(0x7f0000000000)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 06:01:38 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) set_thread_area(&(0x7f0000000000)={0x54, 0x20100000, 0x4000, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1}) 06:01:38 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000000000000003580000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2307.003153][ T9598] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2307.030846][ T9598] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 06:01:38 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) 06:01:38 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000000000000000081000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2307.100376][ T9598] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2307.122423][ T9598] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 2307.139116][ T9598] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 2307.155555][ T9598] EXT4-fs (loop3): mount failed 06:01:38 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000000000000000082000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:01:38 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) [ 2307.298891][ T9598] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2307.317463][ T9598] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2307.328773][ T9598] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2307.378370][ T9598] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 2307.394868][ T9598] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 2307.402814][ T9598] EXT4-fs (loop3): mount failed 06:01:38 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000000)=[{&(0x7f0000000800)="580000001400adfd8a987e40da2e6a262b", 0x11}], 0x1) close(r2) socket$netlink(0x10, 0x3, 0x4) openat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) r3 = socket(0x10, 0x80002, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") write$binfmt_misc(r1, &(0x7f0000000180)=ANY=[], 0xff16) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 06:01:38 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3, &(0x7f00000008c0)=[{&(0x7f00000000c0)="8000000038040000197a0300e60100006c00042e000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x3ff8000000000}, {&(0x7f00000005c0)="b4065f2ab9075ba253e109154559f88f062320246c5ae74af8e236a42c0cd0b73085bf4313acfd026684e3be45cf8f03379864cd059401666557f67127a057d2cb8d6521890c5cbfe5eaf821257dfacfaf5ef8b4c06e941318d3eec42a910d1420306249520086172e5e2f0c2308655d2a82735e431f158af85763d2d76375e78b343d563d952660c79ecfad7ccb16689bcb4fed9533483595eb30e2671cd545", 0xa0, 0x4}], 0x4803, 0x0) 06:01:38 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0xc06855c8, &(0x7f0000000000)={0x6, 0x3, {0x57, 0x20, 0x6, {0x65, 0x8}, {0x5}, @cond=[{0x3ff, 0x4f, 0x1, 0x4, 0x81}, {0x9, 0xdab1, 0x9, 0x9, 0x5, 0x3}]}, {0x52, 0x7ff, 0x8, {0x400, 0x1}, {0xb707, 0x7}, @rumble={0xfdb, 0x9}}}) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x6628, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000200)={0x0, @dev, @remote}, &(0x7f0000000240)=0xc) r2 = socket$inet6(0xa, 0x803, 0x2) r3 = socket(0x10, 0x3, 0x0) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r4, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)=@ipv6_newroute={0x24, 0x18, 0x1, 0x0, 0x0, {}, [@RTA_OIF={0x8, 0x4, r5}]}, 0x24}}, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8936, &(0x7f0000000000)={@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], @local}, 0x0, r5}) r6 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/enforce\x00', 0x2082, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xe, 0x0, 0x0, 0x0, 0x53b, 0xf4108c00fced674c, 0x0, 0x6c08aff179e463cd, 0x0, [], r5, 0x10, r6, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffcb3}, 0xfffffffffffffe17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 06:01:38 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) write$cgroup_int(r1, &(0x7f0000000200), 0x12) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_all\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x6628, 0x0) ioctl$TUNSETVNETBE(r2, 0x400454de, &(0x7f0000000000)) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$NS_GET_USERNS(r5, 0xb701, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x2) ptrace$cont(0x20, r0, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_BUFFERS(r2, 0x1, 0x0, 0x0) ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f0000000040)) 06:01:38 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe80000000000000ffffdd86000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:01:38 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6400000000000000}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) 06:01:39 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf08000000000000}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) [ 2307.959291][ T9648] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 06:01:39 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000000000000004788000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2308.003851][ T9665] selinux_nlmsg_perm: 20 callbacks suppressed [ 2308.003861][ T9665] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=9665 comm=syz-executor.5 [ 2308.022623][ T9648] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 