000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0)

16:29:29 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x1)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

[  217.621391] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  217.658659] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock
16:29:29 executing program 0:
sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="054a38", @ANYRES16, @ANYBLOB="6ffe000000000000000003000000580001800d0001007564"], 0x3}}, 0x0)
sendto$unix(0xffffffffffffffff, &(0x7f0000000340)="53e0f2c2905e9916912f89b23f54185c0e90b38551c81ae3767d56fec3150cd9bd2db58e164473806c6aaaf6964a26b0de86f5fe037f85ea25f3228e5e6dc4672b11ee7418224b4bed0d668c93d4ad2a975309402c1c195f2bd1a1263e107b177c6288fe6160086efbcd133bab74435a30e5da929fcd65882c970886e36ef38c162bf17422221915d31ea852afbc6f78df1ea10fd20bd8cf77e433", 0x9b, 0x0, 0x0, 0x0)
sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x2, [@fwd, @array, @array, @const={0xb}]}}, 0x0, 0x62}, 0x20)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100686cca8000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4807, 0x0)

16:29:29 executing program 3:

16:29:29 executing program 1:

16:29:29 executing program 2:

[  217.702629] EXT4-fs (loop0): failed to open journal device unknown-block(0,0): -6
16:29:29 executing program 1:

16:29:29 executing program 3:

16:29:29 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x1)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

16:29:29 executing program 2:

[  217.868151] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready
[  217.899615] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
16:29:29 executing program 1:

16:29:29 executing program 3:

[  217.915065] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
16:29:29 executing program 5:
r0 = socket$netlink(0x10, 0x3, 0x0)
bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc)
setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000cecffc), 0x4)
r1 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0)

16:29:29 executing program 2:

[  217.965733] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  218.010525] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  218.082688] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  218.138326] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready
[  218.145892] EXT4-fs (loop0): failed to open journal device unknown-block(0,0): -6
[  218.173246] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
16:29:30 executing program 0:
sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="054a38", @ANYRES16, @ANYBLOB="6ffe000000000000000003000000580001800d0001007564"], 0x3}}, 0x0)
sendto$unix(0xffffffffffffffff, &(0x7f0000000340)="53e0f2c2905e9916912f89b23f54185c0e90b38551c81ae3767d56fec3150cd9bd2db58e164473806c6aaaf6964a26b0de86f5fe037f85ea25f3228e5e6dc4672b11ee7418224b4bed0d668c93d4ad2a975309402c1c195f2bd1a1263e107b177c6288fe6160086efbcd133bab74435a30e5da929fcd65882c970886e36ef38c162bf17422221915d31ea852afbc6f78df1ea10fd20bd8cf77e433", 0x9b, 0x0, 0x0, 0x0)
sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0)
select(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100686cca8000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4807, 0x0)

16:29:30 executing program 1:

16:29:30 executing program 3:

16:29:30 executing program 2:

16:29:30 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x1)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

[  218.203314] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
16:29:30 executing program 1:

16:29:30 executing program 2:

16:29:30 executing program 3:

16:29:30 executing program 5:
r0 = socket$netlink(0x10, 0x3, 0x0)
bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc)
setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000cecffc), 0x4)
r1 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0)

16:29:30 executing program 1:

16:29:30 executing program 3:

16:29:30 executing program 1:

[  218.427073] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  218.436130] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  218.448233] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  218.460334] EXT4-fs (loop0): invalid journal inode
[  218.512459] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready
[  218.541148] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[  218.551739] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
16:29:30 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x1)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

16:29:30 executing program 2:

16:29:30 executing program 1:
r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2)
write$evdev(r0, &(0x7f0000057fa0)=[{{}, 0x0, 0x2}], 0x18)

16:29:30 executing program 3:
perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x5, 0x2, 0x0, 0x0, 0x0, 0x1, 0x2b42f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3ff80000000000, 0x8000}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8)
r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x20000, 0x84)
sendfile(r2, r0, &(0x7f0000000140)=0x7, 0x8)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1)
perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0xa2, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x1, @perf_bp={0x0, 0x6}, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, r1, 0x0)
perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
tkill(0x0, 0x3c)
ptrace$cont(0x18, 0x0, 0x0, 0x0)
ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080))
ptrace$cont(0x9, 0x0, 0x0, 0x0)
ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000180)=""/82)
preadv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f0000001280)=""/4096, 0x1000}], 0x1, 0xd990)
r3 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00')
preadv(r3, &(0x7f00000017c0), 0x1a1, 0x0)
syz_read_part_table(0x0, 0xb784, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a6ffffff0a000000ff45ac00000000006300e931190000000000000680ffffffa5000000e100e2ff877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}])

16:29:30 executing program 0:
sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="054a38", @ANYRES16, @ANYBLOB="6ffe000000000000000003000000580001800d0001007564"], 0x3}}, 0x0)
sendto$unix(0xffffffffffffffff, &(0x7f0000000340)="53e0f2c2905e9916912f89b23f54185c0e90b38551c81ae3767d56fec3150cd9bd2db58e164473806c6aaaf6964a26b0de86f5fe037f85ea25f3228e5e6dc4672b11ee7418224b4bed0d668c93d4ad2a975309402c1c195f2bd1a1263e107b177c6288fe6160086efbcd133bab74435a30e5da929fcd65882c970886e36ef38c162bf17422221915d31ea852afbc6f78df1ea10fd20bd8cf77e433", 0x9b, 0x0, 0x0, 0x0)
sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0)
select(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100686cca8000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4807, 0x0)

16:29:30 executing program 5:
r0 = socket$netlink(0x10, 0x3, 0x0)
bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc)
setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000cecffc), 0x4)
r1 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0)

16:29:31 executing program 2:
prlimit64(0x0, 0x0, 0x0, 0x0)
r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
lseek(r0, 0x4200, 0x0)
r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0)
io_setup(0x1ff, &(0x7f00000004c0)=<r2=>0x0)
io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}])
write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB='D'], 0x1)
open(&(0x7f0000000340)='./bus/file0\x00', 0x800, 0x134)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
sendfile(r0, r3, 0x0, 0x8400fffffffb)

[  219.222018] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready
[  219.248177] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[  219.262857] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  219.326790] audit: type=1804 audit(1588955371.134:12): pid=9026 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir337618313/syzkaller.EvCYYJ/50/bus" dev="sda1" ino=15902 res=1
[  219.361658] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  219.399016] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
16:29:31 executing program 1:
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000001c0)=@filter={'filter\x00', 0x50, 0x4, 0x3c0, 0x0, 0x1f8, 0x1f8, 0xd0, 0x1f8, 0x2f0, 0x2f0, 0x2f0, 0x2f0, 0x2f0, 0x4, 0x0, {[{{@ipv6={@mcast1, @loopback, [], [], 'bond_slave_0\x00', 'syzkaller1\x00'}, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x5}}}, {{@ipv6={@dev, @mcast1, [], [], 'dummy0\x00', 'veth0_to_bond\x00'}, 0x0, 0x100, 0x128, 0x0, {}, [@common=@frag={{0x30, 'frag\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@remote, @empty, [], [], 'ip6tnl0\x00', 'ip_vti0\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@icmp6={{0x28, 'icmp6\x00'}, {0x0, "1883"}}]}, @REJECT={0x28, 'REJECT\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x420)

16:29:31 executing program 5:
r0 = socket$netlink(0x10, 0x3, 0x0)
bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc)
setsockopt$sock_int(r0, 0x1, 0x8, 0x0, 0x0)
r1 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0)

[  219.443503] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  219.486174] EXT4-fs (loop0): invalid journal inode
16:29:31 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x1)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

[  219.628759] ip6t_REJECT: ECHOREPLY is not supported
16:29:31 executing program 1:
perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
preadv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f0000001280)=""/4096, 0x1000}], 0x1, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/raw6\x00')
preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0)

[  219.652072] ip6t_REJECT: ECHOREPLY is not supported
[  219.668328] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready
[  219.706695] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[  219.746918] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
16:29:31 executing program 5:
r0 = socket$netlink(0x10, 0x3, 0x0)
bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc)
setsockopt$sock_int(r0, 0x1, 0x8, 0x0, 0x0)
r1 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0)

16:29:31 executing program 1:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0)
socket$inet_udplite(0x2, 0x2, 0x88)
dup(0xffffffffffffffff)
dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
ppoll(&(0x7f0000000080)=[{r2}, {r3, 0x100}], 0x2, 0x0, 0x0, 0x0)

16:29:31 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x1)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

16:29:31 executing program 0:
sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="054a38", @ANYRES16, @ANYBLOB="6ffe000000000000000003000000580001800d0001007564"], 0x3}}, 0x0)
sendto$unix(0xffffffffffffffff, &(0x7f0000000340)="53e0f2c2905e9916912f89b23f54185c0e90b38551c81ae3767d56fec3150cd9bd2db58e164473806c6aaaf6964a26b0de86f5fe037f85ea25f3228e5e6dc4672b11ee7418224b4bed0d668c93d4ad2a975309402c1c195f2bd1a1263e107b177c6288fe6160086efbcd133bab74435a30e5da929fcd65882c970886e36ef38c162bf17422221915d31ea852afbc6f78df1ea10fd20bd8cf77e433", 0x9b, 0x0, 0x0, 0x0)
sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0)
select(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100686cca8000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4807, 0x0)

[  220.100765] audit: type=1804 audit(1588955371.915:13): pid=9055 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir337618313/syzkaller.EvCYYJ/50/bus" dev="sda1" ino=15902 res=1
16:29:32 executing program 3:
r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/protocols\x00')
r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETSW(r1, 0x5403, &(0x7f0000000040)={0x0, 0x3, 0x0, 0x0, 0x0, "00000100"})
r2 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, r2, 0x0)
ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc))
r3 = syz_open_pts(r1, 0x2)
sendfile(r3, r0, 0x0, 0x6f0a77bd)

[  220.168752] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready
[  220.186297] audit: type=1804 audit(1588955371.945:14): pid=9059 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir337618313/syzkaller.EvCYYJ/50/bus" dev="sda1" ino=15902 res=1
16:29:32 executing program 2:
r0 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="7400000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="ed9ce2e9150000f11700128008000100767469"], 0x74}}, 0x0)

[  220.233774] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[  220.250139] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
16:29:32 executing program 1:
syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03000f005c00010000c40f00000000ffffff810000000000000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])

16:29:32 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x1)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

[  220.292170] audit: type=1804 audit(1588955371.975:15): pid=9063 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir337618313/syzkaller.EvCYYJ/50/bus" dev="sda1" ino=15902 res=1
[  220.328582] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
16:29:32 executing program 5:
r0 = socket$netlink(0x10, 0x3, 0x0)
bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc)
setsockopt$sock_int(r0, 0x1, 0x8, 0x0, 0x0)
r1 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0)

[  220.372486] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  220.415163] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.2'.
[  220.434732] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.2'.
[  220.448234] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock
16:29:32 executing program 2:
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000400)={<r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001380)={[{@nr_blocks={'nr_blocks', 0x3d, [0x6d]}}]})

[  220.462967] EXT4-fs (loop0): invalid journal inode
16:29:32 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x1)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

[  220.498878] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready
[  220.518579] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[  220.526144] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
16:29:32 executing program 5:
r0 = socket$netlink(0x10, 0x3, 0x0)
bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc)
setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4)
socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0)

[  220.602051] ldm_validate_privheads(): Disk read failed.
[  220.630370]  loop1: p1 < > p2
[  220.643852] loop1: partition table partially beyond EOD, truncated
16:29:32 executing program 2:
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f0000000140)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="45e9aed12f060000000000000025d86800278dcff47d010000", 0x19}], 0x4, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x7b84, &(0x7f0000000100)="ee3ea485e9b2eba27d8e9871ebc0a66545f943437fe0c0d4034ac82837878af19a1feeeebacc5721ce399b888ba0dcda5b24aabe9ff1eb926f")
ptrace$cont(0x9, r0, 0x0, 0x0)

16:29:32 executing program 3:
r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/protocols\x00')
r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc))
r2 = syz_open_pts(r1, 0x2)
sendfile(r2, r0, 0x0, 0x6f0a77bd)

16:29:32 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x1)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

[  220.682980] loop1: p1 start 3288334337 is beyond EOD, truncated
[  220.734742] loop1: p2 size 327680 extends beyond EOD, truncated
[  220.837224] ldm_validate_privheads(): Disk read failed.
[  220.843114]  loop1: p1 < > p2
[  220.864414] loop1: partition table partially beyond EOD, truncated
16:29:32 executing program 0:
sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="054a38", @ANYRES16, @ANYBLOB="6ffe000000000000000003000000580001800d0001007564"], 0x3}}, 0x0)
sendto$unix(0xffffffffffffffff, &(0x7f0000000340)="53e0f2c2905e9916912f89b23f54185c0e90b38551c81ae3767d56fec3150cd9bd2db58e164473806c6aaaf6964a26b0de86f5fe037f85ea25f3228e5e6dc4672b11ee7418224b4bed0d668c93d4ad2a975309402c1c195f2bd1a1263e107b177c6288fe6160086efbcd133bab74435a30e5da929fcd65882c970886e36ef38c162bf17422221915d31ea852afbc6f78df1ea10fd20bd8cf77e433", 0x9b, 0x0, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x2, [@fwd, @array, @array, @const={0xb}]}}, 0x0, 0x62}, 0x20)
select(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100686cca8000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4807, 0x0)

16:29:32 executing program 5:
r0 = socket$netlink(0x10, 0x3, 0x0)
bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc)
setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4)
socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0)

16:29:32 executing program 2:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
bind$rose(r0, &(0x7f00000000c0)=@full={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x0, [@null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x40)

[  220.929681] loop1: p1 start 3288334337 is beyond EOD, truncated
[  220.935779] loop1: p2 size 327680 extends beyond EOD, truncated
16:29:32 executing program 1:
setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000100)={0x0, {{0x2, 0x0, @multicast2}}}, 0x88)
write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b)
sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x24000061)
r0 = socket$l2tp(0x2, 0x2, 0x73)
setsockopt$inet_int(r0, 0x1f00000000000000, 0xd2, &(0x7f0000000040)=0xfffffffd, 0x4)

16:29:32 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
syz_emit_ethernet(0x4a, &(0x7f0000000300)={@local, @random="4ea35c9f13fc", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "083ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0)

16:29:32 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x1)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

16:29:32 executing program 2:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0)
r2 = socket$nl_generic(0x10, 0x3, 0x10)
r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00')
sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16, @ANYBLOB="01000000000000000000120000000600280000000000080003"], 0x4}}, 0x0)
pipe(&(0x7f0000000040))
socket$nl_generic(0x10, 0x3, 0x10)
socket$netlink(0x10, 0x3, 0x0)
socket$netlink(0x10, 0x3, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0)
socket$nl_netfilter(0x10, 0x3, 0xc)
socket$nl_generic(0x10, 0x3, 0x10)
r4 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ffff0900000016000a00", @ANYRES32=r4], 0x4}}, 0x0)
sendfile(r2, r1, 0x0, 0x100000002)

16:29:32 executing program 5:
r0 = socket$netlink(0x10, 0x3, 0x0)
bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc)
setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4)
socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0)

16:29:32 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="000e003f0000007e5bc5795e0800", 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40)

[  221.063607] ldm_validate_privheads(): Disk read failed.
[  221.070264]  loop1: p1 < > p2
[  221.073485] loop1: partition table partially beyond EOD, truncated
[  221.081552] loop1: p1 start 3288334337 is beyond EOD, truncated
[  221.089355] loop1: p2 size 327680 extends beyond EOD, truncated
16:29:33 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x1)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

[  221.176934] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  221.194036] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
16:29:33 executing program 5:
r0 = socket$netlink(0x10, 0x3, 0x0)
bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc)
setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4)
r1 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, 0x0, 0x0)

[  221.253596] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock
16:29:33 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="000e003f0000007e5bc5795e0800", 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40)

[  221.302820] EXT4-fs error (device loop0): ext4_get_journal_inode:4691: inode #8: comm syz-executor.0: iget: bad extended attribute block 50331648
[  221.329560] audit: type=1804 audit(1588955373.145:16): pid=9163 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir337618313/syzkaller.EvCYYJ/55/cgroup.controllers" dev="sda1" ino=15899 res=1
[  221.425525] EXT4-fs (loop0): no journal found
[  221.459800] audit: type=1804 audit(1588955373.185:17): pid=9159 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir337618313/syzkaller.EvCYYJ/55/cgroup.controllers" dev="sda1" ino=15899 res=1
16:29:33 executing program 5:
r0 = socket$netlink(0x10, 0x3, 0x0)
bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc)
setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4)
r1 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, 0x0, 0x0)

16:29:33 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0)
pwritev(r0, &(0x7f0000000380)=[{&(0x7f00000000c0)='#', 0x1}], 0x1, 0x0)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, r0, 0x0)
r1 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @multicast1}, 0x10)
sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10)
sendto$inet(r1, &(0x7f00000012c0)='\f', 0x1, 0x0, 0x0, 0x0)
close(r1)

16:29:33 executing program 0:
sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="054a38", @ANYRES16, @ANYBLOB="6ffe000000000000000003000000580001800d0001007564"], 0x3}}, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x2, [@fwd, @array, @array, @const={0xb}]}}, 0x0, 0x62}, 0x20)
select(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100686cca8000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4807, 0x0)

16:29:33 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="000e003f0000007e5bc5795e0800", 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40)

16:29:33 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x1)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

16:29:33 executing program 2:
r0 = socket$netlink(0x10, 0x3, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
r2 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa)
sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000000000000002", @ANYRES32=r3, @ANYBLOB="0000400000000002280012000c00010076657468"], 0x48}}, 0x0)
r4 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r3}, [@IFA_LOCAL={0x8, 0x2, @local}]}, 0x20}}, 0x0)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r5=>0xffffffffffffffff})
r6 = socket$inet6_tcp(0xa, 0x1, 0x0)
r7 = dup2(r5, r6)
ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200)
sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)=@ipv4_deladdr={0x18, 0x15, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r3}}, 0x18}}, 0x0)

16:29:33 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="000e003f0000007e5bc5795e0800", 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40)

16:29:33 executing program 5:
r0 = socket$netlink(0x10, 0x3, 0x0)
bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc)
setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4)
r1 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, 0x0, 0x0)

[  221.965656] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'.
16:29:33 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x1)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

16:29:33 executing program 1:
pipe(&(0x7f00000000c0)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
close(r0)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0)
faccessat(r2, &(0x7f0000000000)='./bus\x00', 0x3, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, <r3=>0x0}, &(0x7f0000000040)=0xc)
fchown(0xffffffffffffffff, r3, 0x0)
r4 = socket$nl_route(0x10, 0x3, 0x0)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, <r5=>0x0}, &(0x7f0000000080)=0xc)
setfsgid(r5)
fchown(0xffffffffffffffff, r3, r5)
mq_open(&(0x7f0000000100)='[-:/\x00', 0x80, 0x2, &(0x7f0000000180)={0x3f, 0x880, 0x10001, 0xb9b})
getgid()
r6 = fcntl$dupfd(r0, 0x0, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200)
r7 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\xafa\xac', 0x4)
lseek(r7, 0xfffffffffffffffd, 0x4)

[  222.050893] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
16:29:33 executing program 3:
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="000e003f0000007e5bc5795e0800", 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40)

16:29:34 executing program 5:
r0 = socket$netlink(0x10, 0x3, 0x0)
bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc)
setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4)
r1 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0)

[  222.106708] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  222.145971] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock
16:29:34 executing program 3:
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="000e003f0000007e5bc5795e0800", 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40)

[  222.190859] EXT4-fs (loop0): no journal found
16:29:34 executing program 5:
r0 = socket$netlink(0x10, 0x3, 0x0)
bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc)
setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4)
r1 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0)

[  222.358327] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'.
16:29:34 executing program 0:
sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="054a38", @ANYRES16, @ANYBLOB="6ffe000000000000000003000000580001800d0001007564"], 0x3}}, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x2, [@fwd, @array, @array, @const={0xb}]}}, 0x0, 0x62}, 0x20)
select(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100686cca8000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4807, 0x0)

16:29:34 executing program 3:
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="000e003f0000007e5bc5795e0800", 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40)

16:29:34 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x1)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

16:29:34 executing program 5:
r0 = socket$netlink(0x10, 0x3, 0x0)
bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc)
setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4)
r1 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0)

16:29:34 executing program 1:
pipe(&(0x7f00000000c0)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
close(r0)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0)
faccessat(r2, &(0x7f0000000000)='./bus\x00', 0x3, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, <r3=>0x0}, &(0x7f0000000040)=0xc)
fchown(0xffffffffffffffff, r3, 0x0)
r4 = socket$nl_route(0x10, 0x3, 0x0)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, <r5=>0x0}, &(0x7f0000000080)=0xc)
setfsgid(r5)
fchown(0xffffffffffffffff, r3, r5)
mq_open(&(0x7f0000000100)='[-:/\x00', 0x80, 0x2, &(0x7f0000000180)={0x3f, 0x880, 0x10001, 0xb9b})
getgid()
r6 = fcntl$dupfd(r0, 0x0, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200)
r7 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\xafa\xac', 0x4)
lseek(r7, 0xfffffffffffffffd, 0x4)

16:29:34 executing program 2:
pipe(&(0x7f0000000000)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c000000020601000000000000000000000000080e0003006269746d61703a697000000005000400000000000900020073797a3000000000240007800c00028008000140ac1e00010c00018008000140a0000000050014000800000005000500020000000500010006"], 0x1}}, 0x0)
close(r2)
socket$nl_netfilter(0x10, 0x3, 0xc)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={<r3=>0xffffffffffffffff})
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
splice(r0, 0x0, r2, 0x0, 0x6209, 0x0)

16:29:34 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x1)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

16:29:34 executing program 3:
r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="000e003f0000007e5bc5795e0800", 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40)

16:29:34 executing program 5:
r0 = socket$netlink(0x10, 0x3, 0x0)
bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc)
setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4)
r1 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0)

16:29:34 executing program 1:
syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @multicast2, @broadcast}, {0x12, 0x0, 0x0, @multicast1}}}}}, 0x0)

16:29:34 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x1)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

16:29:34 executing program 3:
r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="000e003f0000007e5bc5795e0800", 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40)

[  222.949617] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  222.994177] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  223.036468] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  223.045731] EXT4-fs (loop0): no journal found
16:29:35 executing program 0:
sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="054a38", @ANYRES16, @ANYBLOB="6ffe000000000000000003000000580001800d0001007564"], 0x3}}, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x2, [@fwd, @array, @array, @const={0xb}]}}, 0x0, 0x62}, 0x20)
select(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100686cca8000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4807, 0x0)

16:29:35 executing program 5:
r0 = socket$netlink(0x10, 0x3, 0x0)
bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc)
setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4)
r1 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0)

16:29:35 executing program 1:
sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x9)
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080))
read(r0, &(0x7f0000000200)=""/231, 0x1000006ce)
r1 = syz_open_pts(r0, 0x0)
r2 = syz_open_procfs(0x0, &(0x7f0000000000)='pagemap\x00')
dup2(r2, r1)

16:29:35 executing program 3:
r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="000e003f0000007e5bc5795e0800", 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40)

16:29:35 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x1)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

16:29:35 executing program 2:
pipe(&(0x7f0000000000)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c000000020601000000000000000000000000080e0003006269746d61703a697000000005000400000000000900020073797a3000000000240007800c00028008000140ac1e00010c00018008000140a0000000050014000800000005000500020000000500010006"], 0x1}}, 0x0)
close(r2)
socket$nl_netfilter(0x10, 0x3, 0xc)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={<r3=>0xffffffffffffffff})
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
splice(r0, 0x0, r2, 0x0, 0x6209, 0x0)

16:29:35 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="000e003f0000007e5bc5795e0800", 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40)

16:29:35 executing program 5:
r0 = socket$netlink(0x10, 0x3, 0x0)
bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc)
setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4)
r1 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0)

16:29:35 executing program 1:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000180)="bad75e693175ff4ccfc4", 0xff4a}, {&(0x7f0000000300)="76df8cfefa7ddac22dcfcf9e000ca94f344e4dd28a9ec9014befb0ea01a514ea8c7c66e5e88e77a778affc2a2030f7fbfa96fe6c14a0c75aee26637a81e3bcb693e7513645eb550c7adad4103ebae473f42372227fa39722490bdd9f2774cffe4bd03c9975ba4b0cc3d7c3788e745965108c630cc26d19369cc660d3ccbf2feaeb4603347ab0c8dd0fd14bd500000000000000", 0xffffffffffffffb6}], 0x1, 0xb)
close(r1)
r2 = socket(0x10, 0x803, 0x0)
r3 = dup(r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
write(0xffffffffffffffff, &(0x7f0000000180)="220000001400256304000000000000040208031301", 0x15)
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000180)=ANY=[@ANYBLOB="240500002a"], 0x1}}, 0x0)
splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0)

16:29:35 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
dup(r0)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r1, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x1)
bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r1, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r1, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r1}], 0x1, 0xff)
close(r1)

16:29:35 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000005000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fec68cb7d18ad181867514fe60077d4dd90123d27e7cf43548ee85857ad4a77cb56e0fcb3dfd4e70eaec677d6ac14c2c794f72cbf5fe31789e70227bfd8115efd90c8c48258f8dbe82e16cf00000000000000000000000000000000000000000000000000000200e2fd45d54b107c8c247f195e32f13799d6707432ff48bc085760314166443ce72c74f3db890e1ff15a10d91f27ad2a986e0e244bd117252e47ffda1a869db7e632df4de857231db422bdffd3135480dae93c7e33bdef00000000d8fd8c79a5d0967ab7e43686b4d1e03e326beea7905ef7de3749f8bc8143df20d13c37db269971210fab7071cc3094078a044777aab9d86cf50afefd7b72a0950d389bc9cb43aa607b7269561dd50b22bd2491331818a10f2ac8c3249582a20d4e04fd1ab7883f656b84137d5f7a6edba86a7b9a4c2f3b3a8abf93b280ea53ce01dcc2d30f4310e8281b0cdc017f9759060ea88a2f6597e966a85c9a74ca196700218f919746bb4b84c16fd56ee452e411d75ab7613b644ba7580b2a0942394ed1737517eed1c892422f54d5a2e1cf1a60fe2dcc1a465aa8d54cb4000053c3f01ea714a7bd644b4a44b807c9765cc7ef43c3cc0a6ad3d3976656d475dd2ed789004be03884e042acb104431333b50ff695516c1dd2e35f09c7a1f97f9561f62837e1d38eab98e6a7285bb0c6c1d0b9abc4b5705eb1073fe63e88f6ff7e510c2795288a69aa52ff32a89c9bd496d5d61d02cd950200226b3098ec9215fcf5becbfd7b53b4c65b74873ae66ba6d7376bc7354c34a49c0421c200000000000000000000000000000011ec85f9721e2ad7e7953224e4a0adc84adcdd323dc99b2a98827b55e4acc903d11121abf11d936e9a9c33f304878aa0a33beba6f628b81f6e67ae1f9fac36a1680a2b02b4aa3920a6d850a9b44ede4fab93b28cc6185403e603120303e5a0bb7992cd821c9f8b754ab631699bd45503521aa9493e4013d25c90301a7c87de188e9e773ae60d3b5aa7ab418c2d6b8039202411cf990440f5d24a7d095dfd673faf2b68ccf1fee37c0ae062066c62ec93498b8da0db224613c5873d9ded9b39cce21fe876e8ff65aa75c0245be655e0b25265536b0d3ad411cea671bc4fc164d497"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="000e003f0000007e5bc5795e0800", 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40)

[  223.882972] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
16:29:35 executing program 5:
r0 = socket$netlink(0x10, 0x3, 0x0)
bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc)
setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4)
r1 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0)

[  223.933616] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  223.991094] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  224.014901] EXT4-fs (loop0): no journal found
16:29:36 executing program 0:
sendto$unix(0xffffffffffffffff, &(0x7f0000000340)="53e0f2c2905e9916912f89b23f54185c0e90b38551c81ae3767d56fec3150cd9bd2db58e164473806c6aaaf6964a26b0de86f5fe037f85ea25f3228e5e6dc4672b11ee7418224b4bed0d668c93d4ad2a975309402c1c195f2bd1a1263e107b177c6288fe6160086efbcd133bab74435a30e5da929fcd65882c970886e36ef38c162bf17422221915d31ea852afbc6f78df1ea10fd20bd8cf77e433", 0x9b, 0x0, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x2, [@fwd, @array, @array, @const={0xb}]}}, 0x0, 0x62}, 0x20)
select(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100686cca8000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4807, 0x0)

16:29:36 executing program 1:
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700)
bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040), 0x14)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700)
ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305839, &(0x7f0000000040))
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6612, 0x0)

16:29:36 executing program 5:
r0 = socket$netlink(0x10, 0x3, 0x0)
bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc)
setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4)
r1 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0)

16:29:36 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="000e003f0000007e5bc5795e0800", 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40)

16:29:36 executing program 2:
pipe(&(0x7f0000000000)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c000000020601000000000000000000000000080e0003006269746d61703a697000000005000400000000000900020073797a3000000000240007800c00028008000140ac1e00010c00018008000140a0000000050014000800000005000500020000000500010006"], 0x1}}, 0x0)
close(r2)
socket$nl_netfilter(0x10, 0x3, 0xc)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={<r3=>0xffffffffffffffff})
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
splice(r0, 0x0, r2, 0x0, 0x6209, 0x0)

16:29:36 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
dup(r0)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r1, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x1)
bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r1, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r1, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r1}], 0x1, 0xff)
close(r1)

16:29:36 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="000e003f0000007e5bc5795e0800", 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40)

16:29:36 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
dup(r0)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r1, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x1)
bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r1, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r1, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r1}], 0x1, 0xff)
close(r1)

16:29:36 executing program 5:
r0 = socket$netlink(0x10, 0x3, 0x0)
bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc)
setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4)
r1 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0)

16:29:36 executing program 1:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict={0x0, 0x0, 0x0, 0xa, 0x1}]}}, &(0x7f0000004600)=""/210, 0x26, 0xd2, 0x8}, 0x20)

16:29:36 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="000e003f0000007e5bc5795e0800", 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40)

[  224.732682] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  224.766298] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  224.775899] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock
16:29:36 executing program 5:
r0 = socket$netlink(0x10, 0x3, 0x0)
bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc)
setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4)
r1 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x20, 0x10, 0x801}, 0x20}}, 0x0)

[  224.814269] EXT4-fs error (device loop0): ext4_fill_super:4437: inode #2: comm syz-executor.0: iget: root inode unallocated
[  224.849522] EXT4-fs (loop0): get root inode failed
[  224.876991] EXT4-fs (loop0): mount failed
16:29:37 executing program 0:
sendto$unix(0xffffffffffffffff, &(0x7f0000000340)="53e0f2c2905e9916912f89b23f54185c0e90b38551c81ae3767d56fec3150cd9bd2db58e164473806c6aaaf6964a26b0de86f5fe037f85ea25f3228e5e6dc4672b11ee7418224b4bed0d668c93d4ad2a975309402c1c195f2bd1a1263e107b177c6288fe6160086efbcd133bab74435a30e5da929fcd65882c970886e36ef38c162bf17422221915d31ea852afbc6f78df1ea10fd20bd8cf77e433", 0x9b, 0x0, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x2, [@fwd, @array, @array, @const={0xb}]}}, 0x0, 0x62}, 0x20)
select(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100686cca8000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4807, 0x0)

16:29:37 executing program 1:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict={0x0, 0x0, 0x0, 0xa, 0x1}]}}, &(0x7f0000004600)=""/210, 0x26, 0xd2, 0x8}, 0x20)

16:29:37 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x1)
bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r0, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r0, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r0}], 0x1, 0xff)
close(r0)

16:29:37 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="000e003f0000007e5bc5795e0800", 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40)

16:29:37 executing program 5:
r0 = socket$netlink(0x10, 0x3, 0x0)
bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc)
setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4)
r1 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x20, 0x10, 0x801}, 0x20}}, 0x0)

16:29:37 executing program 2:
pipe(&(0x7f0000000000)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c000000020601000000000000000000000000080e0003006269746d61703a697000000005000400000000000900020073797a3000000000240007800c00028008000140ac1e00010c00018008000140a0000000050014000800000005000500020000000500010006"], 0x1}}, 0x0)
close(r2)
socket$nl_netfilter(0x10, 0x3, 0xc)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={<r3=>0xffffffffffffffff})
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
splice(r0, 0x0, r2, 0x0, 0x6209, 0x0)

16:29:37 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="000e003f0000007e5bc5795e0800", 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40)

16:29:37 executing program 5:
r0 = socket$netlink(0x10, 0x3, 0x0)
bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc)
setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4)
r1 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x20, 0x10, 0x801}, 0x20}}, 0x0)

16:29:37 executing program 1:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict={0x0, 0x0, 0x0, 0xa, 0x1}]}}, &(0x7f0000004600)=""/210, 0x26, 0xd2, 0x8}, 0x20)

16:29:37 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="000e003f0000007e5bc5795e0800", 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40)

16:29:37 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x1)
bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r0, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r0, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r0}], 0x1, 0xff)
close(r0)

[  225.607400] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  225.638206] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
16:29:37 executing program 1:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict={0x0, 0x0, 0x0, 0xa, 0x1}]}}, &(0x7f0000004600)=""/210, 0x26, 0xd2, 0x8}, 0x20)