06:01:39 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ttyS3\x00', 0x10300, 0x0) vmsplice(r1, &(0x7f0000000100)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceac47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x2, 0x1) ptrace$setopts(0x4200, r0, 0x0, 0x12) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xf, r0, 0x7, &(0x7f0000000180)="3132d934acf67f06ff22fb3a676c3188bd7c9b72df0024d0bf96d268a1c5562bf42009967a4f088065b2abe73ec7b36a89900e5eba84babbc9839266bbbc47347b6148bdbfeb44d3e1999ecbd180a132a0ece97d75f33349b730551c45603a9db2622da6b1fc6da8aaecf5163ea9297c7ff7fe2d79efd30c13a5aedf5a4164388f95f320a1") link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x511042, 0x0) ioctl$LOOP_GET_STATUS(r5, 0x4c03, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x200, 0x0) 06:01:39 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x0) [ 2308.068260][ T9665] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=9665 comm=syz-executor.5 [ 2308.089746][ T9665] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=9665 comm=syz-executor.5 [ 2308.101258][ T9648] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock 06:01:39 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000000000000004888000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2308.119587][ T9665] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=9665 comm=syz-executor.5 [ 2308.135043][ T9648] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 2308.148543][ T9665] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=9665 comm=syz-executor.5 06:01:39 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfefdffff00000000}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) [ 2308.165500][ T9648] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 2308.178640][ T9648] EXT4-fs (loop3): mount failed [ 2308.185700][ T9665] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=9665 comm=syz-executor.5 [ 2308.205460][ T9665] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=9665 comm=syz-executor.5 [ 2308.223125][ T9665] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=9665 comm=syz-executor.5 [ 2308.257927][ T9648] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2308.275781][ T9648] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2308.276112][ T9665] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=9665 comm=syz-executor.5 [ 2308.290600][ T9648] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2308.299310][ T9665] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=9665 comm=syz-executor.5 06:01:39 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x5}]}}}]}, 0x3c}}, 0x0) 06:01:39 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3, &(0x7f00000008c0)=[{&(0x7f00000000c0)="8000000038040000197a0300e60100006c00042f000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x3ff8000000000}, {&(0x7f00000005c0)="b4065f2ab9075ba253e109154559f88f062320246c5ae74af8e236a42c0cd0b73085bf4313acfd026684e3be45cf8f03379864cd059401666557f67127a057d2cb8d6521890c5cbfe5eaf821257dfacfaf5ef8b4c06e941318d3eec42a910d1420306249520086172e5e2f0c2308655d2a82735e431f158af85763d2d76375e78b343d563d952660c79ecfad7ccb16689bcb4fed9533483595eb30e2671cd545", 0xa0, 0x4}], 0x4803, 0x0) [ 2308.339644][ T9648] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 2308.354000][ T9648] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 2308.364082][ T9648] EXT4-fs (loop3): mount failed 06:01:39 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) 06:01:39 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000000000000006488000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:01:39 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x6628, 0x0) signalfd(r3, &(0x7f0000000000)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 06:01:39 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x21, &(0x7f0000000000)) tkill(r1, 0x3e) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) ioctl$sock_SIOCSIFBR(r2, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000180)=""/195, 0x100}) 06:01:39 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe80000000000000ffffa888000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2308.518664][ T9707] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 06:01:39 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) [ 2308.563091][ T9707] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2308.581752][ T9707] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2308.592488][ T9707] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature 06:01:39 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$UI_SET_SWBIT(r0, 0x4004556d, 0x6) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x6628, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ptrace$cont(0x20, r1, 0x0, 0x0) [ 2308.608829][ T9707] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 2308.622517][ T9707] EXT4-fs (loop3): mount failed 06:01:39 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3, &(0x7f00000008c0)=[{&(0x7f00000000c0)="8000000038040000197a0300e60100006c000430000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x3ff8000000000}, {&(0x7f00000005c0)="b4065f2ab9075ba253e109154559f88f062320246c5ae74af8e236a42c0cd0b73085bf4313acfd026684e3be45cf8f03379864cd059401666557f67127a057d2cb8d6521890c5cbfe5eaf821257dfacfaf5ef8b4c06e941318d3eec42a910d1420306249520086172e5e2f0c2308655d2a82735e431f158af85763d2d76375e78b343d563d952660c79ecfad7ccb16689bcb4fed9533483595eb30e2671cd545", 0xa0, 0x4}], 0x4803, 0x0) 06:01:39 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) 06:01:39 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) 06:01:39 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe80000000000000ffffca88000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2308.767601][ T9727] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2308.787970][ T9727] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 06:01:39 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000000000000000689000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2308.826467][ T9727] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock 06:01:39 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x21, &(0x7f0000000000)) sched_setattr(r1, &(0x7f0000000100)={0x38, 0x6, 0xc, 0xfa, 0x10000, 0x91a6, 0x1, 0x4, 0x8000, 0x8}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x6628, 0x0) ioctl$TIOCGDEV(r5, 0x80045432, &(0x7f0000000000)) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x40086602, 0x400007) write$cgroup_int(r6, &(0x7f0000000200), 0x12) r7 = gettid() rt_sigqueueinfo(r7, 0x21, &(0x7f0000000000)) r8 = gettid() rt_sigqueueinfo(r8, 0x21, &(0x7f0000000000)) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r9, 0x6628, 0x0) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x61, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"/783], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x3}, 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r10, 0x341, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x6) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)={r11}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r8, r9, 0x0, 0xe, &(0x7f0000000240)='memory.events\x00', r11}, 0x30) openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x10080, 0x0) r12 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r12, 0x6628, 0x0) r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r13, 0x40086602, 0x400007) write$cgroup_int(r13, &(0x7f0000000200), 0x12) r14 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r14, 0x6628, 0x0) r15 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r15, 0x6628, 0x0) r16 = fcntl$getown(r15, 0x9) r17 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r17, 0x40086602, 0x400007) write$cgroup_int(r17, &(0x7f0000000200), 0x12) ioctl$sock_SIOCSPGRP(r5, 0x8902, &(0x7f0000000200)=r16) ptrace$cont(0x20, r0, 0x0, 0x0) r18 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r18, 0x6628, 0x0) r19 = gettid() rt_sigqueueinfo(r19, 0x21, &(0x7f0000000000)) ioctl$sock_FIOSETOWN(r18, 0x8901, &(0x7f0000000040)=r19) 06:01:40 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) [ 2308.887867][ T9727] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature 06:01:40 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x12) ioctl$PPPIOCSMAXCID(0xffffffffffffffff, 0x40047451, &(0x7f0000000000)=0xffffffff) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 06:01:40 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x6628, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) write$cgroup_int(r3, &(0x7f0000000200), 0x12) r4 = fcntl$dupfd(r3, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 06:01:40 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x4005ef3) fallocate(r1, 0x20, 0x0, 0x100000000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(r0, 0x8, 0x0, 0x100000000) [ 2308.946909][ T9727] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 2308.973366][ T9727] EXT4-fs (loop3): mount failed 06:01:40 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe80000000000000ffffff89000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2309.059176][ T9727] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2309.092962][ T9727] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 06:01:40 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) [ 2309.127414][ T9727] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2309.137950][ T9727] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 2309.153608][ T9727] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 2309.164208][ T9727] EXT4-fs (loop3): mount failed 06:01:40 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3, &(0x7f00000008c0)=[{&(0x7f00000000c0)="8000000038040000197a0300e60100006c000431000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x3ff8000000000}, {&(0x7f00000005c0)="b4065f2ab9075ba253e109154559f88f062320246c5ae74af8e236a42c0cd0b73085bf4313acfd026684e3be45cf8f03379864cd059401666557f67127a057d2cb8d6521890c5cbfe5eaf821257dfacfaf5ef8b4c06e941318d3eec42a910d1420306249520086172e5e2f0c2308655d2a82735e431f158af85763d2d76375e78b343d563d952660c79ecfad7ccb16689bcb4fed9533483595eb30e2671cd545", 0xa0, 0x4}], 0x4803, 0x0) 06:01:40 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe80000000000000ffffffff000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:01:40 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe800000008000a0ffffffff000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:01:40 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@ipv6_newroute={0x30, 0x18, 0x601, 0x0, 0x0, {}, [@RTA_MULTIPATH={0xc}, @RTA_PRIORITY={0x8, 0x6, 0x1ff}]}, 0x30}}, 