[  225.690033] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  225.815148] EXT4-fs error (device loop0): ext4_fill_super:4437: inode #2: comm syz-executor.0: iget: root inode unallocated
[  225.845428] EXT4-fs (loop0): get root inode failed
[  225.869383] EXT4-fs (loop0): mount failed
16:29:38 executing program 0:
sendto$unix(0xffffffffffffffff, &(0x7f0000000340)="53e0f2c2905e9916912f89b23f54185c0e90b38551c81ae3767d56fec3150cd9bd2db58e164473806c6aaaf6964a26b0de86f5fe037f85ea25f3228e5e6dc4672b11ee7418224b4bed0d668c93d4ad2a975309402c1c195f2bd1a1263e107b177c6288fe6160086efbcd133bab74435a30e5da929fcd65882c970886e36ef38c162bf17422221915d31ea852afbc6f78df1ea10fd20bd8cf77e433", 0x9b, 0x0, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x2, [@fwd, @array, @array, @const={0xb}]}}, 0x0, 0x62}, 0x20)
select(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100686cca8000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4807, 0x0)

16:29:38 executing program 5:
r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0)
ioctl$FS_IOC_RESVSP(r0, 0x5421, &(0x7f0000000040))

16:29:38 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x1)
bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r0, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r0, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r0}], 0x1, 0xff)
close(r0)

16:29:38 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="000e003f0000007e5bc5795e0800", 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40)

16:29:38 executing program 1:
socket$kcm(0x2b, 0x1, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict={0x0, 0x0, 0x0, 0xa, 0x1}]}}, &(0x7f0000004600)=""/210, 0x26, 0xd2, 0x8}, 0x20)

16:29:38 executing program 2:
pipe(&(0x7f0000000000)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c000000020601000000000000000000000000080e0003006269746d61703a697000000005000400000000000900020073797a3000000000240007800c00028008000140ac1e00010c00018008000140a0000000050014000800000005000500020000000500010006"], 0x1}}, 0x0)
close(r2)
socket$nl_netfilter(0x10, 0x3, 0xc)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={<r3=>0xffffffffffffffff})
dup(r3)
splice(r0, 0x0, r2, 0x0, 0x6209, 0x0)

16:29:38 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="000e003f0000007e5bc5795e0800", 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40)

16:29:38 executing program 5:
r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0)
fcntl$F_GET_FILE_RW_HINT(r0, 0x8, 0x0)

16:29:38 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x1)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

16:29:38 executing program 1:
socket$kcm(0x2b, 0x1, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict={0x0, 0x0, 0x0, 0xa, 0x1}]}}, &(0x7f0000004600)=""/210, 0x26, 0xd2, 0x8}, 0x20)

16:29:38 executing program 5:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2, @broadcast}, 0x10)
r1 = socket$unix(0x1, 0x1, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
r3 = dup2(r2, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
sendto$inet(r0, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10)

[  226.473000] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  226.488916] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
16:29:38 executing program 1:
socket$kcm(0x2b, 0x1, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict={0x0, 0x0, 0x0, 0xa, 0x1}]}}, &(0x7f0000004600)=""/210, 0x26, 0xd2, 0x8}, 0x20)

[  226.518002] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  226.566417] EXT4-fs error (device loop0): ext4_fill_super:4437: inode #2: comm syz-executor.0: iget: root inode unallocated
[  226.594137] EXT4-fs (loop0): get root inode failed
[  226.614868] EXT4-fs (loop0): mount failed
16:29:39 executing program 0:
sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, 0x0, 0x0)
sendto$unix(0xffffffffffffffff, &(0x7f0000000340)="53e0f2c2905e9916912f89b23f54185c0e90b38551c81ae3767d56fec3150cd9bd2db58e164473806c6aaaf6964a26b0de86f5fe037f85ea25f3228e5e6dc4672b11ee7418224b4bed0d668c93d4ad2a975309402c1c195f2bd1a1263e107b177c6288fe6160086efbcd133bab74435a30e5da929fcd65882c970886e36ef38c162bf17422221915d31ea852afbc6f78df1ea10fd20bd8cf77e433", 0x9b, 0x0, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x2, [@fwd, @array, @array, @const={0xb}]}}, 0x0, 0x62}, 0x20)
select(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100686cca8000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4807, 0x0)

16:29:39 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="000e003f0000007e5bc5795e0800", 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40)

16:29:39 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x1)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

16:29:39 executing program 1:
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict={0x0, 0x0, 0x0, 0xa, 0x1}]}}, &(0x7f0000004600)=""/210, 0x26, 0xd2, 0x8}, 0x20)

16:29:39 executing program 5:
syz_emit_ethernet(0x32, &(0x7f0000001880)={@broadcast, @dev, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x11, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x30}}, {0x0, 0x0, 0x10, 0x0, @gue={{0x2}}}}}}}, 0x0)

16:29:39 executing program 2:
pipe(&(0x7f0000000000)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c000000020601000000000000000000000000080e0003006269746d61703a697000000005000400000000000900020073797a3000000000240007800c00028008000140ac1e00010c00018008000140a0000000050014000800000005000500020000000500010006"], 0x1}}, 0x0)
close(r2)
socket$nl_netfilter(0x10, 0x3, 0xc)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={<r3=>0xffffffffffffffff})
dup(r3)
splice(r0, 0x0, r2, 0x0, 0x6209, 0x0)

16:29:39 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="000e003f0000007e5bc5795e0800", 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40)

16:29:39 executing program 5:
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6612, 0x0)

16:29:39 executing program 1:
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict={0x0, 0x0, 0x0, 0xa, 0x1}]}}, &(0x7f0000004600)=""/210, 0x26, 0xd2, 0x8}, 0x20)

16:29:39 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x1)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

[  227.325221] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  227.351901] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
16:29:39 executing program 1:
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict={0x0, 0x0, 0x0, 0xa, 0x1}]}}, &(0x7f0000004600)=""/210, 0x26, 0xd2, 0x8}, 0x20)

16:29:39 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="000e003f0000007e5bc5795e0800", 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40)

[  227.413647] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  227.489056] EXT4-fs error (device loop0): ext4_fill_super:4437: inode #2: comm syz-executor.0: iget: root inode unallocated
[  227.517861] EXT4-fs (loop0): get root inode failed
[  227.540157] EXT4-fs (loop0): mount failed
16:29:39 executing program 1:
r0 = socket$kcm(0x2b, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict={0x0, 0x0, 0x0, 0xa, 0x1}]}}, &(0x7f0000004600)=""/210, 0x26, 0xd2, 0x8}, 0x20)

16:29:39 executing program 5:
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6612, 0x0)

16:29:39 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000005000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fec68cb7d18ad181867514fe60077d4dd90123d27e7cf43548ee85857ad4a77cb56e0fcb3dfd4e70eaec677d6ac14c2c794f72cbf5fe31789e70227bfd8115efd90c8c48258f8dbe82e16cf00000000000000000000000000000000000000000000000000000200e2fd45d54b107c8c247f195e32f13799d6707432ff48bc085760314166443ce72c74f3db890e1ff15a10d91f27ad2a986e0e244bd117252e47ffda1a869db7e632df4de857231db422bdffd3135480dae93c7e33bdef00000000d8fd8c79a5d0967ab7e43686b4d1e03e326beea7905ef7de3749f8bc8143df20d13c37db269971210fab7071cc3094078a044777aab9d86cf50afefd7b72a0950d389bc9cb43aa607b7269561dd50b22bd2491331818a10f2ac8c3249582a20d4e04fd1ab7883f656b84137d5f7a6edba86a7b9a4c2f3b3a8abf93b280ea53ce01dcc2d30f4310e8281b0cdc017f9759060ea88a2f"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="000e003f0000007e5bc5795e0800", 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40)

16:29:39 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r0 = dup(0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r1, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x1)
bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r1, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r1, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r1}], 0x1, 0xff)
close(r1)

16:29:39 executing program 2:
pipe(&(0x7f0000000000)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c000000020601000000000000000000000000080e0003006269746d61703a697000000005000400000000000900020073797a3000000000240007800c00028008000140ac1e00010c00018008000140a0000000050014000800000005000500020000000500010006"], 0x1}}, 0x0)
close(r2)
socket$nl_netfilter(0x10, 0x3, 0xc)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={<r3=>0xffffffffffffffff})
dup(r3)
splice(r0, 0x0, r2, 0x0, 0x6209, 0x0)

16:29:39 executing program 0:
sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, 0x0, 0x0)
sendto$unix(0xffffffffffffffff, &(0x7f0000000340)="53e0f2c2905e9916912f89b23f54185c0e90b38551c81ae3767d56fec3150cd9bd2db58e164473806c6aaaf6964a26b0de86f5fe037f85ea25f3228e5e6dc4672b11ee7418224b4bed0d668c93d4ad2a975309402c1c195f2bd1a1263e107b177c6288fe6160086efbcd133bab74435a30e5da929fcd65882c970886e36ef38c162bf17422221915d31ea852afbc6f78df1ea10fd20bd8cf77e433", 0x9b, 0x0, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x2, [@fwd, @array, @array, @const={0xb}]}}, 0x0, 0x62}, 0x20)
select(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100686cca8000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4807, 0x0)

16:29:39 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r0 = dup(0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r1, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x1)
bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r1, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r1, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r1}], 0x1, 0xff)
close(r1)

16:29:39 executing program 1:
r0 = socket$kcm(0x2b, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict={0x0, 0x0, 0x0, 0xa, 0x1}]}}, &(0x7f0000004600)=""/210, 0x26, 0xd2, 0x8}, 0x20)

16:29:40 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="000e003f0000007e5bc5795e0800", 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40)

16:29:40 executing program 5:
socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
sendmsg$inet(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x2, 0x4e21, @empty}, 0x10, &(0x7f0000000280)=[{0x0}], 0x1, &(0x7f0000000380)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @loopback, @dev={0xac, 0x14, 0x14, 0x3a}}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x7f}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private=0xa0100fe, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private=0xa010180, @remote}}}], 0x78}, 0x8000840)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480e0001000000e3bd6efb440009000e00040010000000028000001201", 0x2e}], 0x1}, 0x0)
r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0)
bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000200)={0xffffffffffffffff, r1, 0x0, 0x4}, 0x14)
ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x1)
r4 = socket$kcm(0x2c, 0x3, 0x0)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x200002, 0x0)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r')
close(r3)
ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000000)={r2})
gettid()
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1062, 0x0, 0x0, 0x9}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='eth0\\6\\vmnet1vmnet1\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30)
socket$kcm(0x2, 0x1, 0x84)
ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000004c0)='lo\x00\x96o8\x14d\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00y.\xfc*_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7f\r\xb2\xcf\x8a\xc9(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0-\x96\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc5<J\x1f\xba\xfc\x90(\x985\x93\xa8\xd4\xf0\xbdTy\x18\xc8\xa0\xbb\x99\x8c\xe0Q\xffCl\xbdX~3\xa1\xa2\xf4\xd9\xf7\xc7\xfb\xce\x959x\xfeW\r\xf0{\xcaT\xecp)=\x9d\xdfG8\xa1\xe3=\xa6\x00\x98\xc1\xb3\x91-\xab\'W\x8al?d<JN\xcb\xd4H\xb0')

16:29:40 executing program 1:
r0 = socket$kcm(0x2b, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict={0x0, 0x0, 0x0, 0xa, 0x1}]}}, &(0x7f0000004600)=""/210, 0x26, 0xd2, 0x8}, 0x20)

[  228.211206] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  228.242543] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
16:29:40 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="000e003f0000007e5bc5795e0800", 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40)

16:29:40 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r0 = dup(0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r1, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x1)
bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r1, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r1, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r1}], 0x1, 0xff)
close(r1)

[  228.283737] netlink: 'syz-executor.5': attribute type 4 has an invalid length.
[  228.292815] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock
16:29:40 executing program 1:
socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict={0x0, 0x0, 0x0, 0xa, 0x1}]}}, &(0x7f0000004600)=""/210, 0x26, 0xd2, 0x8}, 0x20)

[  228.373204] EXT4-fs error (device loop0): ext4_fill_super:4437: inode #2: comm syz-executor.0: iget: root inode unallocated
[  228.387815] device lo entered promiscuous mode
[  228.417295] EXT4-fs (loop0): get root inode failed
16:29:40 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="000e003f0000007e5bc5795e0800", 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40)

[  228.442823] EXT4-fs (loop0): mount failed
16:29:40 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x1)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

[  228.876695] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready
16:29:40 executing program 1:
socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict={0x0, 0x0, 0x0, 0xa, 0x1}]}}, &(0x7f0000004600)=""/210, 0x26, 0xd2, 0x8}, 0x20)

16:29:40 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000005000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fec68cb7d18ad181867514fe60077d4dd90123d27e7cf43548ee85857ad4a77cb56e0fcb3dfd4e70eaec677d6ac14c2c794f72cbf5fe31789e70227bfd8115efd90c8c48258f8dbe82e16cf00000000000000000000000000000000000000000000000000000200e2fd45d54b107c8c247f195e32f13799d6707432ff48bc085760314166443ce72c74f3db890e1ff15a10d91f27ad2a986e0e244bd117252e47ffda1a869db7e632df4de857231db422bdffd3135480dae93c7e33bdef00000000d8fd8c79a5d0967ab7e43686b4d1e03e326beea7905ef7de3749f8bc8143df20d13c37db269971210fab7071cc3094078a044777aab9d86cf50afefd7b72a0950d389bc9cb43aa607b7269561dd50b22bd2491331818a10f2ac8c3249582a20d4e04fd1ab7883f656b84137d5f7a6edba86a7b9a4c2f3b3a8abf93b280ea53ce01dcc2d30f4310e8281b0cdc017f9759060ea88a2f6597e966a85c9a74ca196700218f919746bb4b84c16fd56ee452e411d75ab7613b644ba7580b2a0942394ed1737517eed1c892422f54d5a2e1cf1a60fe2dcc1a465aa8d54cb4000053c3f01ea714a7bd644b4a44b807c9765cc7ef43c3cc0a6ad3d3976656d475dd2ed789004be03884e042acb104431333b50ff695516c1dd2e35f09c7a1f97f9561f62837e1d38eab98e6a7285bb0c6c1d0b9abc4b5705eb1073fe63e88f6ff7e510c2795288a69aa52ff32a89c9bd496d5d61d02cd950200226b3098ec9215fcf5becbfd7b53b4c65b74873ae66ba6d7376bc7354c34a49c0421c200000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="000e003f0000007e5bc5795e0800", 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40)

16:29:40 executing program 2:
pipe(&(0x7f0000000000)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c000000020601000000000000000000000000080e0003006269746d61703a697000000005000400000000000900020073797a3000000000240007800c00028008000140ac1e00010c00018008000140a0000000050014000800000005000500020000000500010006"], 0x1}}, 0x0)
close(r2)
socket$nl_netfilter(0x10, 0x3, 0xc)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0))
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
splice(r0, 0x0, r2, 0x0, 0x6209, 0x0)

16:29:40 executing program 0:
sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, 0x0, 0x0)
sendto$unix(0xffffffffffffffff, &(0x7f0000000340)="53e0f2c2905e9916912f89b23f54185c0e90b38551c81ae3767d56fec3150cd9bd2db58e164473806c6aaaf6964a26b0de86f5fe037f85ea25f3228e5e6dc4672b11ee7418224b4bed0d668c93d4ad2a975309402c1c195f2bd1a1263e107b177c6288fe6160086efbcd133bab74435a30e5da929fcd65882c970886e36ef38c162bf17422221915d31ea852afbc6f78df1ea10fd20bd8cf77e433", 0x9b, 0x0, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x2, [@fwd, @array, @array, @const={0xb}]}}, 0x0, 0x62}, 0x20)
select(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100686cca8000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4807, 0x0)

16:29:40 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x1)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

[  229.126671] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  229.153916] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  229.182823] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  229.228500] EXT4-fs error (device loop0): ext4_fill_super:4437: inode #2: comm syz-executor.0: iget: root inode unallocated
[  229.272097] EXT4-fs (loop0): get root inode failed
[  229.288064] EXT4-fs (loop0): mount failed
16:29:41 executing program 5:
socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
sendmsg$inet(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x2, 0x4e21, @empty}, 0x10, &(0x7f0000000280)=[{0x0}], 0x1, &(0x7f0000000380)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @loopback, @dev={0xac, 0x14, 0x14, 0x3a}}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x7f}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private=0xa0100fe, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private=0xa010180, @remote}}}], 0x78}, 0x8000840)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480e0001000000e3bd6efb440009000e00040010000000028000001201", 0x2e}], 0x1}, 0x0)
r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0)
bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000200)={0xffffffffffffffff, r1, 0x0, 0x4}, 0x14)
ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x1)
r4 = socket$kcm(0x2c, 0x3, 0x0)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x200002, 0x0)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r')
close(r3)
ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000000)={r2})
gettid()
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1062, 0x0, 0x0, 0x9}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='eth0\\6\\vmnet1vmnet1\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30)
socket$kcm(0x2, 0x1, 0x84)
ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000004c0)='lo\x00\x96o8\x14d\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00y.\xfc*_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7f\r\xb2\xcf\x8a\xc9(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0-\x96\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc5<J\x1f\xba\xfc\x90(\x985\x93\xa8\xd4\xf0\xbdTy\x18\xc8\xa0\xbb\x99\x8c\xe0Q\xffCl\xbdX~3\xa1\xa2\xf4\xd9\xf7\xc7\xfb\xce\x959x\xfeW\r\xf0{\xcaT\xecp)=\x9d\xdfG8\xa1\xe3=\xa6\x00\x98\xc1\xb3\x91-\xab\'W\x8al?d<JN\xcb\xd4H\xb0')

16:29:41 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="000e003f0000007e5bc5795e0800", 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40)

16:29:41 executing program 1:
socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict={0x0, 0x0, 0x0, 0xa, 0x1}]}}, &(0x7f0000004600)=""/210, 0x26, 0xd2, 0x8}, 0x20)

16:29:41 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x1)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

16:29:41 executing program 1:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict={0x0, 0x0, 0x0, 0xa, 0x1}]}}, &(0x7f0000004600)=""/210, 0x26, 0xd2, 0x8}, 0x20)

16:29:41 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="000e003f0000007e5bc5795e0800", 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40)

[  229.502076] netlink: 'syz-executor.5': attribute type 4 has an invalid length.
16:29:41 executing program 4:
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x1)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

16:29:41 executing program 1:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict={0x0, 0x0, 0x0, 0xa, 0x1}]}}, &(0x7f0000004600)=""/210, 0x26, 0xd2, 0x8}, 0x20)

16:29:41 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="000e003f0000007e5bc5795e0800", 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40)

[  229.600064] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready
16:29:41 executing program 2:
pipe(&(0x7f0000000000)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c000000020601000000000000000000000000080e0003006269746d61703a697000000005000400000000000900020073797a3000000000240007800c00028008000140ac1e00010c00018008000140a0000000050014000800000005000500020000000500010006"], 0x1}}, 0x0)
close(r2)
socket$nl_netfilter(0x10, 0x3, 0xc)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0))
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
splice(r0, 0x0, r2, 0x0, 0x6209, 0x0)

16:29:41 executing program 5:
socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
sendmsg$inet(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x2, 0x4e21, @empty}, 0x10, &(0x7f0000000280)=[{0x0}], 0x1, &(0x7f0000000380)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @loopback, @dev={0xac, 0x14, 0x14, 0x3a}}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x7f}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private=0xa0100fe, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private=0xa010180, @remote}}}], 0x78}, 0x8000840)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480e0001000000e3bd6efb440009000e00040010000000028000001201", 0x2e}], 0x1}, 0x0)
r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0)
bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000200)={0xffffffffffffffff, r1, 0x0, 0x4}, 0x14)
ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x1)
r4 = socket$kcm(0x2c, 0x3, 0x0)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x200002, 0x0)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r')
close(r3)
ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000000)={r2})
gettid()
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1062, 0x0, 0x0, 0x9}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='eth0\\6\\vmnet1vmnet1\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30)
socket$kcm(0x2, 0x1, 0x84)
ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000004c0)='lo\x00\x96o8\x14d\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00y.\xfc*_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7f\r\xb2\xcf\x8a\xc9(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0-\x96\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc5<J\x1f\xba\xfc\x90(\x985\x93\xa8\xd4\xf0\xbdTy\x18\xc8\xa0\xbb\x99\x8c\xe0Q\xffCl\xbdX~3\xa1\xa2\xf4\xd9\xf7\xc7\xfb\xce\x959x\xfeW\r\xf0{\xcaT\xecp)=\x9d\xdfG8\xa1\xe3=\xa6\x00\x98\xc1\xb3\x91-\xab\'W\x8al?d<JN\xcb\xd4H\xb0')

16:29:41 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000005000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fec68cb7d18ad181867514fe60077d4dd90123d27e7cf43548ee85857ad4a77cb56e0fcb3dfd4e70eaec677d6ac14c2c794f72cbf5fe31789e70227bfd8115efd90c8c48258f8dbe82e16cf00000000000000000000000000000000000000000000000000000200e2fd45d54b107c8c247f195e32f13799d6707432ff48bc085760314166443ce72c74f3db890e1ff15a10d91f27ad2a986e0e244bd117252e47ffda1a869db7e632df4de857231db422bdffd3135480dae93c7e33bdef00000000d8fd8c79a5d0967ab7e43686b4d1e03e326beea7905ef7de3749f8bc8143df20d13c37db269971210fab7071cc3094078a044777aab9d86cf50afefd7b72a0950d389bc9cb43aa607b7269561dd50b22bd2491331818a10f2ac8c3249582a20d4e04fd1ab7883f656b84137d5f7a6edba86a7b9a4c2f3b3a8abf93b280ea53ce01dcc2d30f4310e8281b0cdc017f9759060ea88a2f6597e966a85c9a74ca196700218f919746bb4b84c16fd56ee452e411d75ab7613b644ba7580b2a0942394ed1737517eed1c892422f54d5a2e1cf1a60fe2dcc1a465aa8d54cb4000053c3f01ea714a7bd644b4a44b807c9765cc7ef43c3cc0a6ad3d3976656d475dd2ed789004be03884e042acb104431333b50ff695516c1dd2e35f09c7a1f97f9561f62837e1d38eab98e6a7285bb0c6c1d0b9abc4b5705eb1073fe63e88f6ff7e510c2795288a69aa52ff32a89c9bd496d5d61d02cd950200226b3098ec9215fcf5becbfd7b53b4c65b74873ae66ba6d7376bc7354c34a49c0421c200000000000000000000000000000011ec85f9721e2ad7e7953224e4a0adc84adcdd323dc99b2a98827b55e4acc903d11121abf11d936e9a9c33f304878aa0a33beba6f628b81f6e67ae1f9fac36a1680a2b02b4aa3920a6d850a9b44ede4fab93b28cc6185403e603120303e5a0bb7992cd821c9f8b754ab631699bd45503521aa9493e4013d25c90301a7c87de188e9e773ae60d3b5aa7ab418c2d6b8039202411cf990440f5d24a7d095dfd673faf2b68ccf1fee3"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="000e003f0000007e5bc5795e0800", 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40)

16:29:41 executing program 1:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict={0x0, 0x0, 0x0, 0xa, 0x1}]}}, &(0x7f0000004600)=""/210, 0x26, 0xd2, 0x8}, 0x20)

16:29:41 executing program 4:
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x1)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

16:29:41 executing program 0:
sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0)
sendto$unix(0xffffffffffffffff, &(0x7f0000000340)="53e0f2c2905e9916912f89b23f54185c0e90b38551c81ae3767d56fec3150cd9bd2db58e164473806c6aaaf6964a26b0de86f5fe037f85ea25f3228e5e6dc4672b11ee7418224b4bed0d668c93d4ad2a975309402c1c195f2bd1a1263e107b177c6288fe6160086efbcd133bab74435a30e5da929fcd65882c970886e36ef38c162bf17422221915d31ea852afbc6f78df1ea10fd20bd8cf77e433", 0x9b, 0x0, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x2, [@fwd, @array, @array, @const={0xb}]}}, 0x0, 0x62}, 0x20)
select(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100686cca8000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4807, 0x0)

16:29:41 executing program 1:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)

16:29:41 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="000e003f0000007e5bc5795e0800", 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40)

16:29:41 executing program 4:
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x1)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

[  229.953510] netlink: 'syz-executor.5': attribute type 4 has an invalid length.
[  230.035968] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  230.075173] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
16:29:41 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="000e003f0000007e5bc5795e0800", 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40)

[  230.109516] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  230.136111] EXT4-fs error (device loop0): ext4_fill_super:4437: inode #2: comm syz-executor.0: iget: root inode unallocated
16:29:42 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="000e003f0000007e5bc5795e0800", 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40)

[  230.184647] EXT4-fs (loop0): get root inode failed
[  230.198062] EXT4-fs (loop0): mount failed
16:29:42 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000005000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fec68cb7d18ad181867514fe60077d4dd90123d27e7cf43548ee85857ad4a77cb56e0fcb3dfd4e70eaec677d6ac14c2c794f72cbf5fe31789e70227bfd8115efd90c8c48258f8dbe82e16cf00000000000000000000000000000000000000000000000000000200e2fd45d54b107c8c247f195e32f13799d6707432ff48bc085760314166443ce72c74f3db890e1ff15a10d91f27ad2a986e0e244bd117252e47ffda1a869db7e632df4de857231db422bdffd3135480dae93c7e33bdef00000000d8fd8c79a5d0967ab7e43686b4d1e03e326beea7905ef7de3749f8bc8143df20d13c37db269971210fab7071cc3094078a044777aab9d86cf50afefd7b72a0950d389bc9cb43aa607b7269561dd50b22bd2491331818a10f2ac8c3249582a20d4e04fd1ab7883f656b84137d5f7a6edba86a7b9a4c2f3b3a8abf93b280ea53ce01dcc2d30f4310e8281b0cdc017f9759060ea88a2f6597e966a85c9a74ca196700218f919746bb4b84c16fd56ee452e411d75ab7613b644ba7580b2a0942394ed1737517eed1c892422f54d5a2e1cf1a60fe2dcc1a465aa8d54cb4000053c3f01ea714a7bd644b4a44b807c9765cc7ef43c3cc0a6ad3d3976656d475dd2ed789004be03884e042acb104431333b50ff695516c1dd2e35f09c7a1f97f9561f62837e1d38eab98e6a7285bb0c6c1d0b9abc4b5705eb1073fe63e88f6ff7e510c2795288a69aa52ff32a89c9bd496d5d61d02cd950200226b3098ec9215fcf5becbfd7b53b4c65b74873ae66ba6d7376bc7354c34a49c0421c200000000000000000000000000000011ec85f9721e2ad7e7953224e4a0adc84adcdd323dc99b2a98827b55e4acc903d11121abf11d936e9a9c33f304878aa0a33beba6f628b81f6e67ae1f9fac36a1680a2b02b4aa3920a6d850a9b44ede4fab93b28cc6185403e603120303e5a0bb7992cd821c9f8b754ab631699bd45503521aa9493e4013d25c90301a7c87de188e9e773ae60d3b5aa7ab418c2d6b8039202411cf990440f5d24a7d095dfd673faf2b68ccf1fee37c0ae062066c62ec93498b8da0db224613c5873d9ded9b39cce21fe876"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="000e003f0000007e5bc5795e0800", 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40)

[  230.448058] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready
16:29:42 executing program 2:
pipe(&(0x7f0000000000)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c000000020601000000000000000000000000080e0003006269746d61703a697000000005000400000000000900020073797a3000000000240007800c00028008000140ac1e00010c00018008000140a0000000050014000800000005000500020000000500010006"], 0x1}}, 0x0)
close(r2)
socket$nl_netfilter(0x10, 0x3, 0xc)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0))
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
splice(r0, 0x0, r2, 0x0, 0x6209, 0x0)

16:29:42 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="000e003f0000007e5bc5795e0800", 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40)

16:29:42 executing program 1:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)

16:29:42 executing program 4:
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x1)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

16:29:42 executing program 5:
bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0)
ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000140)=r1)
openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
gettid()
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="05804ab382844306d758e620b9dc", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

16:29:42 executing program 0:
sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0)
sendto$unix(0xffffffffffffffff, &(0x7f0000000340)="53e0f2c2905e9916912f89b23f54185c0e90b38551c81ae3767d56fec3150cd9bd2db58e164473806c6aaaf6964a26b0de86f5fe037f85ea25f3228e5e6dc4672b11ee7418224b4bed0d668c93d4ad2a975309402c1c195f2bd1a1263e107b177c6288fe6160086efbcd133bab74435a30e5da929fcd65882c970886e36ef38c162bf17422221915d31ea852afbc6f78df1ea10fd20bd8cf77e433", 0x9b, 0x0, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x2, [@fwd, @array, @array, @const={0xb}]}}, 0x0, 0x62}, 0x20)
select(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100686cca8000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4807, 0x0)

16:29:42 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="000e003f0000007e5bc5795e0800", 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40)

16:29:42 executing program 5:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000003c0)="2e000000120081aee4050cecdb4cb9040a485e510befccd77f3e9cf0758ef9000600b0eba06ac400040000000000", 0x2e}], 0x1}, 0x0)
recvmsg(r1, &(0x7f0000003780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88a8ffff}, 0x0)

16:29:42 executing program 4:
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x1)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

16:29:42 executing program 1:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)

16:29:42 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="000e003f0000007e5bc5795e0800", 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40)

[  230.892193] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.5'.
16:29:42 executing program 1:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000004600)=""/210, 0x0, 0xd2, 0x8}, 0x20)

[  230.932531] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  230.962489] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  230.973936] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.5'.
[  231.011735] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  231.062373] EXT4-fs error (device loop0): ext4_fill_super:4437: inode #2: comm syz-executor.0: iget: root inode unallocated
[  231.091724] EXT4-fs (loop0): get root inode failed
[  231.115844] EXT4-fs (loop0): mount failed
16:29:43 executing program 2:
pipe(&(0x7f0000000000)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c000000020601000000000000000000000000080e0003006269746d61703a697000000005000400000000000900020073797a3000000000240007800c00028008000140ac1e00010c00018008000140a0000000050014000800000005000500020000000500010006"], 0x1}}, 0x0)
close(r2)
socket$nl_netfilter(0x10, 0x3, 0xc)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
r3 = dup(0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
splice(r0, 0x0, r2, 0x0, 0x6209, 0x0)

16:29:43 executing program 4:
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x1)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

16:29:43 executing program 5:
bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
gettid()
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="05804ab382844306d758e620b9dc", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

16:29:43 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000005000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fec68cb7d18ad181867514fe60077d4dd90123d27e7cf43548ee85857ad4a77cb56e0fcb3dfd4e70eaec677d6ac14c2c794f72cbf5fe31789e70227bfd8115efd90c8c48258f8dbe82e16cf00000000000000000000000000000000000000000000000000000200e2fd45d54b107c8c247f195e32f13799d6707432ff48bc085760314166443ce72c74f3db890e1ff15a10d91f27ad2a986e0e244bd117252e47ffda1a869db7e632df4de857231db422bdffd3135480dae93c7e33bdef00000000d8fd8c79a5d0967ab7e43686b4d1e03e326beea7905ef7de3749f8bc8143df20d13c37db269971210fab7071cc3094078a044777aab9d86cf50afefd7b72a0950d389bc9cb43aa607b7269561dd50b22bd2491331818a10f2ac8c3249582a20d4e04fd1ab7883f656b84137d5f7a6edba86a7b9a4c2f3b3a8abf93b280ea53ce01dcc2d30f4310e8281b0cdc017f9759060ea88a2f6597e966a85c9a74ca196700218f919746bb4b84c16fd56ee452e411d75ab7613b644ba7580b2a0942394ed1737517eed1c892422f54d5a2e1cf1a60fe2dcc1a465aa8d54cb4000053c3f01ea714a7bd644b4a44b807c9765cc7ef43c3cc0a6ad3d3976656d475dd2ed789004be03884e042acb104431333b50ff695516c1dd2e35f09c7a1f97f9561f62837e1d38eab98e6a7285bb0c6c1d0b9abc4b5705eb1073fe63e88f6ff7e510c2795288a69aa52ff32a89c9bd496d5d61d02cd950200226b3098ec9215fcf5becbfd7b53b4c65b74873ae66ba6d7376bc7354c34a49c0421c200000000000000000000000000000011ec85f9721e2ad7e7953224e4a0adc84adcdd323dc99b2a98827b55e4acc903d11121abf11d936e9a9c33f304878aa0a33beba6f628b81f6e67ae1f9fac36a1680a2b02b4aa3920a6d850a9b44ede4fab93b28cc6185403e603120303e5a0bb7992cd821c9f8b754ab631699bd45503521aa9493e4013d25c90301a7c87de188e9e773ae60d3b5aa7ab418c2d6b8039202411cf990440f5d24a7d095dfd673faf2b68ccf1fee37c0ae062066c62ec93498b8da0db224613c5873d9ded9b39cce21fe876e8ff65aa75c0245be655e0b2526553"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="000e003f0000007e5bc5795e0800", 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40)

16:29:43 executing program 1:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000004600)=""/210, 0x0, 0xd2, 0x8}, 0x20)

16:29:43 executing program 0:
sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0)
sendto$unix(0xffffffffffffffff, &(0x7f0000000340)="53e0f2c2905e9916912f89b23f54185c0e90b38551c81ae3767d56fec3150cd9bd2db58e164473806c6aaaf6964a26b0de86f5fe037f85ea25f3228e5e6dc4672b11ee7418224b4bed0d668c93d4ad2a975309402c1c195f2bd1a1263e107b177c6288fe6160086efbcd133bab74435a30e5da929fcd65882c970886e36ef38c162bf17422221915d31ea852afbc6f78df1ea10fd20bd8cf77e433", 0x9b, 0x0, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x2, [@fwd, @array, @array, @const={0xb}]}}, 0x0, 0x62}, 0x20)
select(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100686cca8000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4807, 0x0)