0x0) 06:01:40 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) 06:01:40 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000002000000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:01:40 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000004000000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2309.422484][ T9789] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2309.470268][ T9789] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2309.498359][ T9789] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2309.514053][ T9789] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 2309.542419][ T9789] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 2309.551365][ T9789] EXT4-fs (loop3): mount failed 06:01:43 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@ipv6_newroute={0x30, 0x18, 0x601, 0x0, 0x0, {}, [@RTA_MULTIPATH={0xc}, @RTA_PRIORITY={0x8, 0x6, 0x1ff}]}, 0x30}}, 0x0) 06:01:43 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000006000000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:01:43 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x6628, 0x0) ioctl$KDFONTOP_SET_DEF(r1, 0x4b72, &(0x7f0000000000)={0x2, 0x0, 0x5, 0x4, 0x1e6, &(0x7f0000000400)="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"}) vmsplice(0xffffffffffffffff, &(0x7f0000002900)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553687f0000", 0x6d}, {&(0x7f0000000200)="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", 0xfa}, {&(0x7f0000000300)="2edaee10871dc7d9b7fdd6203c99c7a7484d69ab047ef3759434d4ddd4ae09b7032c25f9e73e19bdaf3f126d945f848e743e55bb74f64db06acba5b1e203d46494cf9a2a37f1b7865c8bd786abd52ecea00573dc38d0a30d431d4b3929bef436ff77f546badebd2a9e9979927e27ff50f47fd995d457e12225f1be", 0x7b}, {&(0x7f0000000800)="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"/4096, 0x1000}, {&(0x7f0000001800)="f9043162551647d44f0178fd82cd37a254e27a0200d791ba292e37f7779f718e748f7e278a2ca6568c65bbbea0fbe9342fd392c3c1f9d49594a3ee01ccd35e656ad756fd45c983cb4ec0fffeb2372af42f1d1de148c12ff2f78dfba3e4ac7daf7694c46b6e13a6e66a29402ed53fc1d8e42874217ef013c4fa3c99a2b6ddb56d73e7aeab024618f7441be830c015036f585ce06cf5bbef8a150cedfe734acc5072f51dc29ef25e9b75ac40b5a140fab34b9e528e1b87f2bd48a6ccd309a27179af3383b99b3183f47b", 0xc9}, {&(0x7f0000000040)="4e2e93928d3ae3df8ffdc67013abf9de7a995d0130613c3a9d024c755094e9833c265668727b317dae4631b31df46ffd757cde335a", 0x35}, {&(0x7f0000001900)="08554cc26ce49147f127413b63d9d6eeb53a9d7836853235ecbcd48b29b22a94f6457afbb12005db7cf237eb953df340a0ab249d1315ca56aaa85eeffb02783ab2f89a2ae1468329587ca0af402996f41faeb8bc6ab397dead5f7115dbf36a98e5621e76003069124100af8e64591aeeafa88dcaa70a907fdf71ee5f11f281628f89f14e272e7e34a9dc7b21bc752446b719d8bd153741eca333938d97bd309964aaf8a2f48dd7728ac650006251178084bda7c32e85cb0a9699d998766debc68c101e6f6bac597aac19a26553051665101f25af895a81d41fb05fe0eef7f12a8e8246df3c94669bf47fd9465a70e978879cc1c8dea5e92afcec4239492daa7b3b75db312a6e27523969e82233de959ef366535ef08ac72ccfe869cb3815819e3c3371d710a8656918f1ced8c60bc03320c39bdbd05e20526c6364bba2879098c37c5445023ca81357878bd59e625ef8bba13e92ba2a8c53c446469ab3728bec0a668208bee2b11aace401c6f856f56b6f761c47a53827e1b2b38e241de280a41a56ff192f62c9317bc9a51d33a4b5435b641f85f2152f4b080841e6f912726a103be5277d1536f324ce28c2abb59e785b949def2ff031bb1e0875c79427bd85942ba411ec6eb4a0495872bec0eb8e6ab6a0d519ac054e10586187154c01b018ac291769cb718a42e9231fb83dce64e6e57d0d5ceb2992d9e6c1d04c3c7833876ae53736751f5b8a6af69f8ed89bbbc5032d3323d7f74130f4abe29755b69730d0775bce2f34c0165b627af6051cf5119b03a484820987e00375f2ff3a03455d356c39eb70bae25d79c3ccd736d3043edef42f713a71391e9035bbe53cdc2d674d0764aa764c717e7a0681a9748a614126a7dfb88df1189dd680702b7923ebecb1e972ce68aa13a4d3e99e24611123214f3ff3122ef9b873d9d9b8a01fabde673bf68e00cc753e88c8a8b7820f8f069119c9f74fdb15f4e35295e404b6164d83da790a9d20990273bbce97d920ae156d2e21f54b1b7dee941137b784b0424d1ef4a7eefd472a39f7ecd483438a7148683285e72ca10c5e2e767cb0b7756d67c991dd1f01eac29b1d9f36c1339d53f9b84411a966bc4029f223448e16fbc36248d6229c9fd03072ee4a9610359c6c1ba850f527e429b008dfc6ba4368eef7468394e2e2e019e8a57b5fddbc4d70237ccdf9f635179159e4de49bbfd1604e14f3fb4ba255ae061c372877858eec4d17a21cda16555353e784066e3d1babef5289d74987ff061f35b308fa558363639560caf4cc5432c88fd800838a541abf2aae69da484f64ed70d10fa64ae57027ea399097a88492b59c903ce0e426af49b7c11f89bd1b5318c2fa0c8545cdd5aac82bcfaf7c1b0d5477bb4264af2b5bca05330c32e3b25aee4ae695db655eb286685a982132de113777642ff2eba7c56fcdc59a317ac6441d80082fd9e3f5c6c14e5c35e2ecd4ff11b7eba2615fd555a5ad98ee3e92295d570e0724b96024f018a2e2de8ac3b48a41e40ca50d1ac5d374d85c7d1675ff255b4f2f102e672813753de2b00a13ece09acc28b3c3029f8c6a4abe6b3312daa36ede34fd5e849d5b2c0a7526de8defd522292b81d690fada45b024b98286f9589f554d3a3e0dad7d6b406c3a1181d01f9e8d35ea582a4923a7c978b79e83835fd0fe57744d40fdc14af3088dbcc16bf6788f59d46b54aeb3430e6f1a16d25fe959cd7430a50b8b6f455dca2b9d7545fa7492a06203880d501459833a66dc5295be9ec4f9ec56e54c6dfc2a370b741691f665887431557759607cec19f1114f95651ff3eeab7b0c90c5d8ef5229b67887a35bc5218e2a2f673b997c03c69ccede9f48e3a88bdef1e0470c708b0d9343e13c405f2aa021ab3924fa822bfd7a98373de162d9ed31537cf80b5b74db89401ffb3e2696eb39de8ee9e1c6f0820a22891a5c961c2fd63c74cc05ceff85c97e9eb60df079364ff459814087e740a87ae2dc410dd4f2e9fac1ac0035240bf0d994591d41a8ee749c9ce1c379aa584