16:29:43 executing program 4:
perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x1)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

16:29:43 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="000e003f0000007e5bc5795e0800", 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40)

16:29:43 executing program 1:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000004600)=""/210, 0x0, 0xd2, 0x8}, 0x20)

16:29:43 executing program 5:
r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000040)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)
setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
gettid()
r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="05804ab382844306d758e620b9dc", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

16:29:43 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="000e003f0000007e5bc5795e0800", 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40)

16:29:43 executing program 1:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000004600)=""/210, 0x1a, 0xd2, 0x8}, 0x20)

[  231.838926] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  231.868613] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  231.903316] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  231.942853] EXT4-fs error (device loop0): ext4_fill_super:4437: inode #2: comm syz-executor.0: iget: root inode unallocated
[  231.955617] EXT4-fs (loop0): get root inode failed
[  231.960786] EXT4-fs (loop0): mount failed
16:29:44 executing program 5:

16:29:44 executing program 2:
pipe(&(0x7f0000000000)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c000000020601000000000000000000000000080e0003006269746d61703a697000000005000400000000000900020073797a3000000000240007800c00028008000140ac1e00010c00018008000140a0000000050014000800000005000500020000000500010006"], 0x1}}, 0x0)
close(r2)
socket$nl_netfilter(0x10, 0x3, 0xc)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
r3 = dup(0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
splice(r0, 0x0, r2, 0x0, 0x6209, 0x0)

16:29:44 executing program 1:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000004600)=""/210, 0x1a, 0xd2, 0x8}, 0x20)

16:29:44 executing program 4:
perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x1)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

16:29:44 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000005000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fec68cb7d18ad181867514fe60077d4dd90123d27e7cf43548ee85857ad4a77cb56e0fcb3dfd4e70eaec677d6ac14c2c794f72cbf5fe31789e70227bfd8115efd90c8c48258f8dbe82e16cf00000000000000000000000000000000000000000000000000000200e2fd45d54b107c8c247f195e32f13799d6707432ff48bc085760314166443ce72c74f3db890e1ff15a10d91f27ad2a986e0e244bd117252e47ffda1a869db7e632df4de857231db422bdffd3135480dae93c7e33bdef00000000d8fd8c79a5d0967ab7e43686b4d1e03e326beea7905ef7de3749f8bc8143df20d13c37db269971210fab7071cc3094078a044777aab9d86cf50afefd7b72a0950d389bc9cb43aa607b7269561dd50b22bd2491331818a10f2ac8c3249582a20d4e04fd1ab7883f656b84137d5f7a6edba86a7b9a4c2f3b3a8abf93b280ea53ce01dcc2d30f4310e8281b0cdc017f9759060ea88a2f6597e966a85c9a74ca196700218f919746bb4b84c16fd56ee452e411d75ab7613b644ba7580b2a0942394ed1737517eed1c892422f54d5a2e1cf1a60fe2dcc1a465aa8d54cb4000053c3f01ea714a7bd644b4a44b807c9765cc7ef43c3cc0a6ad3d3976656d475dd2ed789004be03884e042acb104431333b50ff695516c1dd2e35f09c7a1f97f9561f62837e1d38eab98e6a7285bb0c6c1d0b9abc4b5705eb1073fe63e88f6ff7e510c2795288a69aa52ff32a89c9bd496d5d61d02cd950200226b3098ec9215fcf5becbfd7b53b4c65b74873ae66ba6d7376bc7354c34a49c0421c200000000000000000000000000000011ec85f9721e2ad7e7953224e4a0adc84adcdd323dc99b2a98827b55e4acc903d11121abf11d936e9a9c33f304878aa0a33beba6f628b81f6e67ae1f9fac36a1680a2b02b4aa3920a6d850a9b44ede4fab93b28cc6185403e603120303e5a0bb7992cd821c9f8b754ab631699bd45503521aa9493e4013d25c90301a7c87de188e9e773ae60d3b5aa7ab418c2d6b8039202411cf990440f5d24a7d095dfd673faf2b68ccf1fee37c0ae062066c62ec93498b8da0db224613c5873d9ded9b39cce21fe876e8ff65aa75c0245be655e0b25265536b0d3ad411cea6"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="000e003f0000007e5bc5795e0800", 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40)

16:29:44 executing program 0:
sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x3}}, 0x0)
sendto$unix(0xffffffffffffffff, &(0x7f0000000340)="53e0f2c2905e9916912f89b23f54185c0e90b38551c81ae3767d56fec3150cd9bd2db58e164473806c6aaaf6964a26b0de86f5fe037f85ea25f3228e5e6dc4672b11ee7418224b4bed0d668c93d4ad2a975309402c1c195f2bd1a1263e107b177c6288fe6160086efbcd133bab74435a30e5da929fcd65882c970886e36ef38c162bf17422221915d31ea852afbc6f78df1ea10fd20bd8cf77e433", 0x9b, 0x0, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x2, [@fwd, @array, @array, @const={0xb}]}}, 0x0, 0x62}, 0x20)
select(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100686cca8000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4807, 0x0)

16:29:44 executing program 4:
perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x1)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

16:29:44 executing program 5:

16:29:44 executing program 1:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000004600)=""/210, 0x1a, 0xd2, 0x8}, 0x20)

16:29:44 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="000e003f0000007e5bc5795e0800", 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40)

16:29:44 executing program 5:

16:29:44 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="000e003f0000007e5bc5795e0800", 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40)

[  232.760226] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  232.772757] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  232.782367] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  232.802938] EXT4-fs error (device loop0): ext4_fill_super:4437: inode #2: comm syz-executor.0: iget: root inode unallocated
[  232.817257] EXT4-fs (loop0): get root inode failed
[  232.824387] EXT4-fs (loop0): mount failed
16:29:45 executing program 2:
pipe(&(0x7f0000000000)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c000000020601000000000000000000000000080e0003006269746d61703a697000000005000400000000000900020073797a3000000000240007800c00028008000140ac1e00010c00018008000140a0000000050014000800000005000500020000000500010006"], 0x1}}, 0x0)
close(r2)
socket$nl_netfilter(0x10, 0x3, 0xc)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
r3 = dup(0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
splice(r0, 0x0, r2, 0x0, 0x6209, 0x0)

16:29:45 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x1)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

16:29:45 executing program 1:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict={0x0, 0x0, 0x0, 0xa}]}}, &(0x7f0000004600)=""/210, 0x26, 0xd2, 0x8}, 0x20)

16:29:45 executing program 5:

16:29:45 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="000e003f0000007e5bc5795e0800", 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40)

16:29:45 executing program 0:
sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x3}}, 0x0)
sendto$unix(0xffffffffffffffff, &(0x7f0000000340)="53e0f2c2905e9916912f89b23f54185c0e90b38551c81ae3767d56fec3150cd9bd2db58e164473806c6aaaf6964a26b0de86f5fe037f85ea25f3228e5e6dc4672b11ee7418224b4bed0d668c93d4ad2a975309402c1c195f2bd1a1263e107b177c6288fe6160086efbcd133bab74435a30e5da929fcd65882c970886e36ef38c162bf17422221915d31ea852afbc6f78df1ea10fd20bd8cf77e433", 0x9b, 0x0, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x2, [@fwd, @array, @array, @const={0xb}]}}, 0x0, 0x62}, 0x20)
select(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100686cca8000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4807, 0x0)

16:29:45 executing program 5:

16:29:45 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000005000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fec68cb7d18ad181867514fe60077d4dd90123d27e7cf43548ee85857ad4a77cb56e0fcb3dfd4e70eaec677d6ac14c2c794f72cbf5fe31789e70227bfd8115efd90c8c48258f8dbe82e16cf00000000000000000000000000000000000000000000000000000200e2fd45d54b107c8c247f195e32f13799d6707432ff48bc085760314166443ce72c74f3db890e1ff15a10d91f27ad2a986e0e244bd117252e47ffda1a869db7e632df4de857231db422bdffd3135480dae93c7e33bdef00000000d8fd8c79a5d0967ab7e43686b4d1e03e326beea7905ef7de3749f8bc8143df20d13c37db269971210fab7071cc3094078a044777aab9d86cf50afefd7b72a0950d389bc9cb43aa607b7269561dd50b22bd2491331818a10f2ac8c3249582a20d4e04fd1ab7883f656b84137d5f7a6edba86a7b9a4c2f3b3a8abf93b280ea53ce01dcc2d30f4310e8281b0cdc017f9759060ea88a2f6597e966a85c9a74ca196700218f919746bb4b84c16fd56ee452e411d75ab7613b644ba7580b2a0942394ed1737517eed1c892422f54d5a2e1cf1a60fe2dcc1a465aa8d54cb4000053c3f01ea714a7bd644b4a44b807c9765cc7ef43c3cc0a6ad3d3976656d475dd2ed789004be03884e042acb104431333b50ff695516c1dd2e35f09c7a1f97f9561f62837e1d38eab98e6a7285bb0c6c1d0b9abc4b5705eb1073fe63e88f6ff7e510c2795288a69aa52ff32a89c9bd496d5d61d02cd950200226b3098ec9215fcf5becbfd7b53b4c65b74873ae66ba6d7376bc7354c34a49c0421c200000000000000000000000000000011ec85f9721e2ad7e7953224e4a0adc84adcdd323dc99b2a98827b55e4acc903d11121abf11d936e9a9c33f304878aa0a33beba6f628b81f6e67ae1f9fac36a1680a2b02b4aa3920a6d850a9b44ede4fab93b28cc6185403e603120303e5a0bb7992cd821c9f8b754ab631699bd45503521aa9493e4013d25c90301a7c87de188e9e773ae60d3b5aa7ab418c2d6b8039202411cf990440f5d24a7d095dfd673faf2b68ccf1fee37c0ae062066c62ec93498b8da0db224613c5873d9ded9b39cce21fe876e8ff65aa75c0245be655e0b25265536b0d3ad411cea671bc4fc164d4"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="000e003f0000007e5bc5795e0800", 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40)

16:29:45 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x1)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

16:29:45 executing program 1:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict={0x0, 0x0, 0x0, 0xa}]}}, 0x0, 0x26, 0x0, 0x8}, 0x20)

16:29:45 executing program 5:

16:29:45 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="000e003f0000007e5bc5795e0800", 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40)

[  233.655713] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  233.670563] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  233.681985] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  233.704221] EXT4-fs error (device loop0): ext4_fill_super:4437: inode #2: comm syz-executor.0: iget: root inode unallocated
[  233.731026] EXT4-fs (loop0): get root inode failed
[  233.749137] EXT4-fs (loop0): mount failed
16:29:46 executing program 2:
pipe(&(0x7f0000000000)={<r0=>0xffffffffffffffff})
r1 = socket$inet_udp(0x2, 0x2, 0x0)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c000000020601000000000000000000000000080e0003006269746d61703a697000000005000400000000000900020073797a3000000000240007800c00028008000140ac1e00010c00018008000140a0000000050014000800000005000500020000000500010006"], 0x1}}, 0x0)
close(r1)
socket$nl_netfilter(0x10, 0x3, 0xc)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={<r2=>0xffffffffffffffff})
r3 = dup(r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
splice(r0, 0x0, r1, 0x0, 0x6209, 0x0)

16:29:46 executing program 1:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict={0x0, 0x0, 0x0, 0xa}]}}, 0x0, 0x26, 0x0, 0x8}, 0x20)

16:29:46 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x1)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

16:29:46 executing program 5:

16:29:46 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="000e003f0000007e5bc5795e0800", 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40)

16:29:46 executing program 0:
sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x3}}, 0x0)
sendto$unix(0xffffffffffffffff, &(0x7f0000000340)="53e0f2c2905e9916912f89b23f54185c0e90b38551c81ae3767d56fec3150cd9bd2db58e164473806c6aaaf6964a26b0de86f5fe037f85ea25f3228e5e6dc4672b11ee7418224b4bed0d668c93d4ad2a975309402c1c195f2bd1a1263e107b177c6288fe6160086efbcd133bab74435a30e5da929fcd65882c970886e36ef38c162bf17422221915d31ea852afbc6f78df1ea10fd20bd8cf77e433", 0x9b, 0x0, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x2, [@fwd, @array, @array, @const={0xb}]}}, 0x0, 0x62}, 0x20)
select(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100686cca8000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4807, 0x0)

16:29:46 executing program 1:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict={0x0, 0x0, 0x0, 0xa}]}}, 0x0, 0x26, 0x0, 0x8}, 0x20)

16:29:46 executing program 5:

16:29:46 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="000e003f0000007e5bc5795e0800", 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40)

16:29:46 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x1)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

16:29:46 executing program 5:

16:29:46 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="000e003f0000007e5bc5795e0800", 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40)

[  234.540911] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  234.584565] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  234.616235] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  234.661919] EXT4-fs error (device loop0): ext4_fill_super:4437: inode #2: comm syz-executor.0: iget: root inode unallocated
[  234.680609] EXT4-fs (loop0): get root inode failed
[  234.693535] EXT4-fs (loop0): mount failed
[  234.934988] NOHZ: local_softirq_pending 08
16:29:46 executing program 2:
pipe(&(0x7f0000000000)={<r0=>0xffffffffffffffff})
r1 = socket$inet_udp(0x2, 0x2, 0x0)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c000000020601000000000000000000000000080e0003006269746d61703a697000000005000400000000000900020073797a3000000000240007800c00028008000140ac1e00010c00018008000140a0000000050014000800000005000500020000000500010006"], 0x1}}, 0x0)
close(r1)
socket$nl_netfilter(0x10, 0x3, 0xc)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={<r2=>0xffffffffffffffff})
r3 = dup(r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
splice(r0, 0x0, r1, 0x0, 0x6209, 0x0)

16:29:46 executing program 5:

16:29:46 executing program 1:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict={0x0, 0x0, 0x0, 0xa}]}}, &(0x7f0000004600)=""/210, 0x26, 0xd2}, 0x20)

16:29:46 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x1)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

16:29:46 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="000e003f0000007e5bc5795e0800", 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40)

16:29:47 executing program 0:
sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="054a38", @ANYRES16], 0x3}}, 0x0)
sendto$unix(0xffffffffffffffff, &(0x7f0000000340)="53e0f2c2905e9916912f89b23f54185c0e90b38551c81ae3767d56fec3150cd9bd2db58e164473806c6aaaf6964a26b0de86f5fe037f85ea25f3228e5e6dc4672b11ee7418224b4bed0d668c93d4ad2a975309402c1c195f2bd1a1263e107b177c6288fe6160086efbcd133bab74435a30e5da929fcd65882c970886e36ef38c162bf17422221915d31ea852afbc6f78df1ea10fd20bd8cf77e433", 0x9b, 0x0, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x2, [@fwd, @array, @array, @const={0xb}]}}, 0x0, 0x62}, 0x20)
select(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100686cca8000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4807, 0x0)

16:29:47 executing program 5:

16:29:47 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="000e003f0000007e5bc5795e0800", 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40)

16:29:47 executing program 1:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict={0x0, 0x0, 0x0, 0xa}]}}, &(0x7f0000004600)=""/210, 0x26, 0xd2}, 0x20)

16:29:47 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x1)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

16:29:47 executing program 5:

16:29:47 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="000e003f0000007e5bc5795e0800", 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40)

[  235.462453] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  235.489635] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  235.516599] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  235.559029] EXT4-fs error (device loop0): ext4_fill_super:4437: inode #2: comm syz-executor.0: iget: root inode unallocated
[  235.577151] EXT4-fs (loop0): get root inode failed
[  235.582185] EXT4-fs (loop0): mount failed
16:29:47 executing program 2:
pipe(&(0x7f0000000000)={<r0=>0xffffffffffffffff})
r1 = socket$inet_udp(0x2, 0x2, 0x0)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c000000020601000000000000000000000000080e0003006269746d61703a697000000005000400000000000900020073797a3000000000240007800c00028008000140ac1e00010c00018008000140a0000000050014000800000005000500020000000500010006"], 0x1}}, 0x0)
close(r1)
socket$nl_netfilter(0x10, 0x3, 0xc)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={<r2=>0xffffffffffffffff})
r3 = dup(r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
splice(r0, 0x0, r1, 0x0, 0x6209, 0x0)

16:29:47 executing program 1:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict={0x0, 0x0, 0x0, 0xa}]}}, &(0x7f0000004600)=""/210, 0x26, 0xd2}, 0x20)

16:29:47 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(0x0, 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x1)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

16:29:47 executing program 5:

16:29:47 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="000e003f0000007e5bc5795e0800", 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40)

16:29:48 executing program 0:
sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="054a38", @ANYRES16], 0x3}}, 0x0)
sendto$unix(0xffffffffffffffff, &(0x7f0000000340)="53e0f2c2905e9916912f89b23f54185c0e90b38551c81ae3767d56fec3150cd9bd2db58e164473806c6aaaf6964a26b0de86f5fe037f85ea25f3228e5e6dc4672b11ee7418224b4bed0d668c93d4ad2a975309402c1c195f2bd1a1263e107b177c6288fe6160086efbcd133bab74435a30e5da929fcd65882c970886e36ef38c162bf17422221915d31ea852afbc6f78df1ea10fd20bd8cf77e433", 0x9b, 0x0, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x2, [@fwd, @array, @array, @const={0xb}]}}, 0x0, 0x62}, 0x20)
select(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100686cca8000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4807, 0x0)

16:29:48 executing program 1:

16:29:48 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000005000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fec68cb7d18ad181867514fe60077d4dd90123d27e7cf43548ee85857ad4a77cb56e0fcb3dfd4e70eaec677d6ac14c2c794f72cbf5fe31789e70227bfd8115efd90c8c48258f8dbe82e16cf00000000000000000000000000000000000000000000000000000200e2fd45d54b107c8c247f195e32f13799d6707432ff48bc085760314166443ce72c74f3db890e1ff15a10d91f27ad2a986e0e244bd117252e47ffda1a869db7e632df4de857231db422bdffd3135480dae93c7e33bdef00000000d8fd8c79a5d0967ab7e43686b4d1e03e326beea7905ef7de3749f8bc8143df20d13c37db269971210fab7071cc3094078a044777aab9d86cf50afefd7b72a0950d389bc9cb43aa607b7269561dd50b22bd2491331818a10f2ac8c3249582a20d4e04fd1ab7883f656b84137d5f7a6edba86a7b9a4c2f3b3a8abf93b280ea53ce01dcc2d30f4310e8281b0cdc017f9759060ea88a2f6597e966a85c9a74ca196700218f919746bb4b84c16fd56ee452e411d75ab7613b644ba7580b2a0942394ed1737517eed1c892422f54d5a2e1cf1a60fe2dcc1a465aa8d54cb4000053c3f01ea714a7bd644b4a44b807c9765cc7ef43c3cc0a6ad3d3976656d475dd2ed789004be03884e042acb104431333b50ff695516c1dd2e35f09c7a1f97f9561f62837e1d38eab98e6a7285bb0c6c1d0b9abc4b5705eb1073fe63e88f6ff7e510c2795288a69aa52ff32a89c9bd496d5d61d02cd950200226b3098ec9215fcf5becbfd7b53b4c65b74873ae66ba6d7376bc7354c34a49c0421c200000000000000000000000000000011ec85f9721e2ad7e7953224e4a0adc84adcdd323dc99b2a98827b55e4acc903d11121abf11d936e9a9c33f304878aa0a33beba6f628b81f6e67ae1f9fac36a1680a2b02b4aa3920a6d850a9b44ede4fab93b28cc6185403e603120303e5a0bb7992cd821c9f8b754ab631699bd45503521aa9493e4013d25c90301a7c87de188e9e773ae60d3b5aa7ab418c2d6b8039202411cf990440f5d24a7d095dfd673faf2b68ccf1fee37c0ae062066c62ec93498b8da0db224613c5873d9ded9b39cce21fe876e8ff65aa75c0245be655e0b25265536b0d3ad411cea671bc4fc164d497"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="000e003f0000007e5bc5795e0800", 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40)

16:29:48 executing program 5:

16:29:48 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(0x0, 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x1)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

16:29:48 executing program 1:

16:29:48 executing program 5:

[  236.356427] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  236.380596] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  236.400820] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  236.443523] EXT4-fs error (device loop0): ext4_fill_super:4437: inode #2: comm syz-executor.0: iget: root inode unallocated
[  236.475252] EXT4-fs (loop0): get root inode failed
[  236.480924] EXT4-fs (loop0): mount failed
16:29:48 executing program 2:
pipe(&(0x7f0000000000)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c000000020601000000000000000000000000080e0003006269746d61703a697000000005000400000000000900020073797a3000000000240007800c00028008000140ac1e00010c00018008000140a0000000050014000800000005000500020000000500010006"], 0x1}}, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={<r3=>0xffffffffffffffff})
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
splice(r0, 0x0, r2, 0x0, 0x6209, 0x0)

16:29:48 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="000e003f0000007e5bc5795e0800", 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40)

16:29:48 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(0x0, 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x1)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

16:29:48 executing program 1:

16:29:48 executing program 5:
perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7be965121eddcd904d19ef8883600dd6f214a4a764f17b5"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffff8b}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x12, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f08864000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28)

16:29:48 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="000e003f0000007e5bc5795e0800", 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40)

16:29:48 executing program 1:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0)
r2 = socket$kcm(0x2, 0x200000000000001, 0x0)
sendmsg$inet(r2, &(0x7f0000000180)={&(0x7f0000000000)={0x2, 0x4001, @dev={0xac, 0x14, 0x14, 0x1c}}, 0x10, 0x0}, 0x200408c4)
setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x4)
sendmsg$kcm(r2, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0xc8614}], 0x1}, 0x0)
sendmsg(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)='v', 0x1}], 0x1}, 0x0)

16:29:48 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x1)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

16:29:48 executing program 0:
sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="054a38", @ANYRES16], 0x3}}, 0x0)
sendto$unix(0xffffffffffffffff, &(0x7f0000000340)="53e0f2c2905e9916912f89b23f54185c0e90b38551c81ae3767d56fec3150cd9bd2db58e164473806c6aaaf6964a26b0de86f5fe037f85ea25f3228e5e6dc4672b11ee7418224b4bed0d668c93d4ad2a975309402c1c195f2bd1a1263e107b177c6288fe6160086efbcd133bab74435a30e5da929fcd65882c970886e36ef38c162bf17422221915d31ea852afbc6f78df1ea10fd20bd8cf77e433", 0x9b, 0x0, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x2, [@fwd, @array, @array, @const={0xb}]}}, 0x0, 0x62}, 0x20)
select(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100686cca8000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4807, 0x0)

16:29:48 executing program 5:
perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7be965121eddcd904d19ef8883600dd6f214a4a764f17b5"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffff8b}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x12, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f08864000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28)

16:29:49 executing program 3:
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)

16:29:49 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x1)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

[  237.278623] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  237.337155] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  237.365875] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  237.425626] EXT4-fs error (device loop0): ext4_fill_super:4437: inode #2: comm syz-executor.0: iget: root inode unallocated
[  237.452150] EXT4-fs (loop0): get root inode failed
[  237.494397] EXT4-fs (loop0): mount failed
16:29:49 executing program 2:
pipe(&(0x7f0000000000)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c000000020601000000000000000000000000080e0003006269746d61703a697000000005000400000000000900020073797a3000000000240007800c00028008000140ac1e00010c00018008000140a0000000050014000800000005000500020000000500010006"], 0x1}}, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={<r3=>0xffffffffffffffff})
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
splice(r0, 0x0, r2, 0x0, 0x6209, 0x0)

16:29:49 executing program 5:
perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7be965121eddcd904d19ef8883600dd6f214a4a764f17b5"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffff8b}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x12, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f08864000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28)

16:29:49 executing program 1:

16:29:49 executing program 3:
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)

16:29:49 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x1)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

16:29:49 executing program 1:

16:29:49 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r0 = dup(0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r1, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x1)
bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r1, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r1, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r1}], 0x1, 0xff)
close(r1)

16:29:49 executing program 3:
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)

16:29:49 executing program 1:

16:29:49 executing program 5:
perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7be965121eddcd904d19ef8883600dd6f214a4a764f17b5"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffff8b}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x12, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f08864000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28)

16:29:49 executing program 0:
sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="054a38", @ANYRES16, @ANYBLOB], 0x3}}, 0x0)
sendto$unix(0xffffffffffffffff, &(0x7f0000000340)="53e0f2c2905e9916912f89b23f54185c0e90b38551c81ae3767d56fec3150cd9bd2db58e164473806c6aaaf6964a26b0de86f5fe037f85ea25f3228e5e6dc4672b11ee7418224b4bed0d668c93d4ad2a975309402c1c195f2bd1a1263e107b177c6288fe6160086efbcd133bab74435a30e5da929fcd65882c970886e36ef38c162bf17422221915d31ea852afbc6f78df1ea10fd20bd8cf77e433", 0x9b, 0x0, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x2, [@fwd, @array, @array, @const={0xb}]}}, 0x0, 0x62}, 0x20)
select(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100686cca8000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4807, 0x0)

16:29:49 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r0 = dup(0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r1, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x1)
bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r1, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r1, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r1}], 0x1, 0xff)
close(r1)

[  238.186258] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  238.209682] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  238.252816] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  238.324701] EXT4-fs error (device loop0): ext4_fill_super:4437: inode #2: comm syz-executor.0: iget: root inode unallocated
[  238.379186] EXT4-fs (loop0): get root inode failed
[  238.389846] EXT4-fs (loop0): mount failed
16:29:50 executing program 2:
pipe(&(0x7f0000000000)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c000000020601000000000000000000000000080e0003006269746d61703a697000000005000400000000000900020073797a3000000000240007800c00028008000140ac1e00010c00018008000140a0000000050014000800000005000500020000000500010006"], 0x1}}, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={<r3=>0xffffffffffffffff})
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
splice(r0, 0x0, r2, 0x0, 0x6209, 0x0)

16:29:50 executing program 3:
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="000e003f0000007e5bc5795e0800", 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40)

16:29:50 executing program 1:

16:29:50 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r0 = dup(0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r1, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x1)
bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r1, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r1, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r1}], 0x1, 0xff)
close(r1)

16:29:50 executing program 5:
perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x18000000000002a0, 0x12, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f08864000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28)

16:29:50 executing program 5:
perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x18000000000002a0, 0x12, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f08864000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28)

16:29:50 executing program 3:
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="000e003f0000007e5bc5795e0800", 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40)

16:29:50 executing program 1:
syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f0000000000)="eb3c906d6b66731f66617400020401ed01000270fff8", 0x16}], 0x0, 0x0)
r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0)
write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[], 0x201)
fcntl$setstatus(r1, 0x4, 0x4000)
write$binfmt_misc(r1, 0x0, 0x1)
r2 = open(&(0x7f0000000780)='./bus\x00', 0x14507e, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r2, 0x0)
write$P9_RREMOVE(r1, &(0x7f0000000180)={0x7}, 0x7)

16:29:50 executing program 5:
perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x18000000000002a0, 0x12, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f08864000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28)

16:29:50 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r1, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x1)
bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r1, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r1, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r1}], 0x1, 0xff)
close(r1)

16:29:50 executing program 0:
sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="054a38", @ANYRES16, @ANYBLOB], 0x3}}, 0x0)
sendto$unix(0xffffffffffffffff, &(0x7f0000000340)="53e0f2c2905e9916912f89b23f54185c0e90b38551c81ae3767d56fec3150cd9bd2db58e164473806c6aaaf6964a26b0de86f5fe037f85ea25f3228e5e6dc4672b11ee7418224b4bed0d668c93d4ad2a975309402c1c195f2bd1a1263e107b177c6288fe6160086efbcd133bab74435a30e5da929fcd65882c970886e36ef38c162bf17422221915d31ea852afbc6f78df1ea10fd20bd8cf77e433", 0x9b, 0x0, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x2, [@fwd, @array, @array, @const={0xb}]}}, 0x0, 0x62}, 0x20)
select(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100686cca8000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4807, 0x0)

16:29:50 executing program 3:
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="000e003f0000007e5bc5795e0800", 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40)

[  238.900788] audit: type=1800 audit(1588955390.717:18): pid=10065 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="loop1" ino=4 res=0
[  239.042884] audit: type=1800 audit(1588955390.717:19): pid=10065 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="loop1" ino=4 res=0
[  239.192598] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  239.221422] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  239.232113] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  239.255055] EXT4-fs error (device loop0): ext4_fill_super:4437: inode #2: comm syz-executor.0: iget: root inode unallocated
[  239.287636] EXT4-fs (loop0): get root inode failed
[  239.307806] EXT4-fs (loop0): mount failed
16:29:51 executing program 2:
pipe(&(0x7f0000000000)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c000000020601000000000000000000000000080e0003006269746d61703a697000000005000400000000000900020073797a3000000000240007800c00028008000140ac1e00010c00018008000140a0000000050014000800000005000500020000000500010006"], 0x1}}, 0x0)
socket$nl_netfilter(0x10, 0x3, 0xc)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={<r3=>0xffffffffffffffff})
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
splice(r0, 0x0, r2, 0x0, 0x6209, 0x0)

16:29:51 executing program 1:
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x9, &(0x7f0000000080)=[{&(0x7f0000000040)="2300000025000511d25a806c8c63940d0424fc60040018000a001100022f000037153e", 0x23}], 0x1}, 0x0)

16:29:51 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7be965121eddcd904d19ef8883600dd6f214a4a764f17b5"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffff8b}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x12, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f08864000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28)

16:29:51 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40)

16:29:51 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r1, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x1)
bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r1, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r1, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r1}], 0x1, 0xff)
close(r1)

16:29:51 executing program 1:
prlimit64(0x0, 0xe, 0x0, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0)
r0 = socket$inet6(0xa, 0x0, 0x0)
recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0)
pipe(&(0x7f0000000180)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
fcntl$setpipe(r1, 0x407, 0x0)
write(r1, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r2 = open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
fchdir(r2)
r3 = creat(&(0x7f0000000680)='./bus\x00', 0x0)
ftruncate(r3, 0x800)
lseek(r3, 0x5, 0x2)
r4 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0)
sendfile(r3, r4, 0x0, 0x8400fffffffa)
creat(&(0x7f0000000100)='./bus\x00', 0x108)

16:29:51 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000005000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fec68cb7d18ad181867514fe60077d4dd90123d27e7cf43548ee85857ad4a77cb56e0fcb3dfd4e70eaec677d6ac14c2c794f72cbf5fe31789e70227bfd8115efd90c8c48258f8dbe82e16cf00000000000000000000000000000000000000000000000000000200e2fd45d54b107c8c247f195e32f13799d6707432ff48bc085760314166443ce72c74f3db890e1ff15a10d91f27ad2a986e0e244bd117252e47ffda1a869db7e632df4de857231db422bdffd3135480dae93c7e33bdef00000000d8fd8c79a5d0967ab7e43686b4d1e03e326beea7905ef7de3749f8bc8143df20d13c37db269971210fab7071cc3094078a044777aab9d86cf50afefd7b72a0950d389bc9cb43aa607b7269561dd50b22bd2491331818a10f2ac8c3249582a20d4e04fd1ab7883f656b84137d5f7a6edba86a7b9a4c2f3b3a8abf93b280ea53ce01dcc2d30f4310e8281b0cdc017f9759060ea88a2f6597e966a85c9a74ca196700218f919746bb4b84c16fd56ee452e411d75ab7613b644ba7580b2a0942394ed1737517eed1c892422f54d5a2e1cf1a60fe2dcc1a465aa8d54cb4000053c3f01ea714a7bd644b4a44b807c9765cc7ef43c3cc0a6ad3d3976656d475dd2ed789004be03884e042acb104431333b50ff695516c1dd2e35f09c7a1f97f9561f62837e1d38eab98e6a7285bb0c6c1d0b9abc4b5705eb1073fe63e88f6ff7e510c2795288a69aa52ff32a89c9bd496d5d61d02cd950200226b3098ec9215fcf5becbfd7b53b4c65b74873ae66ba6d7376bc7354c34a49c0421c200000000000000000000000000000011ec85f9721e2ad7e7953224e4a0adc84adcdd323dc99b2a98827b55e4acc903d11121abf11d936e9a9c33f304878aa0a33beba6f628b81f6e67ae1f9fac36a1680a2b02b4aa3920a6d850a9b44ede4fab93b28cc6185403e603120303e5a0bb7992cd821c9f8b754ab631699bd45503521aa9493e4013d25c90301a7c87de188e9e773ae60d3b5aa7ab418c2d6b8039202411cf990440f5d24a7d095dfd673faf2b68ccf1fee37c0ae062066c62ec93498b8da0db224613c5873d9ded9b39cce21fe876e8ff65aa75c0245be655e0b25265536b0d3ad411cea671bc4fc164d497"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40)

16:29:51 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r1, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x1)
bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r1, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r1, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r1}], 0x1, 0xff)
close(r1)

16:29:51 executing program 5:
r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x12, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f08864000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28)