f936ea9f63333b61cf15b6b64a9182ae00c98ee2ee2e3341eb14be64efe5430027f6202afa7c169ea40ebdae51b39206c25a3d0edc3d27dc0b77ac1cf3513b38c7b5520279b9ab796fb60f575148806bb0f2b2596af4874406194671c65f47f5ad8f402d7753ebf26d5af43aa0d73b285a3f521f55ce4d2d21a565886e8691f4519814aad584a774bffda2f57592b7fe19a23464a9b5847b73abbf58a18b36ebffe322c12d62a800ed431917f92a36edb8bcfbea20165b58506b34abd959cff91dd6d9ff36e007ad0f09fcd4617a9ed57094440f5fef77c053be22264e40d91bf26d5acbd22a9d96b300cfc62cf12bb0522bcc6e8e61affb8bd7f99f88d5baa0b2624d3883d7000068801cac48373be45202e2ac2aa063655a96b9619dfdc2af5937b77131c3177d169dd466b65ccd21fe0700b3e318e6264c4869bffaeadc029b4c4f91e17f1e01b3e12bb3e0956a583ac19e26601f3b500ca933a7e3cb30b8a0ae0297d0afc997201bc877faa12c5db4141835cbbd0936dda18ada2b41456027f0db2a635f1f05e416fb422b285ee654f8e23fb0f6bc274ac1423b291bff7d28748c21b3477af2cf3a8b81fb114278551f497b4971780075844ae7d9993b4ae70f0efa280bcd0c225cc8c2a1fcf53682980b95524ec3aaa483c294949ee36bc35988d34ae8ad66de582eea2fff190e5905315fbe7d2db849465077e9ecc8d534c60ae39b2d35c4335b57af57d58e4fa1b11630a1f18a9ee8561f391c5158de0de4a8ac0eed9ec72ca7561551955a5a9844979779c52716c2afb2dce42b6654d02b3e2a90324685d266086d123ba9e99be1dd23ac6f6668ca82fe624e8619638f256001599c810b65c25f7d38657931822e90f0c604f1b5abdf7fb75c3da25354d53f12b2e15bad449a50db8ebe4807bb64feb8678a3b2a7c9133ee946661269ba6fb5cf95c6f2bde5a189483a986b06fdacdf7153b8c800b15ab51e04306ef07964cc0ce3563e55a6abfebbf14c1968a3a2f64c97538efb188e5374933f147cf9642e11af9c383a7467838264c9cfd0df7be3288ce6321129db0cf7566eb19f17cc75fc2677d1bfb635d49a220da81922fb02af9f786852f6706310826cfac257bb14c10a99f9aa7e42a81b3ba27c87251f4089c86adf2854fcda5552ab04cc7f3106ac1165bdb179176decd0fdcb9809d9acd8b402ed25dcc069043cddb5c4ce81a60faac70cfe8e72f469a8a6a6c6671d18ba2bd02dba21f24fc7bfa14d36839a0c2b3de8108527f4536142a5fa0cd6e88222b9807a8f5ad5a4ac56ac0e4540af5e038858cef0ba7441384febf9be73acd5b7b35ac7bd51101fb5fb461275f71729ea7dfd3ac9bd48ca5f30da1bb041fcc177ed76b4187e444eb2c0475e886666492c3e87a1d05accb115fa719453fb1d6f2d8d6200e44ea81a15326c9c4729a19727902c0325b9e1face1b8de40383af711d03a67f3a0454b37e2dd6bc190a02ad936c603a9e2f829a82dfe5d51443111039bd353431d6a79bf1f9725ea22fb243ef04aed8b4bb339fda56f380a52f953cee8efcfa521670960cb96e410808a8035fac004612db47b5d66d21c7d0e6218bb52854b592508204b98f26877500f1ee07840842f83f8347592d555ad1700d01988dbf544b8055c29617b7e2fcc0b981955721eda0efe1b6d856f545bc6312da1509fed57710a0a929a9d624ec1483b26f8fd40123e348f3961d9e5e356f06239a398947e8c1b8be9e39561f59043327ef9d984afdcd7bfd2a9750c304d841fcb1dff12f7ae389b5f77c0cdb5ec3b0ecf4e4802ff695c7f054adad6399f3f912eae0682cc4806ef00efe8a7e6d684fbc5463420c15d5f300a4ca374f5fbbf04f34e6fb5b531c82f73db1f452ce886122bfc5f56fa8a96a29f0bbc9433e2e02dac0c536bff29fc83ae63908929861a581535660aca097fb1ab80a517774031b57a2d804534c834e58484357f41f9bfaf2964f120f33e5089d406bfbbdbc94417ba662533097e519e8aa043221da1286a9230e3b70dd52ee42a393d35ffcd66d8235983447ba7158f5f3a61cca043e092284ec06ed63ea151a41d0409c9c093d4dee3fad8e33162310b3476ac4d1cf6b2161824a1e7fed151a01342352f6318665d1600817a5d3722853d6a5a603b42645751a9ee1e9ff34c1f5e375cb5efb9968a04fbc3d7106a58deb9ac0136ab11de380e81b31ea0d5ace20d90a3ac06a29c799db275a8a5a24a5d0fc18cfa5c5f52c8dbc98cbb62fcd98e1af56485debe79eb021d6e9ae40c38f6c6d58106cdfb53a7afcd86c69e48a8646741d0c1647e2b28509d59ab1054b69389eb66a8176a0aec41312a282cf2dd1382e186c3720ac34bfcb8353d5db70fa96b2caaddd7ee83070454b17ebcb74e43fad84d7516f4f75281ff89d974df8eafc11e4eb58a4d9cd3e35ee4722f2272f53156deda035c9ce4ae9a1994df5eede997857c5ad8de734d1f68295cdb66d8c4e08a23c44ded103af20d6859ec5bfbb31b9272023afc32bccf34db907879a4a7f591c5209169e4b4f73f016028a985e6bcc1851dfd2be08f87450d020ca0a4b9b89e8f57260d4a81d1a2ff3f3a2cbe8f786e8634ef38209553216251806575f4d31bf2d97f7b2a6fc7eec13bf4fd5c514fe7aa50c0ec8dc833041cd7f7641182d19d0f20465f2a01ad3299cecd8d48984d0e28a7466044725c715eb70a415f0237fde061681c5e595bf7e75bf05b65b933c80d6e4a8535bfaa53b3bfd400571b66005f8cbe059a8f5b6f54da7a4066b2d38302d4906e092db88cca9258258a0e55d8958ee73fc7c9542992ada615a7f72ab098d79ab38500d6ce8d57e46932f3a85361469eef98da735271a7ad7af1780703a7c5edb87f411ea91a3e87d18634f051923f68131f8b3f14af82a507d8de09c13209002492337565163f02794ea2ebc68a45b0d209c48a60283f653eabd92f65ecac4ed82462a6728afe108cccd2d1ae9eea4d56963795d59bbf88a2eab25e2d7b2d1ce3d37b19b60c602e401dba88ab9d990a577691c3f7dc2d425043ca2fd3d3ba3125983882605139a379705529f1ba2e4ae2dae124d219035a559f6ec4c4f73dc1bae53a22e7b24958c9ea80ae974deb2dc47038dd19ee98cb0cf71df0e7072d8711ad4a5ce136f22223a5cdf4a4456752bb975aca1237dbe70fb914f9bb81adf9f12b08fb7e52bfa084292ad8b0740ae25dfe82b90b0ceb0ef4139e1f5231383422f79d2e24d02e5ffbbdeb515579beb9e40b0141a7828f1d168047533e071c8c05e703e92486dfa518fd0a35e79b35669c0840cd8ff9f59eef62e62868206323241f282cb3bc03a53d028c645329399a5f1316700fcc775a0b3fe86543b0d8e67f12666c716514392d4adf44244e0d970198cabb1a17350ab426da7b0dc99ac4eae6fed7d1f9e8cde609fb69be2bf9c87ca769db82a08b656208e8c4af25aa676a772d0386239968cf497289b79e76b8eb2aad28e423a647b41a396858e80dd8ba8ca33cf9f0e6fcdd8fc8baff074e8cb2135a7cf6b0037f6bbbf2dc1c4c8bc7962ef4cb28ca421c4611f111da1de9ca574a87ffe2da421b053d5cf2e61fbf8f171da9d66ccae0eb660f799f7fdff03ecfb1530c82ff4b6ec5ad916f5329092cc312c38e0b3adbb5a825d520e9cdee5c54cf3c2d7cd12df54c1027bacdbf36e8eb9dde0e5ae6de5ed0e20b398aaebf53bcff937a9d5b697e96b60a900b", 