16:29:51 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000005000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fec68cb7d18ad181867514fe60077d4dd90123d27e7cf43548ee85857ad4a77cb56e0fcb3dfd4e70eaec677d6ac14c2c794f72cbf5fe31789e70227bfd8115efd90c8c48258f8dbe82e16cf00000000000000000000000000000000000000000000000000000200e2fd45d54b107c8c247f195e32f13799d6707432ff48bc085760314166443ce72c74f3db890e1ff15a10d91f27ad2a986e0e244bd117252e47ffda1a869db7e632df4de857231db422bdffd3135480dae93c7e33bdef00000000d8fd8c79a5d0967ab7e43686b4d1e03e326beea7905ef7de3749f8bc8143df20d13c37db269971210fab7071cc3094078a044777aab9d86cf50afefd7b72a0950d389bc9cb43aa607b7269561dd50b22bd2491331818a10f2ac8c3249582a20d4e04fd1ab7883f656b84137d5f7a6edba86a7b9a4c2f3b3a8abf93b280ea53ce01dcc2d30f4310e8281b0cdc017f9759060ea88a2f6597e966a85c9a74ca196700218f919746bb4b84c16fd56ee452e411d75ab7613b644ba7580b2a0942394ed1737517eed1c892422f54d5a2e1cf1a60fe2dcc1a465aa8d54cb4000053c3f01ea714a7bd644b4a44b807c9765cc7ef43c3cc0a6ad3d3976656d475dd2ed789004be03884e042acb104431333b50ff695516c1dd2e35f09c7a1f97f9561f62837e1d38eab98e6a7285bb0c6c1d0b9abc4b5705eb1073fe63e88f6ff7e510c2795288a69aa52ff32a89c9bd496d5d61d02cd950200226b3098ec9215fcf5becbfd7b53b4c65b74873ae66ba6d7376bc7354c34a49c0421c200000000000000000000000000000011ec85f9721e2ad7e7953224e4a0adc84adcdd323dc99b2a98827b55e4acc903d11121abf11d936e9a9c33f304878aa0a33beba6f628b81f6e67ae1f9fac36a1680a2b02b4aa3920a6d850a9b44ede4fab93b28cc6185403e603120303e5a0bb7992cd821c9f8b754ab631699bd45503521aa9493e4013d25c90301a7c87de188e9e773ae60d3b5aa7ab418c2d6b8039202411cf990440f5d24a7d095dfd673faf2b68ccf1fee37c0ae062066c62ec93498b8da0db224613c5873d9ded9b39cce21fe876e8ff65aa75c0245be655e0b25265536b0d3ad411cea671bc4fc164d497"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40)

[  239.783013] audit: type=1804 audit(1588955391.597:20): pid=10108 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir210500229/syzkaller.5IFUhd/105/file0/bus" dev="loop1" ino=5 res=1
16:29:51 executing program 0:
sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="054a38", @ANYRES16, @ANYBLOB], 0x3}}, 0x0)
sendto$unix(0xffffffffffffffff, &(0x7f0000000340)="53e0f2c2905e9916912f89b23f54185c0e90b38551c81ae3767d56fec3150cd9bd2db58e164473806c6aaaf6964a26b0de86f5fe037f85ea25f3228e5e6dc4672b11ee7418224b4bed0d668c93d4ad2a975309402c1c195f2bd1a1263e107b177c6288fe6160086efbcd133bab74435a30e5da929fcd65882c970886e36ef38c162bf17422221915d31ea852afbc6f78df1ea10fd20bd8cf77e433", 0x9b, 0x0, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x2, [@fwd, @array, @array, @const={0xb}]}}, 0x0, 0x62}, 0x20)
select(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100686cca8000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4807, 0x0)

16:29:51 executing program 5:
r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x12, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f08864000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28)

[  239.937116] audit: type=1804 audit(1588955391.647:21): pid=10116 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir210500229/syzkaller.5IFUhd/105/file0/bus" dev="loop1" ino=5 res=1
[  240.024832] audit: type=1804 audit(1588955391.727:22): pid=10124 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir210500229/syzkaller.5IFUhd/105/file0/bus" dev="loop1" ino=5 res=1
[  240.051557] audit: type=1804 audit(1588955391.727:23): pid=10124 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir210500229/syzkaller.5IFUhd/105/file0/bus" dev="loop1" ino=5 res=1
[  240.131343] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  240.153833] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  240.162890] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  240.229927] EXT4-fs error (device loop0): ext4_fill_super:4437: inode #2: comm syz-executor.0: iget: root inode unallocated
[  240.247879] EXT4-fs (loop0): get root inode failed
[  240.257467] EXT4-fs (loop0): mount failed
16:29:52 executing program 2:
pipe(&(0x7f0000000000)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c000000020601000000000000000000000000080e0003006269746d61703a697000000005000400000000000900020073797a3000000000240007800c00028008000140ac1e00010c00018008000140a0000000050014000800000005000500020000000500010006"], 0x1}}, 0x0)
socket$nl_netfilter(0x10, 0x3, 0xc)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={<r3=>0xffffffffffffffff})
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
splice(r0, 0x0, r2, 0x0, 0x6209, 0x0)

16:29:52 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x1)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

16:29:52 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40)

16:29:52 executing program 1:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', <r1=>0x0})
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = socket$nl_route(0x10, 0x3, 0x0)
ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000280)={'syz_tun\x00'})
r4 = socket$nl_route(0x10, 0x3, 0x0)
r5 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000dc0)={0x0}}, 0x0)
getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, <r6=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r6, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0)
sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYRES32], 0x28}}, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={<r7=>0xffffffffffffffff})
r8 = dup(r7)
ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200)
r9 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r9, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0)
r10 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r10, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x8009}}, 0x20}}, 0x0)

16:29:52 executing program 5:
r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x12, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f08864000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28)

16:29:52 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7be965121eddcd904d19ef8883600dd6f214a4a764f17b5"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffff8b}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x12, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f08864000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28)

[  240.433024] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'.
16:29:52 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x1)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

16:29:52 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40)

[  240.504443] device bridge_slave_0 left promiscuous mode
[  240.518935] bridge0: port 1(bridge_slave_0) entered disabled state
16:29:52 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7be965121eddcd904d19ef8883600dd6f214a4a764f17b5"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffff8b}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x12, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f08864000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28)

16:29:52 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x1)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

[  240.594679] bridge1: port 1(bridge_slave_0) entered blocking state
[  240.612825] bridge1: port 1(bridge_slave_0) entered disabled state
[  240.660468] device bridge_slave_0 entered promiscuous mode
[  240.715776] bridge1: port 1(bridge_slave_0) entered blocking state
[  240.722242] bridge1: port 1(bridge_slave_0) entered forwarding state
16:29:52 executing program 0:
sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="054a38", @ANYRES16, @ANYBLOB="6ffe00000000000000000300"], 0x3}}, 0x0)
sendto$unix(0xffffffffffffffff, &(0x7f0000000340)="53e0f2c2905e9916912f89b23f54185c0e90b38551c81ae3767d56fec3150cd9bd2db58e164473806c6aaaf6964a26b0de86f5fe037f85ea25f3228e5e6dc4672b11ee7418224b4bed0d668c93d4ad2a975309402c1c195f2bd1a1263e107b177c6288fe6160086efbcd133bab74435a30e5da929fcd65882c970886e36ef38c162bf17422221915d31ea852afbc6f78df1ea10fd20bd8cf77e433", 0x9b, 0x0, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x2, [@fwd, @array, @array, @const={0xb}]}}, 0x0, 0x62}, 0x20)
select(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100686cca8000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4807, 0x0)

16:29:52 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000005000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fec68cb7d18ad181867514fe60077d4dd90123d27e7cf43548ee85857ad4a77cb56e0fcb3dfd4e70eaec677d6ac14c2c794f72cbf5fe31789e70227bfd8115efd90c8c48258f8dbe82e16cf00000000000000000000000000000000000000000000000000000200e2fd45d54b107c8c247f195e32f13799d6707432ff48bc085760314166443ce72c74f3db890e1ff15a10d91f27ad2a986e0e244bd117252e47ffda1a869db7e632df4de857231db422bdffd3135480dae93c7e33bdef00000000d8fd8c79a5d0967ab7e43686b4d1e03e326beea7905ef7de3749f8bc8143df20d13c37db269971210fab7071cc3094078a044777aab9d86cf50afefd7b72a0950d389bc9cb43aa607b7269561dd50b22bd2491331818a10f2ac8c3249582a20d4e04fd1ab7883f656b84137d5f7a6edba86a7b9a4c2f3b3a8abf93b280ea53ce01dcc2d30f4310e8281b0cdc017f9759060ea88a2f6597e966a85c9a74ca196700218f919746bb4b84c16fd56ee452e411d75ab7613b644ba7580b2a0942394ed1737517eed1c892422f54d5a2e1cf1a60fe2dcc1a465aa8d54cb4000053c3f01ea714a7bd644b4a44b807c9765cc7ef43c3cc0a6ad3d3976656d475dd2ed789004be03884e042acb104431333b50ff695516c1dd2e35f09c7a1f97f9561f62837e1d38eab98e6a7285bb0c6c1d0b9abc4b5705eb1073fe63e88f6ff7e510c2795288a69aa52ff32a89c9bd496d5d61d02cd950200226b3098ec9215fcf5becbfd7b53b4c65b74873ae66ba6d7376bc7354c34a49c0421c200000000000000000000000000000011ec85f9721e2ad7e7953224e4a0adc84adcdd323dc99b2a98827b55e4acc903d11121abf11d936e9a9c33f304878aa0a33beba6f628b81f6e67ae1f9fac36a1680a2b02b4aa3920a6d850a9b44ede4fab93b28cc6185403e603120303e5a0bb7992cd821c9f8b754ab631699bd45503521aa9493e4013d25c90301a7c87de188e9e773ae60d3b5aa7ab418c2d6b8039202411cf990440f5d24a7d095dfd673faf2b68ccf1fee37c0ae062066c62ec93498b8da0db224613c5873d9ded9b39cce21fe876e8ff65aa75c0245be655e0b25265536b0d3ad411cea671bc4fc164d497"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40)

[  240.959382] EXT4-fs (loop0): invalid first ino: 0
16:29:53 executing program 2:
pipe(&(0x7f0000000000)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c000000020601000000000000000000000000080e0003006269746d61703a697000000005000400000000000900020073797a3000000000240007800c00028008000140ac1e00010c00018008000140a0000000050014000800000005000500020000000500010006"], 0x1}}, 0x0)
socket$nl_netfilter(0x10, 0x3, 0xc)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={<r3=>0xffffffffffffffff})
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
splice(r0, 0x0, r2, 0x0, 0x6209, 0x0)

16:29:53 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7be965121eddcd904d19ef8883600dd6f214a4a764f17b5"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffff8b}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x12, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f08864000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28)

16:29:53 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x1)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

16:29:53 executing program 1:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
bind$inet(r0, &(0x7f0000000140)={0x2, 0x2000004e20, @broadcast}, 0x10)
sendto$inet(r0, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x12}}, 0x10)

16:29:53 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0x7, 0x0, &(0x7f0000000100)="000e003f000000", 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40)

16:29:53 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x12, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f08864000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28)

16:29:53 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0x7, 0x0, &(0x7f0000000100)="000e003f000000", 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40)

[  241.310726] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based  firewall rule not found. Use the iptables CT target to attach helpers instead.
16:29:53 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x1)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

16:29:53 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x12, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f08864000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28)

16:29:53 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000005000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fec68cb7d18ad181867514fe60077d4dd90123d27e7cf43548ee85857ad4a77cb56e0fcb3dfd4e70eaec677d6ac14c2c794f72cbf5fe31789e70227bfd8115efd90c8c48258f8dbe82e16cf00000000000000000000000000000000000000000000000000000200e2fd45d54b107c8c247f195e32f13799d6707432ff48bc085760314166443ce72c74f3db890e1ff15a10d91f27ad2a986e0e244bd117252e47ffda1a869db7e632df4de857231db422bdffd3135480dae93c7e33bdef00000000d8fd8c79a5d0967ab7e43686b4d1e03e326beea7905ef7de3749f8bc8143df20d13c37db269971210fab7071cc3094078a044777aab9d86cf50afefd7b72a0950d389bc9cb43aa607b7269561dd50b22bd2491331818a10f2ac8c3249582a20d4e04fd1ab7883f656b84137d5f7a6edba86a7b9a4c2f3b3a8abf93b280ea53ce01dcc2d30f4310e8281b0cdc017f9759060ea88a2f6597e966a85c9a74ca196700218f919746bb4b84c16fd56ee452e411d75ab7613b644ba7580b2a0942394ed1737517eed1c892422f54d5a2e1cf1a60fe2dcc1a465aa8d54cb4000053c3f01ea714a7bd644b4a44b807c9765cc7ef43c3cc0a6ad3d3976656d475dd2ed789004be03884e042acb104431333b50ff695516c1dd2e35f09c7a1f97f9561f62837e1d38eab98e6a7285bb0c6c1d0b9abc4b5705eb1073fe63e88f6ff7e510c2795288a69aa52ff32a89c9bd496d5d61d02cd950200226b3098ec9215fcf5becbfd7b53b4c65b74873ae66ba6d7376bc7354c34a49c0421c200000000000000000000000000000011ec85f9721e2ad7e7953224e4a0adc84adcdd323dc99b2a98827b55e4acc903d11121abf11d936e9a9c33f304878aa0a33beba6f628b81f6e67ae1f9fac36a1680a2b02b4aa3920a6d850a9b44ede4fab93b28cc6185403e603120303e5a0bb7992cd821c9f8b754ab631699bd45503521aa9493e4013d25c90301a7c87de188e9e773ae60d3b5aa7ab418c2d6b8039202411cf990440f5d24a7d095dfd673faf2b68ccf1fee37c0ae062066c62ec93498b8da0db224613c5873d9ded9b39cce21fe876e8ff65aa75c0245be655e0b25265536b0d3ad411cea671bc4fc164d497"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0x7, 0x0, &(0x7f0000000100)="000e003f000000", 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40)

16:29:53 executing program 0:
sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="054a38", @ANYRES16, @ANYBLOB="6ffe00000000000000000300"], 0x3}}, 0x0)
sendto$unix(0xffffffffffffffff, &(0x7f0000000340)="53e0f2c2905e9916912f89b23f54185c0e90b38551c81ae3767d56fec3150cd9bd2db58e164473806c6aaaf6964a26b0de86f5fe037f85ea25f3228e5e6dc4672b11ee7418224b4bed0d668c93d4ad2a975309402c1c195f2bd1a1263e107b177c6288fe6160086efbcd133bab74435a30e5da929fcd65882c970886e36ef38c162bf17422221915d31ea852afbc6f78df1ea10fd20bd8cf77e433", 0x9b, 0x0, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x2, [@fwd, @array, @array, @const={0xb}]}}, 0x0, 0x62}, 0x20)
select(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100686cca8000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4807, 0x0)

16:29:53 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x12, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f08864000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28)

[  241.847824] EXT4-fs (loop0): invalid first ino: 0
16:29:53 executing program 2:
pipe(&(0x7f0000000000)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
socket$nl_netfilter(0x10, 0x3, 0xc)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={<r3=>0xffffffffffffffff})
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
splice(r0, 0x0, r2, 0x0, 0x6209, 0x0)

16:29:53 executing program 1:
r0 = syz_open_procfs(0x0, &(0x7f0000000000)='fd\x00')
fchdir(r0)
r1 = memfd_create(&(0x7f0000000780)='\x06', 0x0)
write(r1, &(0x7f00000000c0)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba426d00a5958d6f246c9c8a2a06007b00000000000000000000200000f8bf54da33", 0x41)
mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
r3 = fcntl$dupfd(r2, 0x0, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
r4 = inotify_init1(0x0)
inotify_add_watch(r4, &(0x7f0000000040)='./control\x00', 0x0)
readlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/83, 0x53)

16:29:53 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000005000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fec68cb7d18ad181867514fe60077d4dd90123d27e7cf43548ee85857ad4a77cb56e0fcb3dfd4e70eaec677d6ac14c2c794f72cbf5fe31789e70227bfd8115efd90c8c48258f8dbe82e16cf00000000000000000000000000000000000000000000000000000200e2fd45d54b107c8c247f195e32f13799d6707432ff48bc085760314166443ce72c74f3db890e1ff15a10d91f27ad2a986e0e244bd117252e47ffda1a869db7e632df4de857231db422bdffd3135480dae93c7e33bdef00000000d8fd8c79a5d0967ab7e43686b4d1e03e326beea7905ef7de3749f8bc8143df20d13c37db269971210fab7071cc3094078a044777aab9d86cf50afefd7b72a0950d389bc9cb43aa607b7269561dd50b22bd2491331818a10f2ac8c3249582a20d4e04fd1ab7883f656b84137d5f7a6edba86a7b9a4c2f3b3a8abf93b280ea53ce01dcc2d30f4310e8281b0cdc017f9759060ea88a2f6597e966a85c9a74ca196700218f919746bb4b84c16fd56ee452e411d75ab7613b644ba7580b2a0942394ed1737517eed1c892422f54d5a2e1cf1a60fe2dcc1a465aa8d54cb4000053c3f01ea714a7bd644b4a44b807c9765cc7ef43c3cc0a6ad3d3976656d475dd2ed789004be03884e042acb104431333b50ff695516c1dd2e35f09c7a1f97f9561f62837e1d38eab98e6a7285bb0c6c1d0b9abc4b5705eb1073fe63e88f6ff7e510c2795288a69aa52ff32a89c9bd496d5d61d02cd950200226b3098ec9215fcf5becbfd7b53b4c65b74873ae66ba6d7376bc7354c34a49c0421c200000000000000000000000000000011ec85f9721e2ad7e7953224e4a0adc84adcdd323dc99b2a98827b55e4acc903d11121abf11d936e9a9c33f304878aa0a33beba6f628b81f6e67ae1f9fac36a1680a2b02b4aa3920a6d850a9b44ede4fab93b28cc6185403e603120303e5a0bb7992cd821c9f8b754ab631699bd45503521aa9493e4013d25c90301a7c87de188e9e773ae60d3b5aa7ab418c2d6b8039202411cf990440f5d24a7d095dfd673faf2b68ccf1fee37c0ae062066c62ec93498b8da0db224613c5873d9ded9b39cce21fe876e8ff65aa75c0245be655e0b25265536b0d3ad411cea671bc4fc164d497"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xb, 0x0, &(0x7f0000000100)="000e003f0000007e5bc579", 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40)

16:29:53 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x1)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

16:29:53 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x12, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f08864000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28)

16:29:54 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x12, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f08864000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28)

16:29:54 executing program 1:

16:29:54 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xb, 0x0, &(0x7f0000000100)="000e003f0000007e5bc579", 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40)

16:29:54 executing program 1:

16:29:54 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x12, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f08864000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28)

16:29:54 executing program 0:
sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="054a38", @ANYRES16, @ANYBLOB="6ffe00000000000000000300"], 0x3}}, 0x0)
sendto$unix(0xffffffffffffffff, &(0x7f0000000340)="53e0f2c2905e9916912f89b23f54185c0e90b38551c81ae3767d56fec3150cd9bd2db58e164473806c6aaaf6964a26b0de86f5fe037f85ea25f3228e5e6dc4672b11ee7418224b4bed0d668c93d4ad2a975309402c1c195f2bd1a1263e107b177c6288fe6160086efbcd133bab74435a30e5da929fcd65882c970886e36ef38c162bf17422221915d31ea852afbc6f78df1ea10fd20bd8cf77e433", 0x9b, 0x0, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x2, [@fwd, @array, @array, @const={0xb}]}}, 0x0, 0x62}, 0x20)
select(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100686cca8000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4807, 0x0)

16:29:54 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xb, 0x0, &(0x7f0000000100)="000e003f0000007e5bc579", 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40)

[  242.723949] EXT4-fs (loop0): invalid first ino: 0
16:29:54 executing program 2:
pipe(&(0x7f0000000000)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
socket$nl_netfilter(0x10, 0x3, 0xc)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={<r3=>0xffffffffffffffff})
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
splice(r0, 0x0, r2, 0x0, 0x6209, 0x0)

16:29:54 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, 0x0, 0x0)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x1)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

16:29:54 executing program 1:

16:29:54 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x12, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f08864000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28)

16:29:54 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000005000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fec68cb7d18ad181867514fe60077d4dd90123d27e7cf43548ee85857ad4a77cb56e0fcb3dfd4e70eaec677d6ac14c2c794f72cbf5fe31789e70227bfd8115efd90c8c48258f8dbe82e16cf00000000000000000000000000000000000000000000000000000200e2fd45d54b107c8c247f195e32f13799d6707432ff48bc085760314166443ce72c74f3db890e1ff15a10d91f27ad2a986e0e244bd117252e47ffda1a869db7e632df4de857231db422bdffd3135480dae93c7e33bdef00000000d8fd8c79a5d0967ab7e43686b4d1e03e326beea7905ef7de3749f8bc8143df20d13c37db269971210fab7071cc3094078a044777aab9d86cf50afefd7b72a0950d389bc9cb43aa607b7269561dd50b22bd2491331818a10f2ac8c3249582a20d4e04fd1ab7883f656b84137d5f7a6edba86a7b9a4c2f3b3a8abf93b280ea53ce01dcc2d30f4310e8281b0cdc017f9759060ea88a2f6597e966a85c9a74ca196700218f919746bb4b84c16fd56ee452e411d75ab7613b644ba7580b2a0942394ed1737517eed1c892422f54d5a2e1cf1a60fe2dcc1a465aa8d54cb4000053c3f01ea714a7bd644b4a44b807c9765cc7ef43c3cc0a6ad3d3976656d475dd2ed789004be03884e042acb104431333b50ff695516c1dd2e35f09c7a1f97f9561f62837e1d38eab98e6a7285bb0c6c1d0b9abc4b5705eb1073fe63e88f6ff7e510c2795288a69aa52ff32a89c9bd496d5d61d02cd950200226b3098ec9215fcf5becbfd7b53b4c65b74873ae66ba6d7376bc7354c34a49c0421c200000000000000000000000000000011ec85f9721e2ad7e7953224e4a0adc84adcdd323dc99b2a98827b55e4acc903d11121abf11d936e9a9c33f304878aa0a33beba6f628b81f6e67ae1f9fac36a1680a2b02b4aa3920a6d850a9b44ede4fab93b28cc6185403e603120303e5a0bb7992cd821c9f8b754ab631699bd45503521aa9493e4013d25c90301a7c87de188e9e773ae60d3b5aa7ab418c2d6b8039202411cf990440f5d24a7d095dfd673faf2b68ccf1fee37c0ae062066c62ec93498b8da0db224613c5873d9ded9b39cce21fe876e8ff65aa75c0245be655e0b25265536b0d3ad411cea671bc4fc164d497"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xd, 0x0, &(0x7f0000000100)="000e003f0000007e5bc5795e08", 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40)

16:29:55 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x12, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f08864000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28)

16:29:55 executing program 1:

16:29:55 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xd, 0x0, &(0x7f0000000100)="000e003f0000007e5bc5795e08", 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40)

16:29:55 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, 0x0, 0x0)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x1)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

16:29:55 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x12, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f08864000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28)

16:29:55 executing program 0:
sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="054a38", @ANYRES16, @ANYBLOB="6ffe00000000000000000300000058000180"], 0x3}}, 0x0)
sendto$unix(0xffffffffffffffff, &(0x7f0000000340)="53e0f2c2905e9916912f89b23f54185c0e90b38551c81ae3767d56fec3150cd9bd2db58e164473806c6aaaf6964a26b0de86f5fe037f85ea25f3228e5e6dc4672b11ee7418224b4bed0d668c93d4ad2a975309402c1c195f2bd1a1263e107b177c6288fe6160086efbcd133bab74435a30e5da929fcd65882c970886e36ef38c162bf17422221915d31ea852afbc6f78df1ea10fd20bd8cf77e433", 0x9b, 0x0, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x2, [@fwd, @array, @array, @const={0xb}]}}, 0x0, 0x62}, 0x20)
select(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100686cca8000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4807, 0x0)

16:29:55 executing program 1:

[  243.681241] EXT4-fs (loop0): unsupported inode size: 0
[  243.696350] EXT4-fs (loop0): blocksize: 4096
16:29:55 executing program 2:
pipe(&(0x7f0000000000)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
socket$nl_netfilter(0x10, 0x3, 0xc)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={<r3=>0xffffffffffffffff})
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
splice(r0, 0x0, r2, 0x0, 0x6209, 0x0)

16:29:55 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b703000001000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x12, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f08864000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28)

16:29:55 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000005000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fec68cb7d18ad181867514fe60077d4dd90123d27e7cf43548ee85857ad4a77cb56e0fcb3dfd4e70eaec677d6ac14c2c794f72cbf5fe31789e70227bfd8115efd90c8c48258f8dbe82e16cf00000000000000000000000000000000000000000000000000000200e2fd45d54b107c8c247f195e32f13799d6707432ff48bc085760314166443ce72c74f3db890e1ff15a10d91f27ad2a986e0e244bd117252e47ffda1a869db7e632df4de857231db422bdffd3135480dae93c7e33bdef00000000d8fd8c79a5d0967ab7e43686b4d1e03e326beea7905ef7de3749f8bc8143df20d13c37db269971210fab7071cc3094078a044777aab9d86cf50afefd7b72a0950d389bc9cb43aa607b7269561dd50b22bd2491331818a10f2ac8c3249582a20d4e04fd1ab7883f656b84137d5f7a6edba86a7b9a4c2f3b3a8abf93b280ea53ce01dcc2d30f4310e8281b0cdc017f9759060ea88a2f6597e966a85c9a74ca196700218f919746bb4b84c16fd56ee452e411d75ab7613b644ba7580b2a0942394ed1737517eed1c892422f54d5a2e1cf1a60fe2dcc1a465aa8d54cb4000053c3f01ea714a7bd644b4a44b807c9765cc7ef43c3cc0a6ad3d3976656d475dd2ed789004be03884e042acb104431333b50ff695516c1dd2e35f09c7a1f97f9561f62837e1d38eab98e6a7285bb0c6c1d0b9abc4b5705eb1073fe63e88f6ff7e510c2795288a69aa52ff32a89c9bd496d5d61d02cd950200226b3098ec9215fcf5becbfd7b53b4c65b74873ae66ba6d7376bc7354c34a49c0421c200000000000000000000000000000011ec85f9721e2ad7e7953224e4a0adc84adcdd323dc99b2a98827b55e4acc903d11121abf11d936e9a9c33f304878aa0a33beba6f628b81f6e67ae1f9fac36a1680a2b02b4aa3920a6d850a9b44ede4fab93b28cc6185403e603120303e5a0bb7992cd821c9f8b754ab631699bd45503521aa9493e4013d25c90301a7c87de188e9e773ae60d3b5aa7ab418c2d6b8039202411cf990440f5d24a7d095dfd673faf2b68ccf1fee37c0ae062066c62ec93498b8da0db224613c5873d9ded9b39cce21fe876e8ff65aa75c0245be655e0b25265536b0d3ad411cea671bc4fc164d497"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xd, 0x0, &(0x7f0000000100)="000e003f0000007e5bc5795e08", 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40)

16:29:55 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, 0x0, 0x0)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x1)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

16:29:55 executing program 1:

16:29:55 executing program 1:

16:29:55 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x0, 0x0}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x1)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

16:29:55 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b703000001000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x12, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f08864000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28)

16:29:55 executing program 3:

16:29:56 executing program 1:

16:29:56 executing program 0:
sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="054a38", @ANYRES16, @ANYBLOB="6ffe00000000000000000300000058000180"], 0x3}}, 0x0)
sendto$unix(0xffffffffffffffff, &(0x7f0000000340)="53e0f2c2905e9916912f89b23f54185c0e90b38551c81ae3767d56fec3150cd9bd2db58e164473806c6aaaf6964a26b0de86f5fe037f85ea25f3228e5e6dc4672b11ee7418224b4bed0d668c93d4ad2a975309402c1c195f2bd1a1263e107b177c6288fe6160086efbcd133bab74435a30e5da929fcd65882c970886e36ef38c162bf17422221915d31ea852afbc6f78df1ea10fd20bd8cf77e433", 0x9b, 0x0, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x2, [@fwd, @array, @array, @const={0xb}]}}, 0x0, 0x62}, 0x20)
select(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100686cca8000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4807, 0x0)

16:29:56 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x0, 0x0}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x1)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

[  244.512384] EXT4-fs (loop0): unsupported inode size: 0
[  244.520368] EXT4-fs (loop0): blocksize: 4096
16:29:56 executing program 2:
pipe(&(0x7f0000000000)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c000000020601000000000000000000000000080e0003006269746d61703a697000000005000400000000000900020073797a3000000000240007800c00028008000140ac1e00010c00018008000140a0000000050014000800000005000500020000000500010006"], 0x1}}, 0x0)
close(0xffffffffffffffff)
socket$nl_netfilter(0x10, 0x3, 0xc)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={<r2=>0xffffffffffffffff})
r3 = dup(r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x6209, 0x0)

16:29:56 executing program 3:

16:29:56 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b703000001000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x12, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f08864000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28)

16:29:56 executing program 1:

16:29:56 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x0, 0x0}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x1)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

16:29:56 executing program 1:

16:29:56 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x12, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f08864000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28)

16:29:56 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x0, &(0x7f0000000280)}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x1)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

16:29:56 executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001200)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00'}, 0x48)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r0, 0xc0, &(0x7f0000000b00)={0x0, <r1=>0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xf)
r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r1}, 0xc)
bpf$OBJ_PIN_PROG(0x6, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', r2}, 0x10)

16:29:56 executing program 1:
clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = dup(r1)
r3 = fcntl$dupfd(r0, 0x0, r2)
setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x1)

[  245.098441] xt_hashlimit: max too large, truncated to 1048576
16:29:57 executing program 0:
sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="054a38", @ANYRES16, @ANYBLOB="6ffe00000000000000000300000058000180"], 0x3}}, 0x0)
sendto$unix(0xffffffffffffffff, &(0x7f0000000340)="53e0f2c2905e9916912f89b23f54185c0e90b38551c81ae3767d56fec3150cd9bd2db58e164473806c6aaaf6964a26b0de86f5fe037f85ea25f3228e5e6dc4672b11ee7418224b4bed0d668c93d4ad2a975309402c1c195f2bd1a1263e107b177c6288fe6160086efbcd133bab74435a30e5da929fcd65882c970886e36ef38c162bf17422221915d31ea852afbc6f78df1ea10fd20bd8cf77e433", 0x9b, 0x0, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x2, [@fwd, @array, @array, @const={0xb}]}}, 0x0, 0x62}, 0x20)
select(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100686cca8000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4807, 0x0)

16:29:57 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x12, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f08864000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28)

[  245.427878] EXT4-fs (loop0): unsupported inode size: 0
[  245.438122] EXT4-fs (loop0): blocksize: 4096
16:29:57 executing program 2:
pipe(&(0x7f0000000000)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c000000020601000000000000000000000000080e0003006269746d61703a697000000005000400000000000900020073797a3000000000240007800c00028008000140ac1e00010c00018008000140a0000000050014000800000005000500020000000500010006"], 0x1}}, 0x0)
close(0xffffffffffffffff)
socket$nl_netfilter(0x10, 0x3, 0xc)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={<r2=>0xffffffffffffffff})
r3 = dup(r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x6209, 0x0)

16:29:57 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x0, &(0x7f0000000280)}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x1)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

16:29:57 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
r2 = dup2(r0, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
r4 = dup(r3)
ioctl$BLKREPORTZONE(r4, 0xc0101282, 0x0)
ioctl$sock_bt_hidp_HIDPGETCONNLIST(r4, 0x800448d2, &(0x7f0000000440)={0x1, &(0x7f0000000000)=[{}]})

16:29:57 executing program 1:
r0 = getpid()
prctl$PR_SET_PTRACER(0x59616d61, r0)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="45e9aed12f060000000000000025d86800278dcff47d010000805acf4f9836460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc00000000000000000000000000000068e9d3a60a6638d827e6b924fa38cb0ac9a54e6717be51823a60c823ae54f0f62e726a997709e4f607e04587cc1e6ffdd38bac11ef386a6345c45249749969439ffd339708a8db36eff87d320034e4acdb77ad04e6071c", 0x9f}], 0x4, 0x0)
r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r3 = dup(r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
ptrace$setopts(0x4206, r1, 0x0, 0x0)
tkill(r1, 0x3c)
ptrace$cont(0x18, r1, 0x0, 0x0)
sendmsg$NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)={0x14}, 0x14}}, 0x0)
ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080))
ptrace$cont(0x9, r1, 0x0, 0x0)

16:29:57 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x12, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f08864000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28)

16:29:57 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7be9651"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x12, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f08864000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28)

16:29:57 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x1c}, 0x20)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x28)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

16:29:57 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x0, &(0x7f0000000280)}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x1)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

16:29:57 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
r2 = dup2(r0, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
r4 = dup(r3)
ioctl$BLKREPORTZONE(r4, 0xc0101282, 0x0)
ioctl$sock_bt_hidp_HIDPGETCONNLIST(r4, 0x800448d2, &(0x7f0000000440)={0x1, &(0x7f0000000000)=[{}]})

16:29:57 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7be9651"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x12, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f08864000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28)

[  245.953202] VFS: Warning: syz-executor.1 using old stat() call. Recompile your binary.
16:29:57 executing program 0:
sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="054a38", @ANYRES16, @ANYBLOB="6ffe000000000000000003000000580001800d0001"], 0x3}}, 0x0)
sendto$unix(0xffffffffffffffff, &(0x7f0000000340)="53e0f2c2905e9916912f89b23f54185c0e90b38551c81ae3767d56fec3150cd9bd2db58e164473806c6aaaf6964a26b0de86f5fe037f85ea25f3228e5e6dc4672b11ee7418224b4bed0d668c93d4ad2a975309402c1c195f2bd1a1263e107b177c6288fe6160086efbcd133bab74435a30e5da929fcd65882c970886e36ef38c162bf17422221915d31ea852afbc6f78df1ea10fd20bd8cf77e433", 0x9b, 0x0, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x2, [@fwd, @array, @array, @const={0xb}]}}, 0x0, 0x62}, 0x20)
select(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100686cca8000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4807, 0x0)

16:29:57 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7be9651"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x12, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f08864000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28)

[  246.286805] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  246.311016] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  246.328187] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  246.375904] EXT4-fs error (device loop0): ext4_fill_super:4437: inode #2: comm syz-executor.0: iget: root inode unallocated
[  246.388690] EXT4-fs (loop0): get root inode failed
[  246.394430] EXT4-fs (loop0): mount failed
16:29:58 executing program 2:
pipe(&(0x7f0000000000)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c000000020601000000000000000000000000080e0003006269746d61703a697000000005000400000000000900020073797a3000000000240007800c00028008000140ac1e00010c00018008000140a0000000050014000800000005000500020000000500010006"], 0x1}}, 0x0)
close(0xffffffffffffffff)
socket$nl_netfilter(0x10, 0x3, 0xc)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={<r2=>0xffffffffffffffff})
r3 = dup(r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x6209, 0x0)

16:29:58 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
r2 = dup2(r0, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
r4 = dup(r3)
ioctl$BLKREPORTZONE(r4, 0xc0101282, 0x0)
ioctl$sock_bt_hidp_HIDPGETCONNLIST(r4, 0x800448d2, &(0x7f0000000440)={0x1, &(0x7f0000000000)=[{}]})

16:29:58 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x1)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

16:29:58 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7be965121eddcd904d19ef88836"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x12, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f08864000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28)

16:29:58 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
r2 = dup2(r0, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
r4 = dup(r3)
ioctl$BLKREPORTZONE(r4, 0xc0101282, 0x0)
ioctl$sock_bt_hidp_HIDPGETCONNLIST(r4, 0x800448d2, &(0x7f0000000440)={0x1, &(0x7f0000000000)=[{}]})

16:29:58 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7be965121eddcd904d19ef88836"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x12, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f08864000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28)

16:30:00 executing program 1:
socket$inet6(0xa, 0x0, 0x0)
socket$nl_xfrm(0x10, 0x3, 0x6)
pipe(&(0x7f0000000300)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
r3 = socket$inet6(0xa, 0x3, 0x3a)
connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback, 0x4}, 0x1c)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0)

16:30:00 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x1)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

16:30:00 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7be965121eddcd904d19ef88836"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x12, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f08864000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28)

16:30:00 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
r2 = dup2(r0, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
r4 = dup(r3)
ioctl$sock_bt_hidp_HIDPGETCONNLIST(r4, 0x800448d2, &(0x7f0000000440)={0x1, &(0x7f0000000000)=[{}]})

16:30:00 executing program 0:
sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="054a38", @ANYRES16, @ANYBLOB="6ffe000000000000000003000000580001800d0001"], 0x3}}, 0x0)
sendto$unix(0xffffffffffffffff, &(0x7f0000000340)="53e0f2c2905e9916912f89b23f54185c0e90b38551c81ae3767d56fec3150cd9bd2db58e164473806c6aaaf6964a26b0de86f5fe037f85ea25f3228e5e6dc4672b11ee7418224b4bed0d668c93d4ad2a975309402c1c195f2bd1a1263e107b177c6288fe6160086efbcd133bab74435a30e5da929fcd65882c970886e36ef38c162bf17422221915d31ea852afbc6f78df1ea10fd20bd8cf77e433", 0x9b, 0x0, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x2, [@fwd, @array, @array, @const={0xb}]}}, 0x0, 0x62}, 0x20)
select(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100686cca8000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4807, 0x0)

16:30:00 executing program 2:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c000000020601000000000000000000000000080e0003006269746d61703a697000000005000400000000000900020073797a3000000000240007800c00028008000140ac1e00010c00018008000140a0000000050014000800000005000500020000000500010006"], 0x1}}, 0x0)
close(r0)
socket$nl_netfilter(0x10, 0x3, 0xc)
write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={<r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x6209, 0x0)

16:30:00 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
r2 = dup2(r0, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
r4 = dup(r3)
ioctl$sock_bt_hidp_HIDPGETCONNLIST(r4, 0x800448d2, &(0x7f0000000440)={0x1, &(0x7f0000000000)=[{}]})

16:30:00 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7be965121eddcd904d19ef8883600dd6f214a"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x12, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f08864000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28)

16:30:00 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x1)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

16:30:00 executing program 2:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c000000020601000000000000000000000000080e0003006269746d61703a697000000005000400000000000900020073797a3000000000240007800c00028008000140ac1e00010c00018008000140a0000000050014000800000005000500020000000500010006"], 0x1}}, 0x0)
close(r0)
socket$nl_netfilter(0x10, 0x3, 0xc)
write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={<r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x6209, 0x0)

[  249.068287] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
16:30:01 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
r2 = dup2(r0, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
r4 = dup(r3)
ioctl$sock_bt_hidp_HIDPGETCONNLIST(r4, 0x800448d2, &(0x7f0000000440)={0x1, &(0x7f0000000000)=[{}]})

[  249.118991] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
16:30:01 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7be965121eddcd904d19ef8883600dd6f214a"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x12, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f08864000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28)

[  249.187611] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  249.264103] EXT4-fs error (device loop0): ext4_fill_super:4437: inode #2: comm syz-executor.0: iget: root inode unallocated
[  249.339114] EXT4-fs (loop0): get root inode failed
[  249.364324] EXT4-fs (loop0): mount failed
16:30:01 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x100082)
r1 = memfd_create(&(0x7f0000000380)='\x06\x00\x00\x00\x00\x00\x00\x00u\x86e\x00\x00\t\x00\xa9\x03\x00\x00', 0x0)
pwritev(r1, &(0x7f0000002680)=[{&(0x7f00000000c0)="bf9ab7bb534f1b95135f812aa33c6b9c31c29f26a0ce0a7004981f00e140bd623b231c29b9762291eeed7f51ac7f2eb555abca7900dfdd838e03dfa6504dad05ba4cba8386898febcbbc5cfd4d432510f72af5b81cc9519e2c4d6e29f232af939cf7735d25919a94326a07e7686bfb61fe61de12d19c5467753d7c2b4fc55a50252ece1ff6f1e4f5c883750a88e2c0e124b772c07109b5e1846d97ed03f4bf909effe90b2aa77d9f67a11b5f8cc59c306f0c4d1dfa45c30bfcf77eeffdf71a33865d8dcb9b962704c267c1ca1ba8bd63daf3840c5e68a83c9e22", 0xda}, {&(0x7f00000001c0)="e0da177e218bef71f81e44d66945257cc569ec852643f16df18eb9400b5ecb3f7913827781a1983c3e2ae3030c1d291eff30276546", 0x35}, {&(0x7f00000003c0)="3d53ea23f85b1c355b70a9516d82004689245d854260f99c93a05df3f8dc023515ea79c0f3b2227f3622ed284c729a2eec4b3113c5c4169d698cfe73405c16b08dc748cc7c9d4bad4f9f874def3f057c5ea391510b6ebc66d4a2364cacae42865254247cf41facb18e8ad32e5b0c3c26a722b4e5e9e2d0c2b01d0bdff044444f2403a113164a9923e6af92789fb793f1a1c4c9999ccbda6f8f", 0x99}, {&(0x7f00000004c0)="866db5d4b79d978b7d1f1996548cf7d3fde1756a773efd0ceb1ab15271a1bd91b12668ac3440e92a4576f8d7234472b27ed0de469f6e54a0eccd01c27bd50d0d57c114df803612ef9dcdb8a2d77ac7276226395cd7006de861", 0x59}], 0x4, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000400)={<r2=>0xffffffffffffffff})
r3 = dup(r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1)
sendfile(r0, r1, 0x0, 0x20000102000003)

16:30:01 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x1)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

16:30:01 executing program 2:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c000000020601000000000000000000000000080e0003006269746d61703a697000000005000400000000000900020073797a3000000000240007800c00028008000140ac1e00010c00018008000140a0000000050014000800000005000500020000000500010006"], 0x1}}, 0x0)
close(r0)
socket$nl_netfilter(0x10, 0x3, 0xc)
write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={<r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x6209, 0x0)

16:30:01 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
r2 = dup2(r0, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
ioctl$BLKREPORTZONE(0xffffffffffffffff, 0xc0101282, 0x0)
ioctl$sock_bt_hidp_HIDPGETCONNLIST(0xffffffffffffffff, 0x800448d2, &(0x7f0000000440)={0x1, &(0x7f0000000000)=[{}]})

16:30:01 executing program 0:
sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="054a38", @ANYRES16, @ANYBLOB="6ffe000000000000000003000000580001800d0001"], 0x3}}, 0x0)
sendto$unix(0xffffffffffffffff, &(0x7f0000000340)="53e0f2c2905e9916912f89b23f54185c0e90b38551c81ae3767d56fec3150cd9bd2db58e164473806c6aaaf6964a26b0de86f5fe037f85ea25f3228e5e6dc4672b11ee7418224b4bed0d668c93d4ad2a975309402c1c195f2bd1a1263e107b177c6288fe6160086efbcd133bab74435a30e5da929fcd65882c970886e36ef38c162bf17422221915d31ea852afbc6f78df1ea10fd20bd8cf77e433", 0x9b, 0x0, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x2, [@fwd, @array, @array, @const={0xb}]}}, 0x0, 0x62}, 0x20)
select(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100686cca8000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4807, 0x0)

16:30:01 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7be965121eddcd904d19ef8883600dd6f214a"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x12, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f08864000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28)

16:30:01 executing program 2:
pipe(0x0)
r0 = socket$inet_udp(0x2, 0x2, 0x0)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c000000020601000000000000000000000000080e0003006269746d61703a697000000005000400000000000900020073797a3000000000240007800c00028008000140ac1e00010c00018008000140a0000000050014000800000005000500020000000500010006"], 0x1}}, 0x0)
close(r0)
socket$nl_netfilter(0x10, 0x3, 0xc)
write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={<r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x6209, 0x0)

16:30:01 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7be965121eddcd904d19ef8883600dd6f214a4a764f"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x12, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f08864000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28)

16:30:01 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
r2 = dup2(r0, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
ioctl$BLKREPORTZONE(0xffffffffffffffff, 0xc0101282, 0x0)
ioctl$sock_bt_hidp_HIDPGETCONNLIST(0xffffffffffffffff, 0x800448d2, &(0x7f0000000440)={0x1, &(0x7f0000000000)=[{}]})

16:30:01 executing program 1:
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
close(0xffffffffffffffff)
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r0, 0x8001a0, 0xe80, 0x5ac484bb51fa106a, &(0x7f0000000380)="4d50b441e692763513ef874588a8ffffffff00000000122e25d386dd", 0x0, 0x3b, 0xf000, 0x22d}, 0x28)

[  250.041210] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
16:30:01 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7be965121eddcd904d19ef8883600dd6f214a4a764f"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x12, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f08864000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28)

16:30:01 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
r2 = dup2(r0, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
ioctl$BLKREPORTZONE(0xffffffffffffffff, 0xc0101282, 0x0)
ioctl$sock_bt_hidp_HIDPGETCONNLIST(0xffffffffffffffff, 0x800448d2, &(0x7f0000000440)={0x1, &(0x7f0000000000)=[{}]})

[  250.084448] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  250.133082] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock
16:30:02 executing program 2:
pipe(0x0)
r0 = socket$inet_udp(0x2, 0x2, 0x0)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c000000020601000000000000000000000000080e0003006269746d61703a697000000005000400000000000900020073797a3000000000240007800c00028008000140ac1e00010c00018008000140a0000000050014000800000005000500020000000500010006"], 0x1}}, 0x0)
close(r0)
socket$nl_netfilter(0x10, 0x3, 0xc)
write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={<r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x6209, 0x0)

[  250.181593] EXT4-fs error (device loop0): ext4_fill_super:4437: inode #2: comm syz-executor.0: iget: root inode unallocated
[  250.234197] EXT4-fs (loop0): get root inode failed
[  250.272975] EXT4-fs (loop0): mount failed
16:30:02 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x1)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

16:30:02 executing program 1:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x0, 0x0)
mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x41032, r0, 0x0)

16:30:02 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7be965121eddcd904d19ef8883600dd6f214a4a764f"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x12, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f08864000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28)

16:30:02 executing program 0:
sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="054a38", @ANYRES16, @ANYBLOB="6ffe000000000000000003000000580001800d00010075"], 0x3}}, 0x0)
sendto$unix(0xffffffffffffffff, &(0x7f0000000340)="53e0f2c2905e9916912f89b23f54185c0e90b38551c81ae3767d56fec3150cd9bd2db58e164473806c6aaaf6964a26b0de86f5fe037f85ea25f3228e5e6dc4672b11ee7418224b4bed0d668c93d4ad2a975309402c1c195f2bd1a1263e107b177c6288fe6160086efbcd133bab74435a30e5da929fcd65882c970886e36ef38c162bf17422221915d31ea852afbc6f78df1ea10fd20bd8cf77e433", 0x9b, 0x0, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x2, [@fwd, @array, @array, @const={0xb}]}}, 0x0, 0x62}, 0x20)
select(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100686cca8000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4807, 0x0)

16:30:02 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
r2 = dup2(r0, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
r3 = dup(0xffffffffffffffff)
ioctl$BLKREPORTZONE(r3, 0xc0101282, 0x0)
ioctl$sock_bt_hidp_HIDPGETCONNLIST(r3, 0x800448d2, &(0x7f0000000440)={0x1, &(0x7f0000000000)=[{}]})

16:30:02 executing program 2:
pipe(0x0)
r0 = socket$inet_udp(0x2, 0x2, 0x0)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c000000020601000000000000000000000000080e0003006269746d61703a697000000005000400000000000900020073797a3000000000240007800c00028008000140ac1e00010c00018008000140a0000000050014000800000005000500020000000500010006"], 0x1}}, 0x0)
close(r0)
socket$nl_netfilter(0x10, 0x3, 0xc)
write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={<r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x6209, 0x0)

16:30:02 executing program 1:
pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, <r0=>0xffffffffffffffff}, 0x0)
r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0)
splice(r1, 0x0, r0, 0x0, 0x0, 0x0)

16:30:02 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7be965121eddcd904d19ef8883600dd6f214a4a764f17"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x12, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f08864000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28)

16:30:02 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
r2 = dup2(r0, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
r3 = dup(0xffffffffffffffff)
ioctl$BLKREPORTZONE(r3, 0xc0101282, 0x0)
ioctl$sock_bt_hidp_HIDPGETCONNLIST(r3, 0x800448d2, &(0x7f0000000440)={0x1, &(0x7f0000000000)=[{}]})

16:30:02 executing program 2:
pipe(&(0x7f0000000000)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, 0x0, 0x0)
close(r2)
socket$nl_netfilter(0x10, 0x3, 0xc)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={<r3=>0xffffffffffffffff})
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
splice(r0, 0x0, r2, 0x0, 0x6209, 0x0)

16:30:02 executing program 1:
mknod(&(0x7f0000000000)='./bus\x00', 0x80008000, 0x0)
open(0x0, 0x0, 0x0)
ioctl$TIOCSETD(0xffffffffffffffff, 0x8004741b, 0x0)
open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0)

16:30:02 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7be965121eddcd904d19ef8883600dd6f214a4a764f17"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x12, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f08864000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28)

[  250.963156] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  250.972308] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  251.017453] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  251.070344] EXT4-fs error (device loop0): ext4_fill_super:4437: inode #2: comm syz-executor.0: iget: root inode unallocated
[  251.114144] EXT4-fs (loop0): get root inode failed
[  251.136129] EXT4-fs (loop0): mount failed
16:30:03 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
r2 = dup2(r0, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
r3 = dup(0xffffffffffffffff)
ioctl$BLKREPORTZONE(r3, 0xc0101282, 0x0)
ioctl$sock_bt_hidp_HIDPGETCONNLIST(r3, 0x800448d2, &(0x7f0000000440)={0x1, &(0x7f0000000000)=[{}]})

16:30:03 executing program 1:
r0 = socket$inet6(0xa, 0x3, 0x100000400000003a)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x3}, 0x1c)
r1 = socket$inet6(0xa, 0x80002, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000040)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e0000000400000058030000c8000000c8000000c8000000c8000000c8010000900200009002000090020000900200009002000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a400c8000000000000000000000000000000000000000000240052454a454354000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a400000100000000000000000000000000000000000000005c00484d41524b00000000000000000000000000000000000000000000000000e0000001000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000ff010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a400c800000000000000000000000000000000000000000024004e4651554555450000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a400c80000000000000000000000000000000000000000002400000000000000000000000000000000000000000000000000000000000000feffffff"], 0x3b4)
sendmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000040)="82e7", 0x2}, {&(0x7f0000000500)="e1", 0x1}], 0x2}}, {{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000140)="968c34", 0x3}], 0x1}}], 0x2, 0x2406a464)
write(r0, &(0x7f0000000100)="d840", 0x2)

16:30:03 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x1)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

16:30:03 executing program 0:
sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="054a38", @ANYRES16, @ANYBLOB="6ffe000000000000000003000000580001800d00010075"], 0x3}}, 0x0)
sendto$unix(0xffffffffffffffff, &(0x7f0000000340)="53e0f2c2905e9916912f89b23f54185c0e90b38551c81ae3767d56fec3150cd9bd2db58e164473806c6aaaf6964a26b0de86f5fe037f85ea25f3228e5e6dc4672b11ee7418224b4bed0d668c93d4ad2a975309402c1c195f2bd1a1263e107b177c6288fe6160086efbcd133bab74435a30e5da929fcd65882c970886e36ef38c162bf17422221915d31ea852afbc6f78df1ea10fd20bd8cf77e433", 0x9b, 0x0, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x2, [@fwd, @array, @array, @const={0xb}]}}, 0x0, 0x62}, 0x20)
select(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100686cca8000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4807, 0x0)

16:30:03 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7be965121eddcd904d19ef8883600dd6f214a4a764f17"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x12, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f08864000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28)

16:30:03 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
dup2(r0, r1)
r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
r3 = dup(r2)
ioctl$BLKREPORTZONE(r3, 0xc0101282, 0x0)
ioctl$sock_bt_hidp_HIDPGETCONNLIST(r3, 0x800448d2, &(0x7f0000000440)={0x1, &(0x7f0000000000)=[{}]})

16:30:03 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0)
r2 = socket$nl_generic(0x10, 0x3, 0x10)
r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00')
sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r3, @ANYBLOB="21020000000000000000010000000c0099001526000004"], 0xc}}, 0x0)
r4 = socket$packet(0x11, 0x2, 0x300)
r5 = dup(r4)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
sendfile(r2, r1, 0x0, 0x100000001)

16:30:03 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7be965121eddcd904d19ef8883600dd6f214a4a764f17b5"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x12, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f08864000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28)

16:30:03 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
dup2(r0, r1)
r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
r3 = dup(r2)
ioctl$BLKREPORTZONE(r3, 0xc0101282, 0x0)
ioctl$sock_bt_hidp_HIDPGETCONNLIST(r3, 0x800448d2, &(0x7f0000000440)={0x1, &(0x7f0000000000)=[{}]})

16:30:03 executing program 2:
pipe(&(0x7f0000000000)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, 0x0, 0x0)
close(r2)
socket$nl_netfilter(0x10, 0x3, 0xc)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={<r3=>0xffffffffffffffff})
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
splice(r0, 0x0, r2, 0x0, 0x6209, 0x0)

[  251.847475] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
16:30:03 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7be965121eddcd904d19ef8883600dd6f214a4a764f17b5"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x12, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f08864000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28)

[  251.876762] audit: type=1804 audit(1588955403.699:24): pid=10643 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir210500229/syzkaller.5IFUhd/129/cgroup.controllers" dev="sda1" ino=16124 res=1
16:30:03 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
dup2(r0, r1)
r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
r3 = dup(r2)
ioctl$BLKREPORTZONE(r3, 0xc0101282, 0x0)
ioctl$sock_bt_hidp_HIDPGETCONNLIST(r3, 0x800448d2, &(0x7f0000000440)={0x1, &(0x7f0000000000)=[{}]})

[  251.922438] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  251.967984] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock
16:30:03 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7be965121eddcd904d19ef8883600dd6f214a4a764f17b5"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x12, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f08864000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28)

[  252.028255] EXT4-fs error (device loop0): ext4_fill_super:4437: inode #2: comm syz-executor.0: iget: root inode unallocated
[  252.091758] EXT4-fs (loop0): get root inode failed
16:30:03 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7be965121eddcd904d19ef8883600dd6f214a4a764f17b5"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x12, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f08864000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28)

[  252.116325] EXT4-fs (loop0): mount failed
16:30:04 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x1)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

16:30:04 executing program 0:
sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="054a38", @ANYRES16, @ANYBLOB="6ffe000000000000000003000000580001800d00010075"], 0x3}}, 0x0)
sendto$unix(0xffffffffffffffff, &(0x7f0000000340)="53e0f2c2905e9916912f89b23f54185c0e90b38551c81ae3767d56fec3150cd9bd2db58e164473806c6aaaf6964a26b0de86f5fe037f85ea25f3228e5e6dc4672b11ee7418224b4bed0d668c93d4ad2a975309402c1c195f2bd1a1263e107b177c6288fe6160086efbcd133bab74435a30e5da929fcd65882c970886e36ef38c162bf17422221915d31ea852afbc6f78df1ea10fd20bd8cf77e433", 0x9b, 0x0, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x2, [@fwd, @array, @array, @const={0xb}]}}, 0x0, 0x62}, 0x20)
select(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100686cca8000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4807, 0x0)

16:30:04 executing program 3:
socket$inet6_tcp(0xa, 0x1, 0x0)
socket$inet_udp(0x2, 0x2, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
r1 = dup(r0)
ioctl$BLKREPORTZONE(r1, 0xc0101282, 0x0)
ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000440)={0x1, &(0x7f0000000000)=[{}]})

16:30:04 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0)
r2 = socket$nl_generic(0x10, 0x3, 0x10)
r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00')
sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r3, @ANYBLOB="21020000000000000000010000000c0099001526000004"], 0xc}}, 0x0)
r4 = socket$packet(0x11, 0x2, 0x300)
r5 = dup(r4)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
sendfile(r2, r1, 0x0, 0x100000001)

16:30:04 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7be965121eddcd904d19ef8883600dd6f214a4a764f17b5"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x12, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f08864000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28)

16:30:04 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7be965121eddcd904d19ef8883600dd6f214a4a764f17b5"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x12, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f08864000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28)

16:30:04 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x1)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

16:30:04 executing program 2:
pipe(&(0x7f0000000000)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, 0x0, 0x0)
close(r2)
socket$nl_netfilter(0x10, 0x3, 0xc)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={<r3=>0xffffffffffffffff})
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
splice(r0, 0x0, r2, 0x0, 0x6209, 0x0)

16:30:04 executing program 3:
socket$inet6_tcp(0xa, 0x1, 0x0)
socket$inet_udp(0x2, 0x2, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
r1 = dup(r0)
ioctl$BLKREPORTZONE(r1, 0xc0101282, 0x0)
ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000440)={0x1, &(0x7f0000000000)=[{}]})

[  252.742853] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  252.745168] audit: type=1804 audit(1588955404.569:25): pid=10689 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir210500229/syzkaller.5IFUhd/130/cgroup.controllers" dev="sda1" ino=16182 res=1
[  252.823349] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  252.890864] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  252.942485] EXT4-fs error (device loop0): ext4_fill_super:4437: inode #2: comm syz-executor.0: iget: root inode unallocated
16:30:04 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7be965121eddcd904d19ef8883600dd6f214a4a764f17b5"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x12, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f08864000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28)

16:30:04 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x1)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

[  252.986691] EXT4-fs (loop0): get root inode failed
[  253.001662] EXT4-fs (loop0): mount failed
16:30:04 executing program 3:
socket$inet6_tcp(0xa, 0x1, 0x0)
socket$inet_udp(0x2, 0x2, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
r1 = dup(r0)
ioctl$BLKREPORTZONE(r1, 0xc0101282, 0x0)
ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000440)={0x1, &(0x7f0000000000)=[{}]})

16:30:04 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7be965121eddcd904d19ef8883600dd6f214a4a764f17b5"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x12, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f08864000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28)

16:30:05 executing program 0:
sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="054a38", @ANYBLOB="6ffe000000000000000003000000580001800d0001007564"], 0x3}}, 0x0)
sendto$unix(0xffffffffffffffff, &(0x7f0000000340)="53e0f2c2905e9916912f89b23f54185c0e90b38551c81ae3767d56fec3150cd9bd2db58e164473806c6aaaf6964a26b0de86f5fe037f85ea25f3228e5e6dc4672b11ee7418224b4bed0d668c93d4ad2a975309402c1c195f2bd1a1263e107b177c6288fe6160086efbcd133bab74435a30e5da929fcd65882c970886e36ef38c162bf17422221915d31ea852afbc6f78df1ea10fd20bd8cf77e433", 0x9b, 0x0, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x2, [@fwd, @array, @array, @const={0xb}]}}, 0x0, 0x62}, 0x20)
select(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100686cca8000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4807, 0x0)

16:30:05 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7be965121eddcd904d19ef8883600dd6f214a4a764f17b5"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x12, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f08864000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28)

16:30:05 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = dup2(r0, 0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
r3 = dup(r2)
ioctl$BLKREPORTZONE(r3, 0xc0101282, 0x0)
ioctl$sock_bt_hidp_HIDPGETCONNLIST(r3, 0x800448d2, &(0x7f0000000440)={0x1, &(0x7f0000000000)=[{}]})

16:30:05 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0)
r2 = socket$nl_generic(0x10, 0x3, 0x10)
r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00')
sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r3, @ANYBLOB="21020000000000000000010000000c0099001526000004"], 0xc}}, 0x0)
r4 = socket$packet(0x11, 0x2, 0x300)
r5 = dup(r4)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
sendfile(r2, r1, 0x0, 0x100000001)

16:30:05 executing program 5:
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7be965121eddcd904d19ef8883600dd6f214a4a764f17b5"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffff8b}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)

16:30:05 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, 0x0, &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x1)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

16:30:05 executing program 2:
pipe(&(0x7f0000000000)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, 0x0}, 0x0)
close(r2)
socket$nl_netfilter(0x10, 0x3, 0xc)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={<r3=>0xffffffffffffffff})
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
splice(r0, 0x0, r2, 0x0, 0x6209, 0x0)

[  253.637802] EXT4-fs (loop0): unsupported inode size: 29952
[  253.668576] EXT4-fs (loop0): blocksize: 4096
16:30:05 executing program 5:
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7be965121eddcd904d19ef8883600dd6f214a4a764f17b5"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffff8b}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)

16:30:05 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = dup2(r0, 0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
r3 = dup(r2)
ioctl$BLKREPORTZONE(r3, 0xc0101282, 0x0)
ioctl$sock_bt_hidp_HIDPGETCONNLIST(r3, 0x800448d2, &(0x7f0000000440)={0x1, &(0x7f0000000000)=[{}]})

16:30:05 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, 0x0, &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x1)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

[  253.740500] audit: type=1804 audit(1588955405.559:26): pid=10740 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir210500229/syzkaller.5IFUhd/131/cgroup.controllers" dev="sda1" ino=16189 res=1
16:30:05 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = dup2(r0, 0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
r3 = dup(r2)
ioctl$BLKREPORTZONE(r3, 0xc0101282, 0x0)
ioctl$sock_bt_hidp_HIDPGETCONNLIST(r3, 0x800448d2, &(0x7f0000000440)={0x1, &(0x7f0000000000)=[{}]})

16:30:05 executing program 5:
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7be965121eddcd904d19ef8883600dd6f214a4a764f17b5"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffff8b}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)

16:30:06 executing program 0:
sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="054a38", @ANYBLOB="6ffe000000000000000003000000580001800d0001007564"], 0x3}}, 0x0)
sendto$unix(0xffffffffffffffff, &(0x7f0000000340)="53e0f2c2905e9916912f89b23f54185c0e90b38551c81ae3767d56fec3150cd9bd2db58e164473806c6aaaf6964a26b0de86f5fe037f85ea25f3228e5e6dc4672b11ee7418224b4bed0d668c93d4ad2a975309402c1c195f2bd1a1263e107b177c6288fe6160086efbcd133bab74435a30e5da929fcd65882c970886e36ef38c162bf17422221915d31ea852afbc6f78df1ea10fd20bd8cf77e433", 0x9b, 0x0, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x2, [@fwd, @array, @array, @const={0xb}]}}, 0x0, 0x62}, 0x20)
select(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100686cca8000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4807, 0x0)

16:30:06 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, 0x0, &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x1)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

16:30:06 executing program 5:
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7be965121eddcd904d19ef8883600dd6f214a4a764f17b5"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffff8b}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x18000000000002a0, 0x12, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f08864000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28)

16:30:06 executing program 3:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
r1 = dup2(0xffffffffffffffff, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
r3 = dup(r2)
ioctl$BLKREPORTZONE(r3, 0xc0101282, 0x0)
ioctl$sock_bt_hidp_HIDPGETCONNLIST(r3, 0x800448d2, &(0x7f0000000440)={0x1, &(0x7f0000000000)=[{}]})

16:30:06 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0)
r2 = socket$nl_generic(0x10, 0x3, 0x10)
r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00')
sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r3, @ANYBLOB="21020000000000000000010000000c0099001526000004"], 0xc}}, 0x0)
r4 = socket$packet(0x11, 0x2, 0x300)
r5 = dup(r4)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
sendfile(r2, r1, 0x0, 0x100000001)

16:30:06 executing program 3:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
r1 = dup2(0xffffffffffffffff, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
r3 = dup(r2)
ioctl$BLKREPORTZONE(r3, 0xc0101282, 0x0)
ioctl$sock_bt_hidp_HIDPGETCONNLIST(r3, 0x800448d2, &(0x7f0000000440)={0x1, &(0x7f0000000000)=[{}]})

[  254.496985] audit: type=1804 audit(1588955406.319:27): pid=10777 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir210500229/syzkaller.5IFUhd/132/cgroup.controllers" dev="sda1" ino=16198 res=1
[  254.577046] EXT4-fs (loop0): unsupported inode size: 29952
16:30:06 executing program 2:
pipe(&(0x7f0000000000)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, 0x0}, 0x0)
close(r2)
socket$nl_netfilter(0x10, 0x3, 0xc)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={<r3=>0xffffffffffffffff})
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
splice(r0, 0x0, r2, 0x0, 0x6209, 0x0)

16:30:06 executing program 5:
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7be965121eddcd904d19ef8883600dd6f214a4a764f17b5"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffff8b}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x18000000000002a0, 0x12, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f08864000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28)

16:30:06 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', 0x0, 0x0, 0x1)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

[  254.622311] EXT4-fs (loop0): blocksize: 4096
16:30:06 executing program 3:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
r1 = dup2(0xffffffffffffffff, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
r3 = dup(r2)
ioctl$BLKREPORTZONE(r3, 0xc0101282, 0x0)
ioctl$sock_bt_hidp_HIDPGETCONNLIST(r3, 0x800448d2, &(0x7f0000000440)={0x1, &(0x7f0000000000)=[{}]})

16:30:06 executing program 5:
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7be965121eddcd904d19ef8883600dd6f214a4a764f17b5"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffff8b}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x18000000000002a0, 0x12, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f08864000f88a800008100638877fbac141421e9", 0x0, 0x100}, 0x28)

16:30:06 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', 0x0, 0x0, 0x1)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

16:30:07 executing program 0:
sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="054a38", @ANYBLOB="6ffe000000000000000003000000580001800d0001007564"], 0x3}}, 0x0)
sendto$unix(0xffffffffffffffff, &(0x7f0000000340)="53e0f2c2905e9916912f89b23f54185c0e90b38551c81ae3767d56fec3150cd9bd2db58e164473806c6aaaf6964a26b0de86f5fe037f85ea25f3228e5e6dc4672b11ee7418224b4bed0d668c93d4ad2a975309402c1c195f2bd1a1263e107b177c6288fe6160086efbcd133bab74435a30e5da929fcd65882c970886e36ef38c162bf17422221915d31ea852afbc6f78df1ea10fd20bd8cf77e433", 0x9b, 0x0, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x2, [@fwd, @array, @array, @const={0xb}]}}, 0x0, 0x62}, 0x20)
select(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100686cca8000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4807, 0x0)

16:30:07 executing program 3:
socket$inet6_tcp(0xa, 0x1, 0x0)
r0 = socket$inet_udp(0x2, 0x2, 0x0)
r1 = dup2(0xffffffffffffffff, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
r3 = dup(r2)
ioctl$BLKREPORTZONE(r3, 0xc0101282, 0x0)
ioctl$sock_bt_hidp_HIDPGETCONNLIST(r3, 0x800448d2, &(0x7f0000000440)={0x1, &(0x7f0000000000)=[{}]})

16:30:07 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7be965121eddcd904d19ef8883600dd6f214a4a764f17b5"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffff8b}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x40)

16:30:07 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0)
r2 = socket$nl_generic(0x10, 0x3, 0x10)
r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00')
sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r3, @ANYBLOB="21020000000000000000010000000c0099001526000004"], 0xc}}, 0x0)
r4 = socket$packet(0x11, 0x2, 0x300)
dup(r4)
sendfile(r2, r1, 0x0, 0x100000001)