0x1000}], 0xa, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000, 0x2, &(0x7f0000ffb000/0x2000)=nil) ptrace$cont(0x20, r0, 0x0, 0x0) 06:01:43 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000000)='IPVS\x00') r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x6628, 0x0) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000100)=0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x6628, 0x0) write$FUSE_NOTIFY_STORE(r5, &(0x7f0000000040)=ANY=[@ANYBLOB="2900000004000000000000000000000003000000"], 0x29) 06:01:43 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8bf}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) 06:01:43 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3, &(0x7f00000008c0)=[{&(0x7f00000000c0)="8000000038040000197a0300e60100006c000432000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x3ff8000000000}, {&(0x7f00000005c0)="b4065f2ab9075ba253e109154559f88f062320246c5ae74af8e236a42c0cd0b73085bf4313acfd026684e3be45cf8f03379864cd059401666557f67127a057d2cb8d6521890c5cbfe5eaf821257dfacfaf5ef8b4c06e941318d3eec42a910d1420306249520086172e5e2f0c2308655d2a82735e431f158af85763d2d76375e78b343d563d952660c79ecfad7ccb16689bcb4fed9533483595eb30e2671cd545", 0xa0, 0x4}], 0x4803, 0x0) 06:01:43 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@ipv6_newroute={0x30, 0x18, 0x601, 0x0, 0x0, {}, [@RTA_MULTIPATH={0xc}, @RTA_PRIORITY={0x8, 0x6, 0x1ff}]}, 0x30}}, 0x0) [ 2312.189293][ T22] kauditd_printk_skb: 392 callbacks suppressed [ 2312.189302][ T22] audit: type=1400 audit(1579672903.264:350854): avc: denied { create } for pid=9810 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 06:01:43 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = gettid() rt_sigqueueinfo(r4, 0x21, &(0x7f0000000000)) ptrace$cont(0x20, r4, 0x4, 0x101) ptrace$cont(0x20, r0, 0x0, 0x0) [ 2312.249999][ T22] audit: type=1400 audit(1579672903.264:350855): avc: denied { write } for pid=9810 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 06:01:43 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000008000000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:01:43 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6400}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) [ 2312.286973][ T22] audit: type=1400 audit(1579672903.294:350856): avc: denied { map } for pid=9817 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2312.319442][ T9814] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 06:01:43 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe800000000d000000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2312.330142][ T22] audit: type=1400 audit(1579672903.294:350857): avc: denied { map } for pid=9817 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2312.364681][ T9814] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2312.371336][ T22] audit: type=1400 audit(1579672903.294:350858): avc: denied { map } for pid=9816 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 06:01:43 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@ipv6_newroute={0x30, 0x18, 0x601, 0x0, 0x0, {}, [@RTA_MULTIPATH={0xc}, @RTA_PRIORITY={0x8, 0x6, 0x1ff}]}, 0x30}}, 0x0) 06:01:43 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf08}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) [ 2312.398442][ T22] audit: type=1400 audit(1579672903.294:350859): avc: denied { map } for pid=9817 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2312.408983][ T9814] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2312.460449][ T22] audit: type=1400 audit(1579672903.294:350860): avc: denied { map } for pid=9816 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2312.511798][ T22] audit: type=1400 audit(1579672903.294:350861): avc: denied { map } for pid=9817 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 06:01:43 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x1) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) r4 = gettid() rt_sigqueueinfo(r4, 0x21, &(0x7f0000000000)) wait4(r4, &(0x7f0000000000), 0x1, &(0x7f0000000180)) [ 2312.547172][ T22] audit: type=1400 audit(1579672903.294:350862): avc: denied { map } for pid=9816 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2312.587235][ T22] audit: type=1400 audit(1579672903.304:350863): avc: denied { map } for pid=9817 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 06:01:43 executing program 2: syz_emit_ethernet(0x7e, &(0x7f0000000180)={@broadcast, @random="25b8a00207e7", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "de5ffe", 0x48, 0x3a, 0x0, @local, @mcast2, {[], @pkt_toobig={0x3, 0x0, 0x0, 0x0, {0x0, 0x6, "761f45", 0x0, 0x0, 0x0, @dev, @dev, [@dstopts={0x21, 0x1, [], [@calipso={0x7, 0x8}]}]}}}}}}}, &(0x7f0000000000)={0x0, 0x4, [0x0, 0x533]}) 06:01:43 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@ipv6_newroute={0x30, 0x18, 0x601, 0x0, 0x0, {}, [@RTA_MULTIPATH={0xc}, @RTA_PRIORITY={0x8, 0x6, 0x1ff}]}, 0x30}}, 0x0) 06:01:43 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000028000000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) [ 2312.603971][ T9814] EXT4-fs error (device loop3): ext4_fill_super:4518: inode #2: comm syz-executor.3: casefold flag without casefold feature [ 2312.648810][ T9814] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 2312.655367][ T9814] EXT4-fs (loop3): mount failed [ 