16:30:07 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', 0x0, 0x0, 0x1)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

16:30:07 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7be965121eddcd904d19ef8883600dd6f214a4a764f17b5"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffff8b}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x40)

[  255.414060] audit: type=1804 audit(1588955407.239:28): pid=10820 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir210500229/syzkaller.5IFUhd/133/cgroup.controllers" dev="sda1" ino=16214 res=1
[  255.445651] EXT4-fs (loop0): unsupported inode size: 29952
[  255.459167] EXT4-fs (loop0): blocksize: 4096
16:30:07 executing program 2:
pipe(&(0x7f0000000000)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, 0x0}, 0x0)
close(r2)
socket$nl_netfilter(0x10, 0x3, 0xc)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={<r3=>0xffffffffffffffff})
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
splice(r0, 0x0, r2, 0x0, 0x6209, 0x0)

16:30:07 executing program 3:
socket$inet6_tcp(0xa, 0x1, 0x0)
r0 = socket$inet_udp(0x2, 0x2, 0x0)
r1 = dup2(0xffffffffffffffff, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
r3 = dup(r2)
ioctl$BLKREPORTZONE(r3, 0xc0101282, 0x0)
ioctl$sock_bt_hidp_HIDPGETCONNLIST(r3, 0x800448d2, &(0x7f0000000440)={0x1, &(0x7f0000000000)=[{}]})

16:30:07 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x0, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x1)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

16:30:07 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7be965121eddcd904d19ef8883600dd6f214a4a764f17b5"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffff8b}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x40)

16:30:07 executing program 3:
socket$inet6_tcp(0xa, 0x1, 0x0)
r0 = socket$inet_udp(0x2, 0x2, 0x0)
r1 = dup2(0xffffffffffffffff, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
r3 = dup(r2)
ioctl$BLKREPORTZONE(r3, 0xc0101282, 0x0)
ioctl$sock_bt_hidp_HIDPGETCONNLIST(r3, 0x800448d2, &(0x7f0000000440)={0x1, &(0x7f0000000000)=[{}]})

16:30:07 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7be965121eddcd904d19ef8883600dd6f214a4a764f17b5"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffff8b}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000500), 0x0, 0x100}, 0x40)

16:30:07 executing program 0:
sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYRES16, @ANYBLOB="6ffe000000000000000003000000580001800d0001007564"], 0x3}}, 0x0)
sendto$unix(0xffffffffffffffff, &(0x7f0000000340)="53e0f2c2905e9916912f89b23f54185c0e90b38551c81ae3767d56fec3150cd9bd2db58e164473806c6aaaf6964a26b0de86f5fe037f85ea25f3228e5e6dc4672b11ee7418224b4bed0d668c93d4ad2a975309402c1c195f2bd1a1263e107b177c6288fe6160086efbcd133bab74435a30e5da929fcd65882c970886e36ef38c162bf17422221915d31ea852afbc6f78df1ea10fd20bd8cf77e433", 0x9b, 0x0, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x2, [@fwd, @array, @array, @const={0xb}]}}, 0x0, 0x62}, 0x20)
select(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100686cca8000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4807, 0x0)

16:30:07 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0)
r2 = socket$nl_generic(0x10, 0x3, 0x10)
r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00')
sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r3, @ANYBLOB="21020000000000000000010000000c0099001526000004"], 0xc}}, 0x0)
r4 = socket$packet(0x11, 0x2, 0x300)
dup(r4)
sendfile(r2, r1, 0x0, 0x100000001)

16:30:07 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x0, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x1)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

16:30:07 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
socket$inet_udp(0x2, 0x2, 0x0)
r1 = dup2(r0, 0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
r3 = dup(r2)
ioctl$BLKREPORTZONE(r3, 0xc0101282, 0x0)
ioctl$sock_bt_hidp_HIDPGETCONNLIST(r3, 0x800448d2, &(0x7f0000000440)={0x1, &(0x7f0000000000)=[{}]})

16:30:07 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7be965121eddcd904d19ef8883600dd6f214a4a764f17b5"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffff8b}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000500), 0x0, 0x100}, 0x40)

16:30:08 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
socket$inet_udp(0x2, 0x2, 0x0)
r1 = dup2(r0, 0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
r3 = dup(r2)
ioctl$BLKREPORTZONE(r3, 0xc0101282, 0x0)
ioctl$sock_bt_hidp_HIDPGETCONNLIST(r3, 0x800448d2, &(0x7f0000000440)={0x1, &(0x7f0000000000)=[{}]})

[  256.321613] audit: type=1804 audit(1588955408.139:29): pid=10864 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir210500229/syzkaller.5IFUhd/134/cgroup.controllers" dev="sda1" ino=16228 res=1
[  256.355569] EXT4-fs (loop0): unsupported inode size: 25717
[  256.401711] EXT4-fs (loop0): blocksize: 4096
16:30:08 executing program 2:
pipe(&(0x7f0000000000)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x1}}, 0x0)
close(r2)
socket$nl_netfilter(0x10, 0x3, 0xc)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={<r3=>0xffffffffffffffff})
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
splice(r0, 0x0, r2, 0x0, 0x6209, 0x0)

16:30:08 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7be965121eddcd904d19ef8883600dd6f214a4a764f17b5"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffff8b}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000500), 0x0, 0x100}, 0x40)

16:30:08 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x0, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x1)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

16:30:08 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
socket$inet_udp(0x2, 0x2, 0x0)
r1 = dup2(r0, 0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
r3 = dup(r2)
ioctl$BLKREPORTZONE(r3, 0xc0101282, 0x0)
ioctl$sock_bt_hidp_HIDPGETCONNLIST(r3, 0x800448d2, &(0x7f0000000440)={0x1, &(0x7f0000000000)=[{}]})

16:30:08 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
dup2(r0, r1)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
r3 = dup(r2)
ioctl$BLKREPORTZONE(r3, 0xc0101282, 0x0)
ioctl$sock_bt_hidp_HIDPGETCONNLIST(r3, 0x800448d2, &(0x7f0000000440)={0x1, &(0x7f0000000000)=[{}]})

16:30:08 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7be965121eddcd904d19ef8883600dd6f214a4a764f17b5"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffff8b}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x10, 0x0, &(0x7f0000000500)="b9ff0300000d698cb89e14f08864000f", 0x0, 0x100}, 0x40)

16:30:08 executing program 0:
sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYRES16, @ANYBLOB="6ffe000000000000000003000000580001800d0001007564"], 0x3}}, 0x0)
sendto$unix(0xffffffffffffffff, &(0x7f0000000340)="53e0f2c2905e9916912f89b23f54185c0e90b38551c81ae3767d56fec3150cd9bd2db58e164473806c6aaaf6964a26b0de86f5fe037f85ea25f3228e5e6dc4672b11ee7418224b4bed0d668c93d4ad2a975309402c1c195f2bd1a1263e107b177c6288fe6160086efbcd133bab74435a30e5da929fcd65882c970886e36ef38c162bf17422221915d31ea852afbc6f78df1ea10fd20bd8cf77e433", 0x9b, 0x0, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x2, [@fwd, @array, @array, @const={0xb}]}}, 0x0, 0x62}, 0x20)
select(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100686cca8000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4807, 0x0)

16:30:08 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x0, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x1)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

16:30:08 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
dup2(r0, r1)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
r3 = dup(r2)
ioctl$BLKREPORTZONE(r3, 0xc0101282, 0x0)
ioctl$sock_bt_hidp_HIDPGETCONNLIST(r3, 0x800448d2, &(0x7f0000000440)={0x1, &(0x7f0000000000)=[{}]})

16:30:08 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0)
r2 = socket$nl_generic(0x10, 0x3, 0x10)
r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00')
sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r3, @ANYBLOB="21020000000000000000010000000c0099001526000004"], 0xc}}, 0x0)
r4 = socket$packet(0x11, 0x2, 0x300)
dup(r4)
sendfile(r2, r1, 0x0, 0x100000001)

16:30:08 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7be965121eddcd904d19ef8883600dd6f214a4a764f17b5"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffff8b}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x10, 0x0, &(0x7f0000000500)="b9ff0300000d698cb89e14f08864000f", 0x0, 0x100}, 0x40)

16:30:09 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7be965121eddcd904d19ef8883600dd6f214a4a764f17b5"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffff8b}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x10, 0x0, &(0x7f0000000500)="b9ff0300000d698cb89e14f08864000f", 0x0, 0x100}, 0x40)

[  257.182663] audit: type=1804 audit(1588955408.999:30): pid=10904 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir210500229/syzkaller.5IFUhd/135/cgroup.controllers" dev="sda1" ino=16219 res=1
[  257.315056] EXT4-fs (loop0): unsupported inode size: 25717
[  257.320954] EXT4-fs (loop0): blocksize: 4096
16:30:09 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x0, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x1)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

16:30:09 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
dup2(r0, r1)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
r3 = dup(r2)
ioctl$BLKREPORTZONE(r3, 0xc0101282, 0x0)
ioctl$sock_bt_hidp_HIDPGETCONNLIST(r3, 0x800448d2, &(0x7f0000000440)={0x1, &(0x7f0000000000)=[{}]})

16:30:09 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7be965121eddcd904d19ef8883600dd6f214a4a764f17b5"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffff8b}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x18, 0x0, &(0x7f0000000500)="b9ff0300000d698cb89e14f08864000f88a8000081006388", 0x0, 0x100}, 0x40)

16:30:09 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0)
r2 = socket$nl_generic(0x10, 0x3, 0x10)
r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00')
sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r3, @ANYBLOB="21020000000000000000010000000c0099001526000004"], 0xc}}, 0x0)
socket$packet(0x11, 0x2, 0x300)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
sendfile(r2, r1, 0x0, 0x100000001)

16:30:09 executing program 2:
pipe(&(0x7f0000000000)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x1}}, 0x0)
close(r2)
socket$nl_netfilter(0x10, 0x3, 0xc)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={<r3=>0xffffffffffffffff})
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
splice(r0, 0x0, r2, 0x0, 0x6209, 0x0)

16:30:09 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x0, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x1)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

[  257.663456] audit: type=1804 audit(1588955409.489:31): pid=10931 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir210500229/syzkaller.5IFUhd/136/cgroup.controllers" dev="sda1" ino=16094 res=1
16:30:09 executing program 0:
sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYRES16, @ANYBLOB="6ffe000000000000000003000000580001800d0001007564"], 0x3}}, 0x0)
sendto$unix(0xffffffffffffffff, &(0x7f0000000340)="53e0f2c2905e9916912f89b23f54185c0e90b38551c81ae3767d56fec3150cd9bd2db58e164473806c6aaaf6964a26b0de86f5fe037f85ea25f3228e5e6dc4672b11ee7418224b4bed0d668c93d4ad2a975309402c1c195f2bd1a1263e107b177c6288fe6160086efbcd133bab74435a30e5da929fcd65882c970886e36ef38c162bf17422221915d31ea852afbc6f78df1ea10fd20bd8cf77e433", 0x9b, 0x0, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x2, [@fwd, @array, @array, @const={0xb}]}}, 0x0, 0x62}, 0x20)
select(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100686cca8000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4807, 0x0)

16:30:09 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7be965121eddcd904d19ef8883600dd6f214a4a764f17b5"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffff8b}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x18, 0x0, &(0x7f0000000500)="b9ff0300000d698cb89e14f08864000f88a8000081006388", 0x0, 0x100}, 0x40)

16:30:09 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
r2 = dup2(r0, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0)
r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
r4 = dup(r3)
ioctl$BLKREPORTZONE(r4, 0xc0101282, 0x0)
ioctl$sock_bt_hidp_HIDPGETCONNLIST(r4, 0x800448d2, &(0x7f0000000440)={0x1, &(0x7f0000000000)=[{}]})

16:30:09 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x15, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045"}, 0x15, 0x1)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

16:30:09 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0)
r2 = socket$nl_generic(0x10, 0x3, 0x10)
r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00')
sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r3, @ANYBLOB="21020000000000000000010000000c0099001526000004"], 0xc}}, 0x0)
socket$packet(0x11, 0x2, 0x300)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
sendfile(r2, r1, 0x0, 0x100000001)

16:30:09 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7be965121eddcd904d19ef8883600dd6f214a4a764f17b5"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffff8b}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x18, 0x0, &(0x7f0000000500)="b9ff0300000d698cb89e14f08864000f88a8000081006388", 0x0, 0x100}, 0x40)

16:30:10 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
r2 = dup2(r0, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0)
r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
r4 = dup(r3)
ioctl$BLKREPORTZONE(r4, 0xc0101282, 0x0)
ioctl$sock_bt_hidp_HIDPGETCONNLIST(r4, 0x800448d2, &(0x7f0000000440)={0x1, &(0x7f0000000000)=[{}]})

[  258.174875] EXT4-fs (loop0): unsupported inode size: 25717
[  258.209179] EXT4-fs (loop0): blocksize: 4096
16:30:10 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7be965121eddcd904d19ef8883600dd6f214a4a764f17b5"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffff8b}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x1c, 0x0, &(0x7f0000000500)="b9ff0300000d698cb89e14f08864000f88a800008100638877fbac14", 0x0, 0x100}, 0x40)

16:30:10 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x15, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045"}, 0x15, 0x1)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

16:30:10 executing program 2:
pipe(&(0x7f0000000000)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x1}}, 0x0)
close(r2)
socket$nl_netfilter(0x10, 0x3, 0xc)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={<r3=>0xffffffffffffffff})
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
splice(r0, 0x0, r2, 0x0, 0x6209, 0x0)

[  258.317316] audit: type=1804 audit(1588955410.139:32): pid=10960 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir210500229/syzkaller.5IFUhd/137/cgroup.controllers" dev="sda1" ino=16231 res=1
16:30:10 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
r2 = dup2(r0, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0)
r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
r4 = dup(r3)
ioctl$BLKREPORTZONE(r4, 0xc0101282, 0x0)
ioctl$sock_bt_hidp_HIDPGETCONNLIST(r4, 0x800448d2, &(0x7f0000000440)={0x1, &(0x7f0000000000)=[{}]})

16:30:10 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7be965121eddcd904d19ef8883600dd6f214a4a764f17b5"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffff8b}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x1c, 0x0, &(0x7f0000000500)="b9ff0300000d698cb89e14f08864000f88a800008100638877fbac14", 0x0, 0x100}, 0x40)

16:30:10 executing program 0:
sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB, @ANYRES16, @ANYBLOB="6ffe000000000000000003000000580001800d0001007564"], 0x3}}, 0x0)
sendto$unix(0xffffffffffffffff, &(0x7f0000000340)="53e0f2c2905e9916912f89b23f54185c0e90b38551c81ae3767d56fec3150cd9bd2db58e164473806c6aaaf6964a26b0de86f5fe037f85ea25f3228e5e6dc4672b11ee7418224b4bed0d668c93d4ad2a975309402c1c195f2bd1a1263e107b177c6288fe6160086efbcd133bab74435a30e5da929fcd65882c970886e36ef38c162bf17422221915d31ea852afbc6f78df1ea10fd20bd8cf77e433", 0x9b, 0x0, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x2, [@fwd, @array, @array, @const={0xb}]}}, 0x0, 0x62}, 0x20)
select(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100686cca8000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4807, 0x0)

16:30:10 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x15, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045"}, 0x15, 0x1)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

16:30:10 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
r2 = dup2(r0, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
r3 = dup(0xffffffffffffffff)
ioctl$BLKREPORTZONE(r3, 0xc0101282, 0x0)
ioctl$sock_bt_hidp_HIDPGETCONNLIST(r3, 0x800448d2, &(0x7f0000000440)={0x1, &(0x7f0000000000)=[{}]})

16:30:10 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7be965121eddcd904d19ef8883600dd6f214a4a764f17b5"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffff8b}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x1c, 0x0, &(0x7f0000000500)="b9ff0300000d698cb89e14f08864000f88a800008100638877fbac14", 0x0, 0x100}, 0x40)

16:30:10 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0)
r2 = socket$nl_generic(0x10, 0x3, 0x10)
r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00')
sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r3, @ANYBLOB="21020000000000000000010000000c0099001526000004"], 0xc}}, 0x0)
socket$packet(0x11, 0x2, 0x300)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
sendfile(r2, r1, 0x0, 0x100000001)

16:30:10 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7be965121eddcd904d19ef8883600dd6f214a4a764f17b5"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffff8b}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x1e, 0x0, &(0x7f0000000500)="b9ff0300000d698cb89e14f08864000f88a800008100638877fbac141421", 0x0, 0x100}, 0x40)

16:30:10 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x46, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf"}, 0x46, 0x1)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

16:30:10 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
r2 = dup2(r0, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
r3 = dup(0xffffffffffffffff)
ioctl$BLKREPORTZONE(r3, 0xc0101282, 0x0)
ioctl$sock_bt_hidp_HIDPGETCONNLIST(r3, 0x800448d2, &(0x7f0000000440)={0x1, &(0x7f0000000000)=[{}]})

16:30:10 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7be965121eddcd904d19ef8883600dd6f214a4a764f17b5"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffff8b}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x1e, 0x0, &(0x7f0000000500)="b9ff0300000d698cb89e14f08864000f88a800008100638877fbac141421", 0x0, 0x100}, 0x40)

[  259.079683] audit: type=1804 audit(1588955410.899:33): pid=11001 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir210500229/syzkaller.5IFUhd/138/cgroup.controllers" dev="sda1" ino=16218 res=1
[  259.107533] EXT4-fs (loop0): unsupported inode size: 25717
[  259.124047] EXT4-fs (loop0): blocksize: 4096
16:30:11 executing program 2:
pipe(&(0x7f0000000000)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[], 0x1}}, 0x0)
close(r2)
socket$nl_netfilter(0x10, 0x3, 0xc)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={<r3=>0xffffffffffffffff})
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
splice(r0, 0x0, r2, 0x0, 0x6209, 0x0)

16:30:11 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x46, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf"}, 0x46, 0x1)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

16:30:11 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
r2 = dup2(r0, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
r3 = dup(0xffffffffffffffff)
ioctl$BLKREPORTZONE(r3, 0xc0101282, 0x0)
ioctl$sock_bt_hidp_HIDPGETCONNLIST(r3, 0x800448d2, &(0x7f0000000440)={0x1, &(0x7f0000000000)=[{}]})

16:30:11 executing program 0:
sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB, @ANYRES16, @ANYBLOB="6ffe000000000000000003000000580001800d0001007564"], 0x3}}, 0x0)
sendto$unix(0xffffffffffffffff, &(0x7f0000000340)="53e0f2c2905e9916912f89b23f54185c0e90b38551c81ae3767d56fec3150cd9bd2db58e164473806c6aaaf6964a26b0de86f5fe037f85ea25f3228e5e6dc4672b11ee7418224b4bed0d668c93d4ad2a975309402c1c195f2bd1a1263e107b177c6288fe6160086efbcd133bab74435a30e5da929fcd65882c970886e36ef38c162bf17422221915d31ea852afbc6f78df1ea10fd20bd8cf77e433", 0x9b, 0x0, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x2, [@fwd, @array, @array, @const={0xb}]}}, 0x0, 0x62}, 0x20)
select(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100686cca8000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4807, 0x0)

16:30:11 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7be965121eddcd904d19ef8883600dd6f214a4a764f17b5"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffff8b}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x1e, 0x0, &(0x7f0000000500)="b9ff0300000d698cb89e14f08864000f88a800008100638877fbac141421", 0x0, 0x100}, 0x40)

16:30:11 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0)
r2 = socket$nl_generic(0x10, 0x3, 0x10)
r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00')
sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r3, @ANYBLOB="21020000000000000000010000000c0099001526000004"], 0xc}}, 0x0)
r4 = dup(0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
sendfile(r2, r1, 0x0, 0x100000001)

16:30:11 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
r2 = dup2(r0, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
r4 = dup(r3)
ioctl$BLKREPORTZONE(0xffffffffffffffff, 0xc0101282, 0x0)
ioctl$sock_bt_hidp_HIDPGETCONNLIST(r4, 0x800448d2, &(0x7f0000000440)={0x1, &(0x7f0000000000)=[{}]})

16:30:11 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x46, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf"}, 0x46, 0x1)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

16:30:11 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7be965121eddcd904d19ef8883600dd6f214a4a764f17b5"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffff8b}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x1f, 0x0, &(0x7f0000000500)="b9ff0300000d698cb89e14f08864000f88a800008100638877fbac141421e9", 0x0}, 0x40)

16:30:11 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
r2 = dup2(r0, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
r4 = dup(r3)
ioctl$BLKREPORTZONE(0xffffffffffffffff, 0xc0101282, 0x0)
ioctl$sock_bt_hidp_HIDPGETCONNLIST(r4, 0x800448d2, &(0x7f0000000440)={0x1, &(0x7f0000000000)=[{}]})

[  259.936075] audit: type=1804 audit(1588955411.759:34): pid=11041 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir210500229/syzkaller.5IFUhd/139/cgroup.controllers" dev="sda1" ino=16221 res=1
[  259.967811] EXT4-fs (loop0): unsupported inode size: 25717
[  259.990069] EXT4-fs (loop0): blocksize: 4096
16:30:11 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7be965121eddcd904d19ef8883600dd6f214a4a764f17b5"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffff8b}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x1f, 0x0, &(0x7f0000000500)="b9ff0300000d698cb89e14f08864000f88a800008100638877fbac141421e9", 0x0}, 0x40)

16:30:12 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x5e, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a"}, 0x5e, 0x1)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

16:30:12 executing program 2:
pipe(&(0x7f0000000000)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[], 0x1}}, 0x0)
close(r2)
socket$nl_netfilter(0x10, 0x3, 0xc)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={<r3=>0xffffffffffffffff})
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
splice(r0, 0x0, r2, 0x0, 0x6209, 0x0)

16:30:12 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
r2 = dup2(r0, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
r4 = dup(r3)
ioctl$BLKREPORTZONE(0xffffffffffffffff, 0xc0101282, 0x0)
ioctl$sock_bt_hidp_HIDPGETCONNLIST(r4, 0x800448d2, &(0x7f0000000440)={0x1, &(0x7f0000000000)=[{}]})

16:30:12 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7be965121eddcd904d19ef8883600dd6f214a4a764f17b5"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffff8b}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x1f, 0x0, &(0x7f0000000500)="b9ff0300000d698cb89e14f08864000f88a800008100638877fbac141421e9", 0x0}, 0x40)

16:30:12 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
r2 = dup2(r0, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
r4 = dup(r3)
ioctl$BLKREPORTZONE(r4, 0xc0101282, 0x0)
ioctl$sock_bt_hidp_HIDPGETCONNLIST(0xffffffffffffffff, 0x800448d2, &(0x7f0000000440)={0x1, &(0x7f0000000000)=[{}]})

16:30:12 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0)
r2 = socket$nl_generic(0x10, 0x3, 0x10)
r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00')
sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r3, @ANYBLOB="21020000000000000000010000000c0099001526000004"], 0xc}}, 0x0)
r4 = dup(0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
sendfile(r2, r1, 0x0, 0x100000001)

16:30:12 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7be965121eddcd904d19ef8883600dd6f214a4a764f17b5"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffff8b}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x1f, 0x0, &(0x7f0000000500)="b9ff0300000d698cb89e14f08864000f88a800008100638877fbac141421e9", 0x0, 0x100, 0x0, 0x0, 0x0, 0x0}, 0x40)

16:30:12 executing program 0:
sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB, @ANYRES16, @ANYBLOB="6ffe000000000000000003000000580001800d0001007564"], 0x3}}, 0x0)
sendto$unix(0xffffffffffffffff, &(0x7f0000000340)="53e0f2c2905e9916912f89b23f54185c0e90b38551c81ae3767d56fec3150cd9bd2db58e164473806c6aaaf6964a26b0de86f5fe037f85ea25f3228e5e6dc4672b11ee7418224b4bed0d668c93d4ad2a975309402c1c195f2bd1a1263e107b177c6288fe6160086efbcd133bab74435a30e5da929fcd65882c970886e36ef38c162bf17422221915d31ea852afbc6f78df1ea10fd20bd8cf77e433", 0x9b, 0x0, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x2, [@fwd, @array, @array, @const={0xb}]}}, 0x0, 0x62}, 0x20)
select(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100686cca8000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4807, 0x0)

16:30:12 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x5e, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a"}, 0x5e, 0x1)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

16:30:12 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
r2 = dup2(r0, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
r4 = dup(r3)
ioctl$BLKREPORTZONE(r4, 0xc0101282, 0x0)
ioctl$sock_bt_hidp_HIDPGETCONNLIST(0xffffffffffffffff, 0x800448d2, &(0x7f0000000440)={0x1, &(0x7f0000000000)=[{}]})

16:30:12 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7be965121eddcd904d19ef8883600dd6f214a4a764f17b5"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffff8b}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x1f, 0x0, &(0x7f0000000500)="b9ff0300000d698cb89e14f08864000f88a800008100638877fbac141421e9", 0x0, 0x100, 0x0, 0x0, 0x0, 0x0}, 0x40)

16:30:12 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x5e, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a"}, 0x5e, 0x1)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

[  260.877027] audit: type=1804 audit(1588955412.700:35): pid=11087 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir210500229/syzkaller.5IFUhd/140/cgroup.controllers" dev="sda1" ino=15765 res=1
[  260.922960] EXT4-fs (loop0): unsupported inode size: 25717
16:30:12 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
r2 = dup2(r0, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
r4 = dup(r3)
ioctl$BLKREPORTZONE(r4, 0xc0101282, 0x0)
ioctl$sock_bt_hidp_HIDPGETCONNLIST(0xffffffffffffffff, 0x800448d2, &(0x7f0000000440)={0x1, &(0x7f0000000000)=[{}]})

[  260.951289] EXT4-fs (loop0): blocksize: 4096
16:30:13 executing program 2:
pipe(&(0x7f0000000000)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[], 0x1}}, 0x0)
close(r2)
socket$nl_netfilter(0x10, 0x3, 0xc)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={<r3=>0xffffffffffffffff})
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
splice(r0, 0x0, r2, 0x0, 0x6209, 0x0)

16:30:13 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7be965121eddcd904d19ef8883600dd6f214a4a764f17b5"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffff8b}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x1f, 0x0, &(0x7f0000000500)="b9ff0300000d698cb89e14f08864000f88a800008100638877fbac141421e9", 0x0, 0x100, 0x0, 0x0, 0x0, 0x0}, 0x40)

16:30:13 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
r2 = dup2(r0, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
r4 = dup(r3)
ioctl$BLKREPORTZONE(r4, 0xc0101282, 0x0)
ioctl$sock_bt_hidp_HIDPGETCONNLIST(r4, 0x800448d2, 0x0)

16:30:13 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x6a, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f062"}, 0x6a, 0x1)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

16:30:13 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0)
r2 = socket$nl_generic(0x10, 0x3, 0x10)
r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00')
sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r3, @ANYBLOB="21020000000000000000010000000c0099001526000004"], 0xc}}, 0x0)
r4 = dup(0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
sendfile(r2, r1, 0x0, 0x100000001)

16:30:13 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7be965121eddcd904d19ef8883600dd6f214a4a764f17b5"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffff8b}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x1f, 0x0, &(0x7f0000000500)="b9ff0300000d698cb89e14f08864000f88a800008100638877fbac141421e9", 0x0, 0x100, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)

[  261.510792] audit: type=1804 audit(1588955413.330:36): pid=11118 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir210500229/syzkaller.5IFUhd/141/cgroup.controllers" dev="sda1" ino=16218 res=1
16:30:13 executing program 0:
sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="054a", @ANYRES16, @ANYBLOB="6ffe000000000000000003000000580001800d0001007564"], 0x3}}, 0x0)
sendto$unix(0xffffffffffffffff, &(0x7f0000000340)="53e0f2c2905e9916912f89b23f54185c0e90b38551c81ae3767d56fec3150cd9bd2db58e164473806c6aaaf6964a26b0de86f5fe037f85ea25f3228e5e6dc4672b11ee7418224b4bed0d668c93d4ad2a975309402c1c195f2bd1a1263e107b177c6288fe6160086efbcd133bab74435a30e5da929fcd65882c970886e36ef38c162bf17422221915d31ea852afbc6f78df1ea10fd20bd8cf77e433", 0x9b, 0x0, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x2, [@fwd, @array, @array, @const={0xb}]}}, 0x0, 0x62}, 0x20)
select(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100686cca8000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4807, 0x0)

16:30:13 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
r2 = dup2(r0, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
r4 = dup(r3)
ioctl$BLKREPORTZONE(r4, 0xc0101282, 0x0)
ioctl$sock_bt_hidp_HIDPGETCONNLIST(r4, 0x800448d2, 0x0)

16:30:13 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7be965121eddcd904d19ef8883600dd6f214a4a764f17b5"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffff8b}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x1f, 0x0, &(0x7f0000000500)="b9ff0300000d698cb89e14f08864000f88a800008100638877fbac141421e9", 0x0, 0x100, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)

16:30:13 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x6a, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f062"}, 0x6a, 0x1)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

16:30:13 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
r2 = dup2(r0, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
r4 = dup(r3)
ioctl$BLKREPORTZONE(r4, 0xc0101282, 0x0)
ioctl$sock_bt_hidp_HIDPGETCONNLIST(r4, 0x800448d2, 0x0)

16:30:13 executing program 5:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7be965121eddcd904d19ef8883600dd6f214a4a764f17b5"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffff8b}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x1f, 0x0, &(0x7f0000000500)="b9ff0300000d698cb89e14f08864000f88a800008100638877fbac141421e9", 0x0, 0x100, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40)

[  261.836357] EXT4-fs (loop0): unsupported inode size: 1
[  261.870560] EXT4-fs (loop0): blocksize: 4096
16:30:13 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
r2 = dup2(r0, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
r4 = dup(r3)
ioctl$BLKREPORTZONE(r4, 0xc0101282, 0x0)
ioctl$sock_bt_hidp_HIDPGETCONNLIST(r4, 0x800448d2, &(0x7f0000000440)={0x0, 0x0})

16:30:13 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0)
r2 = socket$nl_generic(0x10, 0x3, 0x10)
syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00')
r3 = socket$packet(0x11, 0x2, 0x300)
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
sendfile(r2, r1, 0x0, 0x100000001)

16:30:13 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x6a, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f062"}, 0x6a, 0x1)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

16:30:13 executing program 2:
pipe(&(0x7f0000000000)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB], 0x1}}, 0x0)
close(r2)
socket$nl_netfilter(0x10, 0x3, 0xc)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={<r3=>0xffffffffffffffff})
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
splice(r0, 0x0, r2, 0x0, 0x6209, 0x0)

16:30:13 executing program 5:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)={0x2, 0xa, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_x_filter={0x5, 0x8, @in6=@private2, @in6=@remote}]}, 0x38}}, 0x0)

16:30:14 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
r2 = dup2(r0, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
r4 = dup(r3)
ioctl$BLKREPORTZONE(r4, 0xc0101282, 0x0)
ioctl$sock_bt_hidp_HIDPGETCONNLIST(r4, 0x800448d2, &(0x7f0000000440)={0x0, 0x0})

[  262.323827] audit: type=1804 audit(1588955414.150:37): pid=11156 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir210500229/syzkaller.5IFUhd/142/cgroup.controllers" dev="sda1" ino=16255 res=1
16:30:14 executing program 0:
sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="054a", @ANYRES16, @ANYBLOB="6ffe000000000000000003000000580001800d0001007564"], 0x3}}, 0x0)
sendto$unix(0xffffffffffffffff, &(0x7f0000000340)="53e0f2c2905e9916912f89b23f54185c0e90b38551c81ae3767d56fec3150cd9bd2db58e164473806c6aaaf6964a26b0de86f5fe037f85ea25f3228e5e6dc4672b11ee7418224b4bed0d668c93d4ad2a975309402c1c195f2bd1a1263e107b177c6288fe6160086efbcd133bab74435a30e5da929fcd65882c970886e36ef38c162bf17422221915d31ea852afbc6f78df1ea10fd20bd8cf77e433", 0x9b, 0x0, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x2, [@fwd, @array, @array, @const={0xb}]}}, 0x0, 0x62}, 0x20)
select(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100686cca8000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4807, 0x0)

16:30:14 executing program 5:
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a0, 0x0)
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r0, 0x8001a0, 0xe80, 0x5ac484bb51fa106a, &(0x7f0000000380)="4d50b441e692763513ef874588a8ffffffff00000000122e25d386dd", 0x0, 0x3b, 0xf000, 0x22d}, 0x28)
close(0xffffffffffffffff)
getpid()

16:30:14 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x70, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cdd"}, 0x70, 0x1)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

16:30:14 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
r2 = dup2(r0, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
r4 = dup(r3)
ioctl$BLKREPORTZONE(r4, 0xc0101282, 0x0)
ioctl$sock_bt_hidp_HIDPGETCONNLIST(r4, 0x800448d2, &(0x7f0000000440)={0x0, 0x0})

16:30:14 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0)
r2 = socket$nl_generic(0x10, 0x3, 0x10)
syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00')
r3 = socket$packet(0x11, 0x2, 0x300)
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
sendfile(r2, r1, 0x0, 0x100000001)

16:30:14 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
r2 = dup2(r0, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
r4 = dup(r3)
ioctl$BLKREPORTZONE(r4, 0xc0101282, 0x0)
ioctl$sock_bt_hidp_HIDPGETCONNLIST(r4, 0x800448d2, &(0x7f0000000440))

16:30:14 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x70, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cdd"}, 0x70, 0x1)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

16:30:14 executing program 5:
r0 = socket$inet6(0xa, 0x800000000000002, 0x0)
setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000200), 0x8)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x1f}, 0x21)
setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4)
sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffe0}, 0xd000000}], 0x1, 0x0)

16:30:14 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
r2 = dup2(r0, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
r4 = dup(r3)
ioctl$BLKREPORTZONE(r4, 0xc0101282, 0x0)
ioctl$sock_bt_hidp_HIDPGETCONNLIST(r4, 0x800448d2, &(0x7f0000000440))

[  262.777273] audit: type=1804 audit(1588955414.600:38): pid=11179 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir210500229/syzkaller.5IFUhd/143/cgroup.controllers" dev="sda1" ino=16223 res=1
[  262.818545] EXT4-fs (loop0): unsupported inode size: 1
[  262.838056] EXT4-fs (loop0): blocksize: 4096
16:30:14 executing program 2:
pipe(&(0x7f0000000000)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB], 0x1}}, 0x0)
close(r2)
socket$nl_netfilter(0x10, 0x3, 0xc)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={<r3=>0xffffffffffffffff})
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
splice(r0, 0x0, r2, 0x0, 0x6209, 0x0)

16:30:14 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x70, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cdd"}, 0x70, 0x1)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

16:30:14 executing program 5:
perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x43, 0x0, 0x0)
r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0)
r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0)
ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000100)={0x8, 0x2000000021d, 0x0, <r2=>0xffffffffffffffff})
r3 = dup2(r1, r2)
ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f0000000080)={0xa00000, 0x20000000209, 0x0, <r4=>0xffffffffffffffff})
r5 = dup2(r0, r4)
ioctl$ION_IOC_ALLOC(r5, 0xc0184900, &(0x7f00000001c0)={0x9cf0000008, 0x9, 0x0, 0xffffffffffffffff, 0x8})

16:30:15 executing program 0:
sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="054a", @ANYRES16, @ANYBLOB="6ffe000000000000000003000000580001800d0001007564"], 0x3}}, 0x0)
sendto$unix(0xffffffffffffffff, &(0x7f0000000340)="53e0f2c2905e9916912f89b23f54185c0e90b38551c81ae3767d56fec3150cd9bd2db58e164473806c6aaaf6964a26b0de86f5fe037f85ea25f3228e5e6dc4672b11ee7418224b4bed0d668c93d4ad2a975309402c1c195f2bd1a1263e107b177c6288fe6160086efbcd133bab74435a30e5da929fcd65882c970886e36ef38c162bf17422221915d31ea852afbc6f78df1ea10fd20bd8cf77e433", 0x9b, 0x0, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x2, [@fwd, @array, @array, @const={0xb}]}}, 0x0, 0x62}, 0x20)
select(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100686cca8000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4807, 0x0)

16:30:15 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
r2 = dup2(r0, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
r4 = dup(r3)
ioctl$BLKREPORTZONE(r4, 0xc0101282, 0x0)
ioctl$sock_bt_hidp_HIDPGETCONNLIST(r4, 0x800448d2, &(0x7f0000000440))

16:30:15 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0)
r2 = socket$nl_generic(0x10, 0x3, 0x10)
syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00')
r3 = socket$packet(0x11, 0x2, 0x300)
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
sendfile(r2, r1, 0x0, 0x100000001)

16:30:15 executing program 5:
syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
chroot(&(0x7f0000000140)='./file0\x00')
umount2(&(0x7f0000000040)='./file0\x00', 0x1)

16:30:15 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x73, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996"}, 0x73, 0x1)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

16:30:15 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)={0x2, 0xa, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_x_filter={0x5, 0x1a, @in6=@private2, @in6=@private2}]}, 0x38}}, 0x0)

[  263.672964] EXT4-fs (loop0): unsupported inode size: 1
[  263.698463] audit: type=1804 audit(1588955415.520:39): pid=11231 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir210500229/syzkaller.5IFUhd/144/cgroup.controllers" dev="sda1" ino=16262 res=1
[  263.730147] EXT4-fs (loop0): blocksize: 4096
16:30:15 executing program 5:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]})
ioctl$KVM_RUN(r2, 0xae80, 0x0)
ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0x4008af12, &(0x7f0000000080)={0x0, 0xffff})
perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r3 = socket$netlink(0x10, 0x3, 0x0)
getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, <r4=>0x0}, &(0x7f0000cab000)=0xc)
setgroups(0x1, &(0x7f00000000c0)=[r4])
perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$KVM_RUN(r2, 0xae80, 0x0)

16:30:15 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x73, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996"}, 0x73, 0x1)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

16:30:15 executing program 3:
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0)
r0 = getpid()
memfd_create(0x0, 0x0)
sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x4}, 0x0)
socket$inet6(0xa, 0x0, 0x0)
pipe(&(0x7f0000000200)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = dup(0xffffffffffffffff)
perf_event_open(&(0x7f00000002c0)={0x1, 0xfffffffffffffe93, 0x0, 0xd2, 0x0, 0x41, 0x0, 0x2, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x4, @perf_config_ext={0xfffffffffffffff9, 0x200}, 0x0, 0x9375, 0x0, 0x0, 0x3, 0x0, 0x6}, 0x0, 0x0, r3, 0x8)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
fcntl$setpipe(r2, 0x407, 0x0)
write(r2, &(0x7f0000000340), 0x41395527)
vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}, 0x108, 0x0, 0x0, 0x0, 0x0, 0xffff6146}, 0x0, 0x80000000001, 0xffffffffffffffff, 0x1)
clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0)

16:30:16 executing program 2:
pipe(&(0x7f0000000000)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB], 0x1}}, 0x0)
close(r2)
socket$nl_netfilter(0x10, 0x3, 0xc)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={<r3=>0xffffffffffffffff})
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
splice(r0, 0x0, r2, 0x0, 0x6209, 0x0)

16:30:16 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x73, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996"}, 0x73, 0x1)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

16:30:16 executing program 0:
sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="054a38", @ANYRES16, @ANYBLOB="6ffe000000000000000003000000580001800d0001007564"], 0x3}}, 0x0)
sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x2, [@fwd, @array, @array, @const={0xb}]}}, 0x0, 0x62}, 0x20)
select(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100686cca8000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4807, 0x0)

16:30:16 executing program 3:
r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/seq/timer\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
dup3(r1, r0, 0x0)

16:30:16 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0)
r2 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16, @ANYBLOB="21020000000000000000010000000c0099001526000004"], 0xc}}, 0x0)
r3 = socket$packet(0x11, 0x2, 0x300)
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
sendfile(r2, r1, 0x0, 0x100000001)

16:30:16 executing program 3:
r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/seq/timer\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
dup3(r1, r0, 0x0)

[  264.616119] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  264.686488] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
16:30:16 executing program 3:
r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/seq/timer\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
dup3(r1, r0, 0x0)

[  264.714699] audit: type=1804 audit(1588955416.540:40): pid=11274 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir210500229/syzkaller.5IFUhd/145/cgroup.controllers" dev="sda1" ino=16270 res=1
[  264.774328] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  264.823079] EXT4-fs (loop0): no journal found
16:30:16 executing program 3:
r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/seq/timer\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
dup3(r1, r0, 0x0)

16:30:16 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x75, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866"}, 0x75, 0x1)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

16:30:16 executing program 5:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]})
ioctl$KVM_RUN(r2, 0xae80, 0x0)
ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0x4008af12, &(0x7f0000000080)={0x0, 0xffff})
perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x24000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r3 = socket$inet(0x2, 0x4000000000000001, 0x0)
getsockopt$sock_cred(r3, 0x1, 0x11, 0x0, &(0x7f0000cab000))
setreuid(0x0, 0x0)
r4 = socket$netlink(0x10, 0x3, 0x0)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, <r5=>0x0}, &(0x7f0000cab000)=0xc)
setgroups(0x1, &(0x7f00000000c0)=[r5])
sendmsg$unix(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000380)="d407e7cd9d8c6c67e3be0f03b9dccd83d98a97681781a90be8243a0b0fc556a550d7b09f1030872db7a8d7bcfd4c3c4ff64b53e769e745e8a7fe3262d56d77b7608e0e3338986e67fb858a940a86d470aeb1a59f80275dbbb1c58ac48a1d6185020f12142f998626bc66f7fefcefc66638df24eb947dc19386da262c71cf358bfc760315a379f7096557d0f3d83677ad759ffcd0f900c1e5987ee744136a0b9e7b67466675ad0c1baf028a6f5565ee45f83675", 0xb3}, {0x0}], 0x2, &(0x7f00000006c0)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r5}}}], 0x80, 0x10}, 0x40090)
perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$KVM_RUN(r2, 0xae80, 0x0)

16:30:16 executing program 3:
r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/seq/timer\x00', 0x0, 0x0)
dup3(0xffffffffffffffff, r0, 0x0)

16:30:16 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0)
r2 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16, @ANYBLOB="21020000000000000000010000000c0099001526000004"], 0xc}}, 0x0)
r3 = socket$packet(0x11, 0x2, 0x300)
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
sendfile(r2, r1, 0x0, 0x100000001)

16:30:17 executing program 2:
pipe(&(0x7f0000000000)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c000000020601000000000000000000000000080e0003006269746d61703a697000000005000400000000000900020073797a3000"], 0x1}}, 0x0)
close(r2)
socket$nl_netfilter(0x10, 0x3, 0xc)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={<r3=>0xffffffffffffffff})
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
splice(r0, 0x0, r2, 0x0, 0x6209, 0x0)

16:30:17 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x75, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866"}, 0x75, 0x1)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

[  265.252091] audit: type=1804 audit(1588955417.070:41): pid=11303 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir210500229/syzkaller.5IFUhd/146/cgroup.controllers" dev="sda1" ino=16268 res=1
16:30:17 executing program 0:
sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="054a38", @ANYRES16, @ANYBLOB="6ffe000000000000000003000000580001800d0001007564"], 0x3}}, 0x0)
sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x2, [@fwd, @array, @array, @const={0xb}]}}, 0x0, 0x62}, 0x20)
select(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100686cca8000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4807, 0x0)

16:30:17 executing program 3:
r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/seq/timer\x00', 0x0, 0x0)
dup3(0xffffffffffffffff, r0, 0x0)

16:30:17 executing program 5:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
r2 = dup3(r0, r1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
mkdir(&(0x7f0000000280)='./file0\x00', 0x0)
mount(&(0x7f00000000c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='udf\x00', 0x0, 0x0)

[  265.564419] netlink: 52 bytes leftover after parsing attributes in process `syz-executor.2'.
[  265.637357] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  265.684911] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  265.717974] print_req_error: I/O error, dev loop5, sector 64
[  265.728110] print_req_error: I/O error, dev loop5, sector 256
[  265.734985] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
[  265.777894] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  265.792912] print_req_error: I/O error, dev loop5, sector 512
[  265.800735] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
[  265.826129] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
[  265.826751] EXT4-fs (loop0): no journal found
[  265.852364] UDF-fs: Scanning with blocksize 512 failed
[  265.869699] print_req_error: I/O error, dev loop5, sector 64
[  265.877741] print_req_error: I/O error, dev loop5, sector 512
[  265.884866] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
[  265.905571] print_req_error: I/O error, dev loop5, sector 1024
[  265.915369] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
[  265.927278] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
[  265.954779] UDF-fs: Scanning with blocksize 1024 failed
[  265.970860] print_req_error: I/O error, dev loop5, sector 64
[  265.977364] print_req_error: I/O error, dev loop5, sector 1024
[  265.983691] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
[  266.003344] print_req_error: I/O error, dev loop5, sector 2048
[  266.009886] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
[  266.036370] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
[  266.044959] UDF-fs: Scanning with blocksize 2048 failed
[  266.052182] print_req_error: I/O error, dev loop5, sector 64
[  266.058733] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
[  266.070040] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
[  266.085591] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
[  266.093581] UDF-fs: Scanning with blocksize 4096 failed
[  266.099405] UDF-fs: warning (device loop5): udf_fill_super: No partition found (1)
16:30:18 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x75, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866"}, 0x75, 0x1)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

16:30:18 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0)
r2 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16, @ANYBLOB="21020000000000000000010000000c0099001526000004"], 0xc}}, 0x0)
r3 = socket$packet(0x11, 0x2, 0x300)
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
sendfile(r2, r1, 0x0, 0x100000001)

16:30:18 executing program 3:
r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/seq/timer\x00', 0x0, 0x0)
dup3(0xffffffffffffffff, r0, 0x0)

16:30:18 executing program 5:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
r2 = dup3(r0, r1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
mkdir(&(0x7f0000000280)='./file0\x00', 0x0)
mount(&(0x7f00000000c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='udf\x00', 0x0, 0x0)

16:30:18 executing program 2:
pipe(&(0x7f0000000000)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c000000020601000000000000000000000000080e0003006269746d61703a697000000005000400000000000900020073797a3000"], 0x1}}, 0x0)
close(r2)
socket$nl_netfilter(0x10, 0x3, 0xc)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={<r3=>0xffffffffffffffff})
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
splice(r0, 0x0, r2, 0x0, 0x6209, 0x0)

16:30:18 executing program 3:
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
dup3(r0, 0xffffffffffffffff, 0x0)

[  266.307583] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
16:30:18 executing program 0:
sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="054a38", @ANYRES16, @ANYBLOB="6ffe000000000000000003000000580001800d0001007564"], 0x3}}, 0x0)
sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x2, [@fwd, @array, @array, @const={0xb}]}}, 0x0, 0x62}, 0x20)
select(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100686cca8000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4807, 0x0)

[  266.355015] audit: type=1804 audit(1588955418.180:42): pid=11347 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir210500229/syzkaller.5IFUhd/147/cgroup.controllers" dev="sda1" ino=16283 res=1
[  266.376707] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
16:30:18 executing program 3:
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
dup3(r0, 0xffffffffffffffff, 0x0)

[  266.444881] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
[  266.485198] netlink: 52 bytes leftover after parsing attributes in process `syz-executor.2'.
[  266.489067] UDF-fs: Scanning with blocksize 512 failed
[  266.525735] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
[  266.558222] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
16:30:18 executing program 3:
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
dup3(r0, 0xffffffffffffffff, 0x0)

[  266.580606] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  266.602268] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
[  266.620648] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  266.649556] UDF-fs: Scanning with blocksize 1024 failed
[  266.673215] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
[  266.677737] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  266.693860] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
[  266.706438] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
[  266.715807] UDF-fs: Scanning with blocksize 2048 failed
16:30:18 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x0)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

16:30:18 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0)
r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00')
sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r2, @ANYBLOB="21020000000000000000010000000c0099001526000004"], 0xc}}, 0x0)
r3 = socket$packet(0x11, 0x2, 0x300)
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
sendfile(0xffffffffffffffff, r1, 0x0, 0x100000001)

[  266.734719] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
[  266.756160] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
[  266.766834] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
[  266.775117] UDF-fs: Scanning with blocksize 4096 failed
[  266.786556] UDF-fs: warning (device loop5): udf_fill_super: No partition found (1)
[  266.791386] EXT4-fs (loop0): no journal found
16:30:18 executing program 3:
r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
dup3(r1, r0, 0x0)

16:30:18 executing program 5:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
r2 = dup3(r0, r1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
mkdir(&(0x7f0000000280)='./file0\x00', 0x0)
mount(&(0x7f00000000c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='udf\x00', 0x0, 0x0)

[  266.955462] audit: type=1804 audit(1588955418.780:43): pid=11376 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir210500229/syzkaller.5IFUhd/148/cgroup.controllers" dev="sda1" ino=16279 res=1
16:30:18 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0)
r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00')
sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r2, @ANYBLOB="21020000000000000000010000000c0099001526000004"], 0xc}}, 0x0)
r3 = socket$packet(0x11, 0x2, 0x300)
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
sendfile(0xffffffffffffffff, r1, 0x0, 0x100000001)

16:30:18 executing program 3:
r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
dup3(r1, r0, 0x0)

[  267.086513] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
[  267.124524] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
16:30:19 executing program 3:
r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
dup3(r1, r0, 0x0)

[  267.157797] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
[  267.186450] UDF-fs: Scanning with blocksize 512 failed
16:30:19 executing program 2:
pipe(&(0x7f0000000000)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c000000020601000000000000000000000000080e0003006269746d61703a697000000005000400000000000900020073797a3000"], 0x1}}, 0x0)
close(r2)
socket$nl_netfilter(0x10, 0x3, 0xc)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={<r3=>0xffffffffffffffff})
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
splice(r0, 0x0, r2, 0x0, 0x6209, 0x0)

16:30:19 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x0)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

[  267.209758] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
16:30:19 executing program 0:
sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="054a38", @ANYRES16, @ANYBLOB="6ffe000000000000000003000000580001800d0001007564"], 0x3}}, 0x0)
sendto$unix(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x0, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x2, [@fwd, @array, @array, @const={0xb}]}}, 0x0, 0x62}, 0x20)
select(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100686cca8000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4807, 0x0)

[  267.268984] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
16:30:19 executing program 3:
r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/seq/timer\x00', 0x0, 0x0)
socket$inet_icmp_raw(0x2, 0x3, 0x1)
dup3(0xffffffffffffffff, r0, 0x0)

[  267.301508] audit: type=1804 audit(1588955419.130:44): pid=11390 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir210500229/syzkaller.5IFUhd/149/cgroup.controllers" dev="sda1" ino=16288 res=1
[  267.338117] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
16:30:19 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0)
r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00')
sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r2, @ANYBLOB="21020000000000000000010000000c0099001526000004"], 0xc}}, 0x0)
r3 = socket$packet(0x11, 0x2, 0x300)
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
sendfile(0xffffffffffffffff, r1, 0x0, 0x100000001)

[  267.379475] UDF-fs: Scanning with blocksize 1024 failed
[  267.424973] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
[  267.454736] netlink: 52 bytes leftover after parsing attributes in process `syz-executor.2'.
16:30:19 executing program 3:
r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/seq/timer\x00', 0x0, 0x0)
socket$inet_icmp_raw(0x2, 0x3, 0x1)
dup3(0xffffffffffffffff, r0, 0x0)

[  267.476890] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
[  267.491140] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  267.507365] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  267.520017] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  267.532436] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
[  267.534252] EXT4-fs (loop0): no journal found
[  267.547685] UDF-fs: Scanning with blocksize 2048 failed
[  267.597400] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
[  267.623718] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
[  267.643406] audit: type=1804 audit(1588955419.470:45): pid=11412 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir210500229/syzkaller.5IFUhd/150/cgroup.controllers" dev="sda1" ino=16287 res=1
16:30:19 executing program 3:
r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/seq/timer\x00', 0x0, 0x0)
socket$inet_icmp_raw(0x2, 0x3, 0x1)
dup3(0xffffffffffffffff, r0, 0x0)

16:30:19 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00')
sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r2, @ANYBLOB="21020000000000000000010000000c0099001526000004"], 0xc}}, 0x0)
r3 = socket$packet(0x11, 0x2, 0x300)
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000001)

[  267.690330] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
[  267.718820] UDF-fs: Scanning with blocksize 4096 failed
[  267.785431] UDF-fs: warning (device loop5): udf_fill_super: No partition found (1)
16:30:19 executing program 5:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
r2 = dup3(r0, r1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
mkdir(&(0x7f0000000280)='./file0\x00', 0x0)
mount(&(0x7f00000000c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='udf\x00', 0x0, 0x0)

16:30:19 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

16:30:19 executing program 3:
openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/seq/timer\x00', 0x0, 0x0)
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
dup3(r0, 0xffffffffffffffff, 0x0)

16:30:19 executing program 3:
openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/seq/timer\x00', 0x0, 0x0)
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
dup3(r0, 0xffffffffffffffff, 0x0)

[  268.029735] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
[  268.066894] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
[  268.109324] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
16:30:20 executing program 2:
pipe(&(0x7f0000000000)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c000000020601000000000000000000000000080e0003006269746d61703a697000000005000400000000000900020073797a3000000000240007800c00028008000140ac1e00010c000180080001"], 0x1}}, 0x0)
close(r2)
socket$nl_netfilter(0x10, 0x3, 0xc)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={<r3=>0xffffffffffffffff})
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
splice(r0, 0x0, r2, 0x0, 0x6209, 0x0)

16:30:20 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00')
sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r2, @ANYBLOB="21020000000000000000010000000c0099001526000004"], 0xc}}, 0x0)
r3 = socket$packet(0x11, 0x2, 0x300)
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000001)

[  268.150818] UDF-fs: Scanning with blocksize 512 failed
16:30:20 executing program 0:
sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="054a38", @ANYRES16, @ANYBLOB="6ffe000000000000000003000000580001800d0001007564"], 0x3}}, 0x0)
sendto$unix(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x0, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x2, [@fwd, @array, @array, @const={0xb}]}}, 0x0, 0x62}, 0x20)
select(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100686cca8000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4807, 0x0)

16:30:20 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

16:30:20 executing program 3:
openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/seq/timer\x00', 0x0, 0x0)
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
dup3(r0, 0xffffffffffffffff, 0x0)

[  268.193818] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
[  268.266533] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
16:30:20 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

[  268.332853] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
[  268.370234] UDF-fs: Scanning with blocksize 1024 failed
16:30:20 executing program 3:
r0 = open(&(0x7f0000000180)='./bus\x00', 0x141042, 0x0)
r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sysvipc/shm\x00', 0x0, 0x0)
sendfile(r0, r1, 0x0, 0x4000000000010048)

[  268.377191] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'.
16:30:20 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00')
sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r2, @ANYBLOB="21020000000000000000010000000c0099001526000004"], 0xc}}, 0x0)
r3 = socket$packet(0x11, 0x2, 0x300)
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000001)

[  268.416780] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
[  268.437388] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  268.479584] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
[  268.513132] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  268.540190] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
[  268.559767] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  268.575436] UDF-fs: Scanning with blocksize 2048 failed
[  268.608146] EXT4-fs (loop0): no journal found
[  268.626449] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
[  268.667466] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
[  268.689512] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
16:30:20 executing program 5:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
r2 = dup3(r0, r1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
mount(&(0x7f00000000c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='udf\x00', 0x0, 0x0)

16:30:20 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x0)
bind$inet6(r2, 0x0, 0x0)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

16:30:20 executing program 3:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VHOST_SET_VRING_NUM(0xffffffffffffffff, 0x4008af10, 0x0)
r1 = creat(&(0x7f0000000200)='./file2\x00', 0x0)
lseek(r1, 0x800002, 0x0)
ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000001c0))
write$binfmt_aout(r1, &(0x7f0000000100)=ANY=[], 0x8)
lseek(r1, 0x0, 0x3)
write$P9_RVERSION(r1, &(0x7f00000001c0)={0x15, 0x65, 0xffff, 0x864, 0x8, '9P2000.u'}, 0x15)
sendmmsg(0xffffffffffffffff, &(0x7f0000001980), 0x5c9, 0x0)
open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0)
openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0)

[  268.716235] UDF-fs: Scanning with blocksize 4096 failed
[  268.724515] UDF-fs: warning (device loop5): udf_fill_super: No partition found (1)
16:30:20 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0)
r2 = socket$nl_generic(0x10, 0x3, 0x10)
r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00')
sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r3, @ANYBLOB="21020000000000000000010000000c0099001526000004"], 0xc}}, 0x0)
r4 = socket$packet(0x11, 0x2, 0x300)
r5 = dup(r4)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
sendfile(r2, r1, 0x0, 0x100000001)

16:30:20 executing program 2:
pipe(&(0x7f0000000000)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c000000020601000000000000000000000000080e0003006269746d61703a697000000005000400000000000900020073797a3000000000240007800c00028008000140ac1e00010c000180080001"], 0x1}}, 0x0)
close(r2)
socket$nl_netfilter(0x10, 0x3, 0xc)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={<r3=>0xffffffffffffffff})
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
splice(r0, 0x0, r2, 0x0, 0x6209, 0x0)

16:30:20 executing program 5:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
r2 = dup3(r0, r1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
mount(&(0x7f00000000c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='udf\x00', 0x0, 0x0)

16:30:21 executing program 0:
sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="054a38", @ANYRES16, @ANYBLOB="6ffe000000000000000003000000580001800d0001007564"], 0x3}}, 0x0)
sendto$unix(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x0, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x2, [@fwd, @array, @array, @const={0xb}]}}, 0x0, 0x62}, 0x20)
select(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100686cca8000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4807, 0x0)

16:30:21 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x0)
bind$inet6(r2, 0x0, 0x0)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

16:30:21 executing program 3:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]})
ioctl$KVM_RUN(r2, 0xae80, 0x0)
ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0x4008af12, &(0x7f0000000080)={0x0, 0xffff})
perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$KVM_RUN(r2, 0xae80, 0x0)

16:30:21 executing program 5:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
r2 = dup3(r0, r1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
mount(&(0x7f00000000c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='udf\x00', 0x0, 0x0)

[  269.329717] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'.
16:30:21 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x0)
bind$inet6(r2, 0x0, 0x0)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

[  269.377385] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
16:30:21 executing program 5:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
dup3(r0, r1, 0x0)
mkdir(&(0x7f0000000280)='./file0\x00', 0x0)
mount(&(0x7f00000000c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='udf\x00', 0x0, 0x0)

[  269.437044] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  269.500186] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock
16:30:21 executing program 3:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11e931e7d62ead037cd2157df6b2bcb4", 0x8d}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={<r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

[  269.544986] EXT4-fs (loop0): no journal found
16:30:21 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x0)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

[  269.616323] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
[  269.645925] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
[  269.676077] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
[  269.696769] UDF-fs: Scanning with blocksize 512 failed
16:30:21 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x0)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

[  269.718736] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
[  269.756674] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
[  269.771063] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
[  269.778314] UDF-fs: Scanning with blocksize 1024 failed
[  269.784968] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
[  269.794553] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
[  269.807861] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
[  269.816966] audit: type=1804 audit(1588955421.640:46): pid=11478 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir210500229/syzkaller.5IFUhd/154/cgroup.controllers" dev="sda1" ino=16273 res=1
[  269.846123] UDF-fs: Scanning with blocksize 2048 failed
[  269.880894] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
16:30:21 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0)
r2 = socket$nl_generic(0x10, 0x3, 0x10)
r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00')
sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r3, @ANYBLOB="21020000000000000000010000000c0099001526000004"], 0xc}}, 0x0)
r4 = socket$packet(0x11, 0x2, 0x300)
r5 = dup(r4)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
sendfile(r2, r1, 0x0, 0x100000001)

[  269.921547] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
[  269.946955] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
[  269.956910] UDF-fs: Scanning with blocksize 4096 failed
[  269.965540] UDF-fs: warning (device loop5): udf_fill_super: No partition found (1)
16:30:21 executing program 2:
pipe(&(0x7f0000000000)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c000000020601000000000000000000000000080e0003006269746d61703a697000000005000400000000000900020073797a3000000000240007800c00028008000140ac1e00010c000180080001"], 0x1}}, 0x0)
close(r2)
socket$nl_netfilter(0x10, 0x3, 0xc)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={<r3=>0xffffffffffffffff})
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
splice(r0, 0x0, r2, 0x0, 0x6209, 0x0)

16:30:21 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x0)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

16:30:21 executing program 0:
sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="054a38", @ANYRES16, @ANYBLOB="6ffe000000000000000003000000580001800d0001007564"], 0x3}}, 0x0)
sendto$unix(0xffffffffffffffff, &(0x7f0000000340)="53e0f2c2905e9916912f89b23f54185c0e90b38551c81ae3767d56fec3150cd9bd2db58e164473806c6aaaf6964a26b0de86f5fe037f85ea25f3228e5e6dc4672b11ee7418224b4bed0d668c93d4", 0x4e, 0x0, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x2, [@fwd, @array, @array, @const={0xb}]}}, 0x0, 0x62}, 0x20)
select(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100686cca8000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4807, 0x0)

16:30:21 executing program 5:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
dup3(r0, r1, 0x0)
mkdir(&(0x7f0000000280)='./file0\x00', 0x0)
mount(&(0x7f00000000c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='udf\x00', 0x0, 0x0)

16:30:22 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x0)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

[  270.188341] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
[  270.223474] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'.
[  270.242614] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
[  270.273813] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
[  270.295968] UDF-fs: Scanning with blocksize 512 failed
16:30:22 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x0)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

[  270.316381] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  270.345798] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
[  270.371068] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  270.375033] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
[  270.415533] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  270.442704] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
[  270.501936] UDF-fs: Scanning with blocksize 1024 failed
[  270.529471] EXT4-fs (loop0): no journal found
[  270.593127] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
16:30:22 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x0)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

[  270.646430] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
[  270.686300] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
16:30:22 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x0)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x0, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

[  270.742408] UDF-fs: Scanning with blocksize 2048 failed
[  270.774981] print_req_error: 59 callbacks suppressed
[  270.774991] print_req_error: I/O error, dev loop5, sector 64
[  270.789497] print_req_error: I/O error, dev loop5, sector 2048
[  270.810242] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
[  270.856219] print_req_error: I/O error, dev loop5, sector 4096
[  270.863900] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
[  270.927672] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
[  270.983375] UDF-fs: Scanning with blocksize 4096 failed
[  271.021118] UDF-fs: warning (device loop5): udf_fill_super: No partition found (1)
[  271.134746] audit: type=1804 audit(1588955422.960:47): pid=11550 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir210500229/syzkaller.5IFUhd/155/cgroup.controllers" dev="sda1" ino=16309 res=1
16:30:24 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPCTNL_MSG_TIMEOUT_GET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x1, 0x8, 0x5}, 0x14}}, 0x0)

16:30:24 executing program 2:
pipe(&(0x7f0000000000)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c000000020601000000000000000000000000080e0003006269746d61703a697000000005000400000000000900020073797a3000000000240007800c00028008000140ac1e00010c00018008000140a00000000500140008000000"], 0x1}}, 0x0)
close(r2)
socket$nl_netfilter(0x10, 0x3, 0xc)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={<r3=>0xffffffffffffffff})
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
splice(r0, 0x0, r2, 0x0, 0x6209, 0x0)

16:30:24 executing program 0:
sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="054a38", @ANYRES16, @ANYBLOB="6ffe000000000000000003000000580001800d0001007564"], 0x3}}, 0x0)
sendto$unix(0xffffffffffffffff, &(0x7f0000000340)="53e0f2c2905e9916912f89b23f54185c0e90b38551c81ae3767d56fec3150cd9bd2db58e164473806c6aaaf6964a26b0de86f5fe037f85ea25f3228e5e6dc4672b11ee7418224b4bed0d668c93d4", 0x4e, 0x0, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x2, [@fwd, @array, @array, @const={0xb}]}}, 0x0, 0x62}, 0x20)
select(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100686cca8000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4807, 0x0)

16:30:24 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x0)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x0, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

16:30:24 executing program 5:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
dup3(r0, r1, 0x0)
mkdir(&(0x7f0000000280)='./file0\x00', 0x0)
mount(&(0x7f00000000c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='udf\x00', 0x0, 0x0)

16:30:24 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0)
r2 = socket$nl_generic(0x10, 0x3, 0x10)
r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00')
sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r3, @ANYBLOB="21020000000000000000010000000c0099001526000004"], 0xc}}, 0x0)
r4 = socket$packet(0x11, 0x2, 0x300)
r5 = dup(r4)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
sendfile(r2, r1, 0x0, 0x100000001)

[  272.742465] print_req_error: I/O error, dev loop5, sector 64
[  272.750067] print_req_error: I/O error, dev loop5, sector 256
[  272.756435] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
[  272.782654] print_req_error: I/O error, dev loop5, sector 512
[  272.789489] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
[  272.797506] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'.
16:30:24 executing program 3:
clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0)
write$binfmt_elf64(r0, &(0x7f0000000e80)=ANY=[@ANYBLOB="7f454c4602000000000000000004b40003003e000039a594249c1fd83d00000000000000000000eddfeb7bba00281293bd5d74dafc20380003"], 0x39)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

[  272.826014] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
[  272.837380] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  272.853835] UDF-fs: Scanning with blocksize 512 failed
16:30:24 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x0)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x0, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

[  272.887142] print_req_error: I/O error, dev loop5, sector 64
[  272.893654] print_req_error: I/O error, dev loop5, sector 512
[  272.898743] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  272.900684] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
16:30:24 executing program 3:
prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0)
r0 = getpid()
sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x5, 0x9, 0x10001, 0x8}, 0x0)
waitid(0x0, 0x0, 0x0, 0x0, 0x0)
sched_setattr(r0, &(0x7f0000000040)={0x38, 0x6, 0x42, 0xfffffffd, 0x19, 0x6, 0x8614, 0x10001, 0xfffffffc}, 0x0)
pipe(&(0x7f0000000840)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
modify_ldt$write(0x1, 0x0, 0x0)
fcntl$setpipe(r2, 0x407, 0x0)
write(r2, &(0x7f0000000340), 0x41395527)
vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0)
write$P9_RLINK(0xffffffffffffffff, 0x0, 0x0)
getxattr(0x0, 0x0, 0x0, 0x0)
r3 = creat(0x0, 0x1)
write$binfmt_script(r3, &(0x7f0000000640)=ANY=[@ANYBLOB="e50de4d44f26f22853d8fca5fca2ee8ce80cc48b1d0ff9c9d1a795313135e0873f5377ecaa128f0621cc815d026536122f91750e33fb8e5fb50b5fa17470880b1b3ab703000000970d4cf3d34dab7b8b6235ceb6cdb882b28b808da460f25eefe3d3e93b2e20e06630e13ff6fc827de90c594769d0e515284b220c1f645199bbe337ff7a35692cb19c2c2317adc061f9143a2b059e4b9afc3f4f7dcba399d5708bbfe109acae8035fa613088989bd4f01af18a54b34704aa654b3b45f2a19e44cb91bae07f135f53e5f35793b8f963bdf949384ee77ea77c59d30d3113a6efce85c32e2e2ee48d0fd72a174bc71c72ed5110", @ANYBLOB="04ae70b06be563f798dba6fd17498b94f303031f4fa2d34cc60a67083919f6d9a2a7fa08"], 0xfa)
getpid()
r4 = socket$inet6(0xa, 0x400000000001, 0x0)
r5 = dup(0xffffffffffffffff)
bind$inet6(r4, &(0x7f0000000600)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
sendto$inet6(r4, 0x0, 0x0, 0x20000008, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
r6 = open(&(0x7f0000000240)='./bus\x00', 0x100000149242, 0x9)
ftruncate(r6, 0x10099b7)
sendfile(r3, r5, 0x0, 0x800100000002)
open(&(0x7f0000000140)='./bus\x00', 0x41241, 0x2)