2312.763003][ T9814] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2312.796560][ T9814] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2312.829250][ T9814] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2312.841276][ T9814] EXT4-fs: failed to create workqueue [ 2312.846822][ T9814] EXT4-fs (loop3): mount failed [ 2312.874086][ T9867] ================================================================== [ 2312.882313][ T9867] BUG: KASAN: use-after-free in __mutex_lock+0x2de/0xc40 [ 2312.889342][ T9867] Read of size 4 at addr ffff8881a417ac78 by task syz-executor.2/9867 [ 2312.897491][ T9867] [ 2312.899833][ T9867] CPU: 0 PID: 9867 Comm: syz-executor.2 Tainted: G W 5.4.13-syzkaller-00773-g4e16a227acbd #0 [ 2312.911658][ T9867] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2312.921713][ T9867] Call Trace: [ 2312.925032][ T9867] dump_stack+0x1b0/0x228 [ 2312.929486][ T9867] ? show_regs_print_info+0x18/0x18 [ 2312.934784][ T9867] ? vprintk_func+0x105/0x110 [ 2312.939814][ T9867] ? printk+0xc0/0x109 [ 2312.943892][ T9867] print_address_description+0x96/0x5d0 [ 2312.949531][ T9867] ? devkmsg_release+0x127/0x127 [ 2312.954584][ T9867] ? stack_trace_save+0x111/0x1e0 [ 2312.959616][ T9867] ? stack_trace_snprint+0x150/0x150 [ 2312.964905][ T9867] __kasan_report+0x14b/0x1c0 [ 2312.969595][ T9867] ? security_compute_av+0x1040/0x1100 [ 2312.975065][ T9867] ? __mutex_lock+0x2de/0xc40 [ 2312.979858][ T9867] kasan_report+0x26/0x50 [ 2312.984200][ T9867] __asan_report_load4_noabort+0x14/0x20 [ 2312.989841][ T9867] __mutex_lock+0x2de/0xc40 [ 2312.994349][ T9867] ? selinux_file_ioctl+0x6e6/0x930 [ 2312.999552][ T9867] ? security_file_ioctl+0x66/0xd0 [ 2313.004676][ T9867] ? __x64_sys_ioctl+0xa3/0x120 [ 2313.009551][ T9867] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2313.015629][ T9867] ? __ww_mutex_lock_interruptible_slowpath+0x20/0x20 [ 2313.022509][ T9867] ? should_fail+0x18e/0x860 [ 2313.027110][ T9867] __mutex_lock_slowpath+0xe/0x10 [ 2313.032139][ T9867] mutex_lock+0x106/0x110 [ 2313.036471][ T9867] ? mutex_trylock+0xb0/0xb0 [ 2313.041074][ T9867] tun_get_user+0xbca/0x3cd0 [ 2313.045671][ T9867] ? __kasan_check_write+0x14/0x20 [ 2313.050796][ T9867] ? _raw_spin_lock+0x170/0x170 [ 2313.055670][ T9867] ? tun_do_read+0x1f10/0x1f10 [ 2313.060438][ T9867] ? avc_xperms_populate+0x4eb/0x5b0 [ 2313.065728][ T9867] ? avc_compute_av+0x1cf/0x6e0 [ 2313.070696][ T9867] ? __rcu_read_lock+0x50/0x50 [ 2313.075474][ T9867] ? avc_has_extended_perms+0xb27/0x10d0 [ 2313.081108][ T9867] ? __rcu_read_lock+0x50/0x50 [ 2313.085872][ T9867] tun_chr_write_iter+0x134/0x1c0 [ 2313.091010][ T9867] do_iter_readv_writev+0x5fa/0x890 [ 2313.096211][ T9867] ? vfs_dedupe_file_range+0xa00/0xa00 [ 2313.101784][ T9867] ? security_file_permission+0x157/0x350 [ 2313.107512][ T9867] ? rw_verify_area+0x1c2/0x360 [ 2313.112379][ T9867] do_iter_write+0x180/0x590 [ 2313.117107][ T9867] ? do_writev+0x9e/0x560 [ 2313.121440][ T9867] do_writev+0x2cd/0x560 [ 2313.125842][ T9867] ? do_readv+0x400/0x400 [ 2313.130179][ T9867] ? __kasan_check_read+0x11/0x20 [ 2313.135207][ T9867] ? _copy_to_user+0x92/0xb0 [ 2313.139802][ T9867] ? put_timespec64+0x106/0x150 [ 2313.144848][ T9867] ? ktime_get_raw+0x130/0x130 [ 2313.149634][ T9867] ? get_timespec64+0x1c0/0x1c0 [ 2313.154487][ T9867] ? __kasan_check_read+0x11/0x20 [ 2313.159526][ T9867] ? __ia32_sys_clock_settime+0x230/0x230 [ 2313.165444][ T9867] __x64_sys_writev+0x7d/0x90 [ 2313.170129][ T9867] do_syscall_64+0xc0/0x100 [ 2313.174676][ T9867] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2313.180571][ T9867] RIP: 0033:0x45b201 [ 2313.184468][ T9867] Code: 75 14 b8 14 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 e4 b7 fb ff c3 48 83 ec 08 e8 fa 2c 00 00 48 89 04 24 b8 14 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 43 2d 00 00 48 89 d0 48 83 c4 08 48 3d 01 [ 2313.204484][ T9867] RSP: 002b:00007fb08fecdba0 EFLAGS: 00000293 ORIG_RAX: 0000000000000014 [ 2313.212910][ T9867] RAX: ffffffffffffffda RBX: 00000000200001fe RCX: 000000000045b201 [ 2313.220881][ T9867] RDX: 0000000000000002 RSI: 00007fb08fecdc00 RDI: 00000000000000f0 [ 2313.228861][ T9867] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2313.236851][ T9867] R10: 00007fb08fece9d0 R11: 0000000000000293 R12: 00000000ffffffff [ 2313.244837][ T9867] R13: 0000000000000b4c R14: 00000000004cc318 R15: 000000000075bf2c [ 2313.252811][ T9867] [ 2313.255138][ T9867] Allocated by task 17486: [ 2313.259560][ T9867] __kasan_kmalloc+0x117/0x1b0 [ 2313.264325][ T9867] kasan_slab_alloc+0xe/0x10 [ 2313.269035][ T9867] kmem_cache_alloc+0x120/0x2b0 [ 2313.273990][ T9867] copy_process+0x59b/0x52d0 [ 2313.278580][ T9867] _do_fork+0x185/0x950 [ 2313.282735][ T9867] __x64_sys_clone+0x247/0x2b0 [ 2313.287499][ T9867] do_syscall_64+0xc0/0x100 [ 2313.292012][ T9867] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2313.297892][ T9867] [ 2313.300268][ T9867] Freed by task 16: [ 2313.304085][ T9867] __kasan_slab_free+0x168/0x220 [ 2313.309034][ T9867] kasan_slab_free+0xe/0x10 [ 2313.313692][ T9867] kmem_cache_free+0x181/0x7a0 [ 2313.318459][ T9867] free_task+0xc0/0x110 [ 2313.322627][ T9867] __put_task_struct+0x1fd/0x380 [ 2313.327567][ T9867] delayed_put_task_struct+0x1c2/0x200 [ 2313.333026][ T9867] rcu_core+0xba0/0x1330 [ 2313.337274][ T9867] rcu_core_si+0x9/0x10 [ 2313.341449][ T9867] __do_softirq+0x235/0x57e [ 2313.345957][ T9867] [ 2313.348282][ T9867] The buggy address belongs to the object at ffff8881a417ac40 [ 2313.348282][ T9867] which belongs to the cache task_struct(43:syz2) of size 3648 [ 2313.363289][ T9867] The buggy address is located 56 bytes inside of [ 2313.363289][ T9867] 3648-byte region [ffff8881a417ac40, ffff8881a417ba80) [ 2313.376677][ T9867] The buggy address belongs to the page: [ 2313.383250][ T9867] page:ffffea0006905e00 refcount:1 mapcount:0 mapping:ffff8881d6c40800 index:0xffff8881a417d880 compound_mapcount: 0 [ 2313.396094][ T9867] raw: 8000000000010200 ffffea00066b3208 ffffea000665d608 ffff8881d6c40800 [ 2313.404816][ T9867] raw: ffff8881a417d880 0000000000080005 00000001ffffffff 0000000000000000 [ 2313.413400][ T9867] page dumped because: kasan: bad access detected [ 2313.419927][ T9867] [ 2313.422253][ T9867] Memory state around the buggy address: [ 2313.427879][ T9867] ffff8881a417ab00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2313.436021][ T9867] ffff8881a417ab80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 2313.444214][ T9867] >ffff8881a417ac00: fc fc fc fc fc fc fc fc fb fb fb fb fb fb fb fb [ 2313.452400][ T9867] ^ [ 2313.460393][ T9867] ffff8881a417ac80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 2313.468662][ T9867] ffff8881a417ad00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb 06:01:43 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3, &(0x7f00000008c0)=[{&(0x7f00000000c0)="8000000038040000197a0300e60100006c000433000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x3ff8000000000}, {&(0x7f00000005c0)="b4065f2ab9075ba253e109154559f88f062320246c5ae74af8e236a42c0cd0b73085bf4313acfd026684e3be45cf8f03379864cd059401666557f67127a057d2cb8d6521890c5cbfe5eaf821257dfacfaf5ef8b4c06e941318d3eec42a910d1420306249520086172e5e2f0c2308655d2a82735e431f158af85763d2d76375e78b343d563d952660c79ecfad7ccb16689bcb4fed9533483595eb30e2671cd545", 0xa0, 0x4}], 0x4803, 0x0) 06:01:43 executing program 4: socket$tipc(0x1e, 0x5, 0x0) unshare(0x400) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000}, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) 06:01:43 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@ipv6_newroute={0x30, 0x18, 0x601, 0x0, 0x0, {}, [@RTA_MULTIPATH={0xc}, @RTA_PRIORITY={0x8, 0x6, 0x1ff}]}, 0x30}}, 0x0) 06:01:43 executing program 0: syz_emit_ethernet(0x82, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60eaa836004c2c0000000000000000000000000000000000fe8000000029000000000000000000aa00000000000000000420880b0000000000000800000086dd08fc88be00000000100000000100000000000000080022eb00000008000000000200000000000000000000000800655800000000"], 0x0) 06:01:43 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) r0 = gettid() rt_sigqueueinfo(r0, 0x21, &(0x7f0000000000)) sched_rr_get_interval(r0, &(0x7f00000001c0)) ptrace$cont(0x18, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = gettid() rt_sigqueueinfo(r1, 0x6, &(0x7f0000000000)={0x33}) ptrace$setregs(0xf, r1, 0x2, &(0x7f0000000400)="dce7f8c84d82734467c8041736bc666d1696ae483911670b47c9b40000000048001ddef19e66e035e26b859aa57191085a05fd45b05c3c1bb4bbd1007803ffea000000000000000000c5ffa36696a5d3e0ce0959b519bbf0987e9a9b77de576da9b3edc9c88f16b3d244474516084a7706311a99fdcb7e62c65b08dae80fb2dd08ade465c53e0fd2dcf1581480e627e5265cbe0c2abd93b9a6c03f3ee31dd812614012a6fd87350f25967b16c4acae668e2be4a4845fed12238a35e9457d5efbaf6cc40d0ede7a78ac9ee9f0ab1edd2ea108c3b7") socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getpeername$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000180)=0x14) ptrace$cont(0x20, 0x0, 0x0, 0x0) 06:01:44 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@ipv6_newroute={0x30, 0x18, 0x601, 0x0, 0x0, {}, [@RTA_MULTIPATH={0xc}, @RTA_PRIORITY={0x8, 0x6, 0x1ff}]}, 0x30}}, 0x0) 06:01:44 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) write$cgroup_int(r1, &(0x7f0000000200), 0x12) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000180)={{{@in6, @in6=@mcast1}}, {{@in6=@remote}}}, &(0x7f0000000000)=0xe8) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff46d010000805ae64f8f36460234d42479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b9a6355ddc553", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x81, 0x1ff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 06:01:44 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3, &(0x7f00000008c0)=[{&(0x7f00000000c0)="8000000038040000197a0300e60100006c009533000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x3ff8000000000}, {&(0x7f00000005c0)="b4065f2ab9075ba253e109154559f88f062320246c5ae74af8e236a42c0cd0b73085bf4313acfd026684e3be45cf8f03379864cd059401666557f67127a057d2cb8d6521890c5cbfe5eaf821257dfacfaf5ef8b4c06e941318d3eec42a910d1420306249520086172e5e2f0c2308655d2a82735e431f158af85763d2d76375e78b343d563d952660c79ecfad7ccb16689bcb4fed9533483595eb30e2671cd545", 0xa0, 0x4}], 0x4803, 0x0) 06:01:44 executing program 5: socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@ipv6_newroute={0x30, 0x18, 0x601, 0x0, 0x0, {}, [@RTA_MULTIPATH={0xc}, @RTA_PRIORITY={0x8, 0x6, 0x1ff}]}, 0x30}}, 0x0) [ 2313.476715][ T9867] ================================================================== [ 2313.484904][ T9867] Disabling lock debugging due to kernel taint