[  272.959778] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock
16:30:24 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x0)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, 0x0, 0x0)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

[  273.028350] print_req_error: I/O error, dev loop5, sector 1024
[  273.035965] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
[  273.051422] EXT4-fs (loop0): no journal found
[  273.106484] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
[  273.157806] UDF-fs: Scanning with blocksize 1024 failed
[  273.228818] print_req_error: I/O error, dev loop5, sector 64
[  273.236525] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
[  273.251681] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based  firewall rule not found. Use the iptables CT target to attach helpers instead.
16:30:25 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x0)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, 0x0, 0x0)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

[  273.342185] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
[  273.386528] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
[  273.394782] UDF-fs: Scanning with blocksize 2048 failed
[  273.414583] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
16:30:25 executing program 0:
sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="054a38", @ANYRES16, @ANYBLOB="6ffe000000000000000003000000580001800d0001007564"], 0x3}}, 0x0)
sendto$unix(0xffffffffffffffff, &(0x7f0000000340)="53e0f2c2905e9916912f89b23f54185c0e90b38551c81ae3767d56fec3150cd9bd2db58e164473806c6aaaf6964a26b0de86f5fe037f85ea25f3228e5e6dc4672b11ee7418224b4bed0d668c93d4", 0x4e, 0x0, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x2, [@fwd, @array, @array, @const={0xb}]}}, 0x0, 0x62}, 0x20)
select(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100686cca8000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4807, 0x0)

[  273.442769] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
[  273.476685] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
16:30:25 executing program 2:
pipe(&(0x7f0000000000)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c000000020601000000000000000000000000080e0003006269746d61703a697000000005000400000000000900020073797a3000000000240007800c00028008000140ac1e00010c00018008000140a00000000500140008000000"], 0x1}}, 0x0)
close(r2)
socket$nl_netfilter(0x10, 0x3, 0xc)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={<r3=>0xffffffffffffffff})
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
splice(r0, 0x0, r2, 0x0, 0x6209, 0x0)

[  273.524821] UDF-fs: Scanning with blocksize 4096 failed
[  273.564932] audit: type=1804 audit(1588955425.391:48): pid=11590 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir210500229/syzkaller.5IFUhd/156/cgroup.controllers" dev="sda1" ino=16326 res=1
[  273.596052] UDF-fs: warning (device loop5): udf_fill_super: No partition found (1)
16:30:25 executing program 5:
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
socket$inet6_tcp(0xa, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
mkdir(&(0x7f0000000280)='./file0\x00', 0x0)
mount(&(0x7f00000000c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='udf\x00', 0x0, 0x0)

16:30:25 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x0)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, 0x0, 0x0)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

16:30:25 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0)
r2 = socket$nl_generic(0x10, 0x3, 0x10)
r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00')
sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r3, @ANYBLOB="21020000000000000000010000000c0099001526000004"], 0xc}}, 0x0)
r4 = socket$packet(0x11, 0x2, 0x300)
r5 = dup(r4)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
sendfile(r2, r1, 0x0, 0x100000001)

[  273.775931] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'.
[  273.800589] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  273.868604] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
16:30:25 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x0)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

[  273.909960] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
[  273.944353] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock
16:30:25 executing program 3:
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000400)={<r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0xfffffffc}]})
r2 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'veth0_vlan\x00'})

[  273.984490] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
[  274.007319] EXT4-fs (loop0): no journal found
16:30:25 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x0)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

[  274.043037] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
[  274.079593] UDF-fs: Scanning with blocksize 512 failed
[  274.123325] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
16:30:26 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0)
r2 = socket$nl_generic(0x10, 0x3, 0x10)
r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00')
sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r3, @ANYBLOB="21020000000000000000010000000c0099001526000004"], 0xc}}, 0x0)
r4 = socket$packet(0x11, 0x2, 0x300)
r5 = dup(r4)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
sendfile(r2, r1, 0x0, 0x100000001)

[  274.158820] audit: type=1326 audit(1588955425.981:49): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=11642 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0xffff0000
[  274.171762] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
[  274.247813] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
[  274.276501] UDF-fs: Scanning with blocksize 1024 failed
[  274.299929] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
[  274.331386] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
[  274.366999] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
[  274.399287] UDF-fs: Scanning with blocksize 2048 failed
16:30:26 executing program 0:
sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="054a38", @ANYRES16, @ANYBLOB="6ffe000000000000000003000000580001800d0001007564"], 0x3}}, 0x0)
sendto$unix(0xffffffffffffffff, &(0x7f0000000340)="53e0f2c2905e9916912f89b23f54185c0e90b38551c81ae3767d56fec3150cd9bd2db58e164473806c6aaaf6964a26b0de86f5fe037f85ea25f3228e5e6dc4672b11ee7418224b4bed0d668c93d4ad2a975309402c1c195f2bd1a1263e107b177c6288fe6160086efbcd133bab74435a30e5da929f", 0x75, 0x0, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x2, [@fwd, @array, @array, @const={0xb}]}}, 0x0, 0x62}, 0x20)
select(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100686cca8000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4807, 0x0)

[  274.423561] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
16:30:26 executing program 2:
pipe(&(0x7f0000000000)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c000000020601000000000000000000000000080e0003006269746d61703a697000000005000400000000000900020073797a3000000000240007800c00028008000140ac1e00010c00018008000140a00000000500140008000000"], 0x1}}, 0x0)
close(r2)
socket$nl_netfilter(0x10, 0x3, 0xc)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={<r3=>0xffffffffffffffff})
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
splice(r0, 0x0, r2, 0x0, 0x6209, 0x0)

[  274.467459] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
[  274.500518] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
[  274.525660] UDF-fs: Scanning with blocksize 4096 failed
[  274.564535] UDF-fs: warning (device loop5): udf_fill_super: No partition found (1)
[  274.658671] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  274.699671] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  274.724467] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'.
[  274.744943] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  274.789387] EXT4-fs (loop0): no journal found
16:30:27 executing program 0:
sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="054a38", @ANYRES16, @ANYBLOB="6ffe000000000000000003000000580001800d0001007564"], 0x3}}, 0x0)
sendto$unix(0xffffffffffffffff, &(0x7f0000000340)="53e0f2c2905e9916912f89b23f54185c0e90b38551c81ae3767d56fec3150cd9bd2db58e164473806c6aaaf6964a26b0de86f5fe037f85ea25f3228e5e6dc4672b11ee7418224b4bed0d668c93d4ad2a975309402c1c195f2bd1a1263e107b177c6288fe6160086efbcd133bab74435a30e5da929f", 0x75, 0x0, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x2, [@fwd, @array, @array, @const={0xb}]}}, 0x0, 0x62}, 0x20)
select(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100686cca8000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4807, 0x0)

[  275.548641] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  275.590654] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  275.652768] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  275.695029] EXT4-fs (loop0): no journal found
16:30:27 executing program 2:
pipe(&(0x7f0000000000)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c000000020601000000000000000000000000080e0003006269746d61703a697000000005000400000000000900020073797a3000000000240007800c00028008000140ac1e00010c00018008000140a0000000050014000800000005000500020000"], 0x1}}, 0x0)
close(r2)
socket$nl_netfilter(0x10, 0x3, 0xc)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={<r3=>0xffffffffffffffff})
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
splice(r0, 0x0, r2, 0x0, 0x6209, 0x0)

16:30:27 executing program 3:
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
bind$bt_hci(r2, &(0x7f0000000400)={0x1f, 0xffff, 0x3}, 0x6)
write$binfmt_misc(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8100fffe07"], 0xd)
recvmmsg(r2, &(0x7f0000008500)=[{{0x0, 0x0, 0x0}}, {{0x0, 0xfffffd49, 0x0}}], 0x400000000000251, 0x22, 0x0)

16:30:27 executing program 5:
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
socket$inet6_tcp(0xa, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
mkdir(&(0x7f0000000280)='./file0\x00', 0x0)
mount(&(0x7f00000000c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='udf\x00', 0x0, 0x0)

16:30:27 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0)
r2 = socket$nl_generic(0x10, 0x3, 0x10)
r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00')
sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r3, @ANYBLOB="21020000000000000000010000000c0099001526000004"], 0xc}}, 0x0)
r4 = socket$packet(0x11, 0x2, 0x300)
r5 = dup(r4)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
sendfile(r2, r1, 0x0, 0x100000001)

16:30:27 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x0)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

[  276.052897] print_req_error: 17 callbacks suppressed
[  276.052907] print_req_error: I/O error, dev loop5, sector 64
[  276.066365] print_req_error: I/O error, dev loop5, sector 256
[  276.075495] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
[  276.099037] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'.
16:30:28 executing program 3:
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
bind$bt_hci(r2, &(0x7f0000000400)={0x1f, 0xffff, 0x3}, 0x6)
write$binfmt_misc(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8100fffe07"], 0xd)
recvmmsg(r2, &(0x7f0000008500)=[{{0x0, 0x0, 0x0}}, {{0x0, 0xfffffd49, 0x0}}], 0x400000000000251, 0x22, 0x0)

[  276.125260] print_req_error: I/O error, dev loop5, sector 512
[  276.131809] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
[  276.172097] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
[  276.207617] UDF-fs: Scanning with blocksize 512 failed
16:30:28 executing program 1:
write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00')
sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r2, @ANYBLOB="21020000000000000000010000000c0099001526000004"], 0xc}}, 0x0)
r3 = socket$packet(0x11, 0x2, 0x300)
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
sendfile(r1, r0, 0x0, 0x100000001)

[  276.226193] print_req_error: I/O error, dev loop5, sector 64
[  276.234247] print_req_error: I/O error, dev loop5, sector 512
[  276.250301] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
16:30:28 executing program 0:
sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="054a38", @ANYRES16, @ANYBLOB="6ffe000000000000000003000000580001800d0001007564"], 0x3}}, 0x0)
sendto$unix(0xffffffffffffffff, &(0x7f0000000340)="53e0f2c2905e9916912f89b23f54185c0e90b38551c81ae3767d56fec3150cd9bd2db58e164473806c6aaaf6964a26b0de86f5fe037f85ea25f3228e5e6dc4672b11ee7418224b4bed0d668c93d4ad2a975309402c1c195f2bd1a1263e107b177c6288fe6160086efbcd133bab74435a30e5da929f", 0x75, 0x0, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x2, [@fwd, @array, @array, @const={0xb}]}}, 0x0, 0x62}, 0x20)
select(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100686cca8000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4807, 0x0)

[  276.289191] print_req_error: I/O error, dev loop5, sector 1024
[  276.295675] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
16:30:28 executing program 3:
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
bind$bt_hci(r2, &(0x7f0000000400)={0x1f, 0xffff, 0x3}, 0x6)
write$binfmt_misc(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8100fffe07"], 0xd)
recvmmsg(r2, &(0x7f0000008500)=[{{0x0, 0x0, 0x0}}, {{0x0, 0xfffffd49, 0x0}}], 0x400000000000251, 0x22, 0x0)

[  276.349037] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
16:30:28 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x0)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

16:30:28 executing program 1:
write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00')
sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r2, @ANYBLOB="21020000000000000000010000000c0099001526000004"], 0xc}}, 0x0)
r3 = socket$packet(0x11, 0x2, 0x300)
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
sendfile(r1, r0, 0x0, 0x100000001)

[  276.413234] UDF-fs: Scanning with blocksize 1024 failed
[  276.441303] print_req_error: I/O error, dev loop5, sector 64
[  276.450776] print_req_error: I/O error, dev loop5, sector 1024
[  276.457448] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
[  276.495781] print_req_error: I/O error, dev loop5, sector 2048
[  276.504769] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
16:30:28 executing program 3:
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
bind$bt_hci(r2, &(0x7f0000000400)={0x1f, 0xffff, 0x3}, 0x6)
write$binfmt_misc(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8100fffe07"], 0xd)
recvmmsg(r2, &(0x7f0000008500)=[{{0x0, 0x0, 0x0}}, {{0x0, 0xfffffd49, 0x0}}], 0x400000000000251, 0x22, 0x0)

[  276.545809] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  276.553638] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
[  276.597461] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  276.598413] UDF-fs: Scanning with blocksize 2048 failed
[  276.620575] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  276.649829] EXT4-fs (loop0): no journal found
[  276.692469] print_req_error: I/O error, dev loop5, sector 64
[  276.702435] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
[  276.747162] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
[  276.775520] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
[  276.784012] UDF-fs: Scanning with blocksize 4096 failed
16:30:28 executing program 2:
pipe(&(0x7f0000000000)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c000000020601000000000000000000000000080e0003006269746d61703a697000000005000400000000000900020073797a3000000000240007800c00028008000140ac1e00010c00018008000140a0000000050014000800000005000500020000"], 0x1}}, 0x0)
close(r2)
socket$nl_netfilter(0x10, 0x3, 0xc)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={<r3=>0xffffffffffffffff})
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
splice(r0, 0x0, r2, 0x0, 0x6209, 0x0)

16:30:28 executing program 1:
write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00')
sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r2, @ANYBLOB="21020000000000000000010000000c0099001526000004"], 0xc}}, 0x0)
r3 = socket$packet(0x11, 0x2, 0x300)
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
sendfile(r1, r0, 0x0, 0x100000001)

16:30:28 executing program 5:
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
socket$inet6_tcp(0xa, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
mkdir(&(0x7f0000000280)='./file0\x00', 0x0)
mount(&(0x7f00000000c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='udf\x00', 0x0, 0x0)

16:30:28 executing program 3:
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
bind$bt_hci(r2, &(0x7f0000000400)={0x1f, 0xffff, 0x3}, 0x6)
write$binfmt_misc(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8100fffe07"], 0xd)

16:30:28 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x0)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

[  276.809765] UDF-fs: warning (device loop5): udf_fill_super: No partition found (1)
16:30:28 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0)
r2 = socket$nl_generic(0x10, 0x3, 0x10)
r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00')
sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r3, @ANYBLOB="21020000000000000000010000000c0099001526000004"], 0xc}}, 0x0)
r4 = socket$packet(0x11, 0x2, 0x300)
r5 = dup(r4)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
sendfile(r2, r1, 0x0, 0x100000001)

16:30:28 executing program 3:
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
write$binfmt_misc(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8100fffe07"], 0xd)

[  277.009003] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
[  277.025681] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'.
[  277.054205] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
[  277.092680] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
[  277.118651] UDF-fs: Scanning with blocksize 512 failed
[  277.146486] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
16:30:29 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0)
r2 = socket$nl_generic(0x10, 0x3, 0x10)
r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00')
sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r3, @ANYBLOB="21020000000000000000010000000c0099001526000004"], 0xc}}, 0x0)
r4 = socket$packet(0x11, 0x2, 0x300)
r5 = dup(r4)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
sendfile(r2, r1, 0x0, 0x100000001)

16:30:29 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x0)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

16:30:29 executing program 3:
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
write$binfmt_misc(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8100fffe07"], 0xd)

16:30:29 executing program 0:
sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="054a38", @ANYRES16, @ANYBLOB="6ffe000000000000000003000000580001800d0001007564"], 0x3}}, 0x0)
sendto$unix(0xffffffffffffffff, &(0x7f0000000340)="53e0f2c2905e9916912f89b23f54185c0e90b38551c81ae3767d56fec3150cd9bd2db58e164473806c6aaaf6964a26b0de86f5fe037f85ea25f3228e5e6dc4672b11ee7418224b4bed0d668c93d4ad2a975309402c1c195f2bd1a1263e107b177c6288fe6160086efbcd133bab74435a30e5da929fcd65882c970886e36ef38c162bf17422221915", 0x88, 0x0, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x2, [@fwd, @array, @array, @const={0xb}]}}, 0x0, 0x62}, 0x20)
select(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100686cca8000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4807, 0x0)

[  277.165134] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
[  277.194071] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
[  277.212377] UDF-fs: Scanning with blocksize 1024 failed
[  277.256480] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
16:30:29 executing program 3:
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
write$binfmt_misc(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8100fffe07"], 0xd)

[  277.297497] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
[  277.363475] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
[  277.409447] UDF-fs: Scanning with blocksize 2048 failed
[  277.449088] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
[  277.458772] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  277.469498] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  277.488137] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  277.499664] EXT4-fs (loop0): no journal found
[  277.502264] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
[  277.538183] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
[  277.551260] UDF-fs: Scanning with blocksize 4096 failed
[  277.557017] UDF-fs: warning (device loop5): udf_fill_super: No partition found (1)
16:30:29 executing program 2:
pipe(&(0x7f0000000000)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c000000020601000000000000000000000000080e0003006269746d61703a697000000005000400000000000900020073797a3000000000240007800c00028008000140ac1e00010c00018008000140a0000000050014000800000005000500020000"], 0x1}}, 0x0)
close(r2)
socket$nl_netfilter(0x10, 0x3, 0xc)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={<r3=>0xffffffffffffffff})
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
splice(r0, 0x0, r2, 0x0, 0x6209, 0x0)

16:30:29 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0)
r2 = socket$nl_generic(0x10, 0x3, 0x10)
r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00')
sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r3, @ANYBLOB="21020000000000000000010000000c0099001526000004"], 0xc}}, 0x0)
r4 = socket$packet(0x11, 0x2, 0x300)
r5 = dup(r4)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
sendfile(r2, r1, 0x0, 0x100000001)

16:30:29 executing program 3:
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bind$bt_hci(0xffffffffffffffff, &(0x7f0000000400)={0x1f, 0xffff, 0x3}, 0x6)
write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="8100fffe07"], 0xd)

16:30:29 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x0)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, 0x0, 0x0, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

16:30:29 executing program 5:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
r1 = dup3(r0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
mkdir(&(0x7f0000000280)='./file0\x00', 0x0)
mount(&(0x7f00000000c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='udf\x00', 0x0, 0x0)

16:30:29 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x0)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, 0x0, 0x0, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

16:30:29 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0)
r2 = socket$nl_generic(0x10, 0x3, 0x10)
r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00')
sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r3, @ANYBLOB="21020000000000000000010000000c0099001526000004"], 0xc}}, 0x0)
r4 = socket$packet(0x11, 0x2, 0x300)
r5 = dup(r4)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
sendfile(r2, r1, 0x0, 0x100000001)

16:30:29 executing program 3:
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bind$bt_hci(0xffffffffffffffff, &(0x7f0000000400)={0x1f, 0xffff, 0x3}, 0x6)
write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="8100fffe07"], 0xd)

[  277.861197] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
[  277.921677] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
[  277.950613] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'.
16:30:29 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x0)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, 0x0, 0x0, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

16:30:29 executing program 3:
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bind$bt_hci(0xffffffffffffffff, &(0x7f0000000400)={0x1f, 0xffff, 0x3}, 0x6)
write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="8100fffe07"], 0xd)

[  277.976941] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
[  278.011967] UDF-fs: Scanning with blocksize 512 failed
[  278.055697] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
[  278.108285] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
[  278.134984] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
16:30:30 executing program 0:
sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="054a38", @ANYRES16, @ANYBLOB="6ffe000000000000000003000000580001800d0001007564"], 0x3}}, 0x0)
sendto$unix(0xffffffffffffffff, &(0x7f0000000340)="53e0f2c2905e9916912f89b23f54185c0e90b38551c81ae3767d56fec3150cd9bd2db58e164473806c6aaaf6964a26b0de86f5fe037f85ea25f3228e5e6dc4672b11ee7418224b4bed0d668c93d4ad2a975309402c1c195f2bd1a1263e107b177c6288fe6160086efbcd133bab74435a30e5da929fcd65882c970886e36ef38c162bf17422221915", 0x88, 0x0, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x2, [@fwd, @array, @array, @const={0xb}]}}, 0x0, 0x62}, 0x20)
select(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100686cca8000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4807, 0x0)

16:30:30 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x0)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000), 0x0, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

[  278.173634] UDF-fs: Scanning with blocksize 1024 failed
[  278.215546] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
[  278.244666] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
[  278.287523] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
[  278.305595] UDF-fs: Scanning with blocksize 2048 failed
[  278.327574] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
[  278.356764] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
[  278.376308] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  278.387727] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  278.416601] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
[  278.424891] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  278.436565] EXT4-fs (loop0): no journal found
[  278.453573] UDF-fs: Scanning with blocksize 4096 failed
[  278.476728] UDF-fs: warning (device loop5): udf_fill_super: No partition found (1)
16:30:30 executing program 2:
pipe(&(0x7f0000000000)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c000000020601000000000000000000000000080e0003006269746d61703a697000000005000400000000000900020073797a3000000000240007800c00028008000140ac1e00010c00018008000140a0000000050014000800000005000500020000000500"], 0x1}}, 0x0)
close(r2)
socket$nl_netfilter(0x10, 0x3, 0xc)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={<r3=>0xffffffffffffffff})
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
splice(r0, 0x0, r2, 0x0, 0x6209, 0x0)

16:30:30 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0)
r2 = socket$nl_generic(0x10, 0x3, 0x10)
r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00')
sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r3, @ANYBLOB="21020000000000000000010000000c0099001526000004"], 0xc}}, 0x0)
r4 = socket$packet(0x11, 0x2, 0x300)
r5 = dup(r4)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
sendfile(r2, r1, 0x0, 0x100000001)

16:30:30 executing program 3:
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
dup(r0)
r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
bind$bt_hci(r1, &(0x7f0000000400)={0x1f, 0xffff, 0x3}, 0x6)
write$binfmt_misc(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="8100fffe07"], 0xd)

16:30:30 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x0)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000), 0x0, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

16:30:30 executing program 5:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
r1 = dup3(r0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
mkdir(&(0x7f0000000280)='./file0\x00', 0x0)
mount(&(0x7f00000000c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='udf\x00', 0x0, 0x0)

16:30:30 executing program 3:
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
dup(r0)
r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
bind$bt_hci(r1, &(0x7f0000000400)={0x1f, 0xffff, 0x3}, 0x6)
write$binfmt_misc(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="8100fffe07"], 0xd)

[  278.779463] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
[  278.827783] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
16:30:30 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0)
r2 = socket$nl_generic(0x10, 0x3, 0x10)
r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00')
sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r3, @ANYBLOB="21020000000000000000010000000c0099001526000004"], 0xc}}, 0x0)
r4 = socket$packet(0x11, 0x2, 0x300)
r5 = dup(r4)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
sendfile(r2, r1, 0x0, 0x100000001)

16:30:30 executing program 3:
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
dup(r0)
r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
bind$bt_hci(r1, &(0x7f0000000400)={0x1f, 0xffff, 0x3}, 0x6)
write$binfmt_misc(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="8100fffe07"], 0xd)

[  278.876361] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
16:30:30 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x0)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000), 0x0, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

[  278.925415] UDF-fs: Scanning with blocksize 512 failed
16:30:30 executing program 3:
socket$inet_icmp_raw(0x2, 0x3, 0x1)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
bind$bt_hci(r0, &(0x7f0000000400)={0x1f, 0xffff, 0x3}, 0x6)
write$binfmt_misc(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="8100fffe07"], 0xd)

[  278.975075] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
[  279.041446] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
16:30:30 executing program 0:
sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="054a38", @ANYRES16, @ANYBLOB="6ffe000000000000000003000000580001800d0001007564"], 0x3}}, 0x0)
sendto$unix(0xffffffffffffffff, &(0x7f0000000340)="53e0f2c2905e9916912f89b23f54185c0e90b38551c81ae3767d56fec3150cd9bd2db58e164473806c6aaaf6964a26b0de86f5fe037f85ea25f3228e5e6dc4672b11ee7418224b4bed0d668c93d4ad2a975309402c1c195f2bd1a1263e107b177c6288fe6160086efbcd133bab74435a30e5da929fcd65882c970886e36ef38c162bf17422221915", 0x88, 0x0, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x2, [@fwd, @array, @array, @const={0xb}]}}, 0x0, 0x62}, 0x20)
select(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100686cca8000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4807, 0x0)

16:30:31 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x0)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x0, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

[  279.090851] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
[  279.114556] UDF-fs: Scanning with blocksize 1024 failed
[  279.142703] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
[  279.211025] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
[  279.264106] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
[  279.288335] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  279.299285] UDF-fs: Scanning with blocksize 2048 failed
[  279.327164] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
[  279.338673] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
[  279.343842] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  279.369872] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
[  279.389621] UDF-fs: Scanning with blocksize 4096 failed
[  279.405798] UDF-fs: warning (device loop5): udf_fill_super: No partition found (1)
[  279.416095] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  279.470744] EXT4-fs (loop0): no journal found
16:30:31 executing program 2:
pipe(&(0x7f0000000000)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c000000020601000000000000000000000000080e0003006269746d61703a697000000005000400000000000900020073797a3000000000240007800c00028008000140ac1e00010c00018008000140a0000000050014000800000005000500020000000500"], 0x1}}, 0x0)
close(r2)
socket$nl_netfilter(0x10, 0x3, 0xc)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={<r3=>0xffffffffffffffff})
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
splice(r0, 0x0, r2, 0x0, 0x6209, 0x0)

16:30:31 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, 0x0, 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0)
r2 = socket$nl_generic(0x10, 0x3, 0x10)
r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00')
sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r3, @ANYBLOB="21020000000000000000010000000c0099001526000004"], 0xc}}, 0x0)
r4 = socket$packet(0x11, 0x2, 0x300)
r5 = dup(r4)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
sendfile(r2, r1, 0x0, 0x100000001)

16:30:31 executing program 3:
socket$inet_icmp_raw(0x2, 0x3, 0x1)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
bind$bt_hci(r0, &(0x7f0000000400)={0x1f, 0xffff, 0x3}, 0x6)
write$binfmt_misc(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="8100fffe07"], 0xd)

16:30:31 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x0)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x0, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

16:30:31 executing program 5:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
r1 = dup3(r0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
mkdir(&(0x7f0000000280)='./file0\x00', 0x0)
mount(&(0x7f00000000c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='udf\x00', 0x0, 0x0)

16:30:31 executing program 3:
socket$inet_icmp_raw(0x2, 0x3, 0x1)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
bind$bt_hci(r0, &(0x7f0000000400)={0x1f, 0xffff, 0x3}, 0x6)
write$binfmt_misc(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="8100fffe07"], 0xd)

[  279.673921] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
16:30:31 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, 0x0, 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0)
r2 = socket$nl_generic(0x10, 0x3, 0x10)
r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00')
sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r3, @ANYBLOB="21020000000000000000010000000c0099001526000004"], 0xc}}, 0x0)
r4 = socket$packet(0x11, 0x2, 0x300)
r5 = dup(r4)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
sendfile(r2, r1, 0x0, 0x100000001)

[  279.726217] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
16:30:31 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x0)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x0, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(r2)

16:30:31 executing program 3:
r0 = dup(0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
bind$bt_hci(r1, &(0x7f0000000400)={0x1f, 0xffff, 0x3}, 0x6)
write$binfmt_misc(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="8100fffe07"], 0xd)

[  279.793693] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
[  279.832533] UDF-fs: Scanning with blocksize 512 failed
[  279.875934] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
[  279.927323] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
16:30:31 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, 0x0, 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0)
r2 = socket$nl_generic(0x10, 0x3, 0x10)
r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00')
sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r3, @ANYBLOB="21020000000000000000010000000c0099001526000004"], 0xc}}, 0x0)
r4 = socket$packet(0x11, 0x2, 0x300)
r5 = dup(r4)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
sendfile(r2, r1, 0x0, 0x100000001)

16:30:31 executing program 0:
sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="054a38", @ANYRES16, @ANYBLOB="6ffe000000000000000003000000580001800d0001007564"], 0x3}}, 0x0)
sendto$unix(0xffffffffffffffff, &(0x7f0000000340)="53e0f2c2905e9916912f89b23f54185c0e90b38551c81ae3767d56fec3150cd9bd2db58e164473806c6aaaf6964a26b0de86f5fe037f85ea25f3228e5e6dc4672b11ee7418224b4bed0d668c93d4ad2a975309402c1c195f2bd1a1263e107b177c6288fe6160086efbcd133bab74435a30e5da929fcd65882c970886e36ef38c162bf17422221915d31ea852afbc6f78df1e", 0x92, 0x0, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x2, [@fwd, @array, @array, @const={0xb}]}}, 0x0, 0x62}, 0x20)
select(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100686cca8000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4807, 0x0)

[  279.976304] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
16:30:31 executing program 3:
r0 = dup(0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
bind$bt_hci(r1, &(0x7f0000000400)={0x1f, 0xffff, 0x3}, 0x6)
write$binfmt_misc(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="8100fffe07"], 0xd)

[  280.023053] UDF-fs: Scanning with blocksize 1024 failed
[  280.059794] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
[  280.094889] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
[  280.141242] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
[  280.210346] UDF-fs: Scanning with blocksize 2048 failed
[  280.232622] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  280.246849] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
[  280.298944] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  280.303717] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
[  280.321408] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  280.349004] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
[  280.365317] EXT4-fs (loop0): no journal found
[  280.369039] UDF-fs: Scanning with blocksize 4096 failed
[  280.377220] UDF-fs: warning (device loop5): udf_fill_super: No partition found (1)
16:30:32 executing program 2:
pipe(&(0x7f0000000000)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c000000020601000000000000000000000000080e0003006269746d61703a697000000005000400000000000900020073797a3000000000240007800c00028008000140ac1e00010c00018008000140a0000000050014000800000005000500020000000500"], 0x1}}, 0x0)
close(r2)
socket$nl_netfilter(0x10, 0x3, 0xc)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={<r3=>0xffffffffffffffff})
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
splice(r0, 0x0, r2, 0x0, 0x6209, 0x0)

16:30:32 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x0)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(0x0, 0x0, 0xff)
close(r2)

16:30:32 executing program 3:
r0 = dup(0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
bind$bt_hci(r1, &(0x7f0000000400)={0x1f, 0xffff, 0x3}, 0x6)
write$binfmt_misc(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="8100fffe07"], 0xd)

16:30:32 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0)
r2 = socket$nl_generic(0x10, 0x3, 0x10)
r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00')
sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r3, @ANYBLOB="21020000000000000000010000000c0099001526000004"], 0xc}}, 0x0)
r4 = socket$packet(0x11, 0x2, 0x300)
r5 = dup(r4)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
sendfile(r2, r1, 0x0, 0x100000001)

16:30:32 executing program 5:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = dup3(0xffffffffffffffff, r0, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
mkdir(&(0x7f0000000280)='./file0\x00', 0x0)
mount(&(0x7f00000000c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='udf\x00', 0x0, 0x0)

16:30:32 executing program 3:
socket$inet_icmp_raw(0x2, 0x3, 0x1)
r0 = dup(0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
bind$bt_hci(r1, &(0x7f0000000400)={0x1f, 0xffff, 0x3}, 0x6)
write$binfmt_misc(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="8100fffe07"], 0xd)

16:30:32 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x0)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(0x0, 0x0, 0xff)
close(r2)

[  280.622546] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
[  280.653790] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
[  280.677475] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
[  280.719374] UDF-fs: Scanning with blocksize 512 failed
16:30:32 executing program 3:
socket$inet_icmp_raw(0x2, 0x3, 0x1)
r0 = dup(0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
bind$bt_hci(r1, &(0x7f0000000400)={0x1f, 0xffff, 0x3}, 0x6)
write$binfmt_misc(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="8100fffe07"], 0xd)

[  280.741824] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
16:30:32 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0)
r2 = socket$nl_generic(0x10, 0x3, 0x10)
r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00')
sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r3, @ANYBLOB="21020000000000000000010000000c0099001526000004"], 0xc}}, 0x0)
r4 = socket$packet(0x11, 0x2, 0x300)
r5 = dup(r4)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
sendfile(r2, r1, 0x0, 0x100000001)

[  280.803478] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
16:30:32 executing program 0:
sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="054a38", @ANYRES16, @ANYBLOB="6ffe000000000000000003000000580001800d0001007564"], 0x3}}, 0x0)
sendto$unix(0xffffffffffffffff, &(0x7f0000000340)="53e0f2c2905e9916912f89b23f54185c0e90b38551c81ae3767d56fec3150cd9bd2db58e164473806c6aaaf6964a26b0de86f5fe037f85ea25f3228e5e6dc4672b11ee7418224b4bed0d668c93d4ad2a975309402c1c195f2bd1a1263e107b177c6288fe6160086efbcd133bab74435a30e5da929fcd65882c970886e36ef38c162bf17422221915d31ea852afbc6f78df1e", 0x92, 0x0, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x2, [@fwd, @array, @array, @const={0xb}]}}, 0x0, 0x62}, 0x20)
select(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100686cca8000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4807, 0x0)

[  280.900962] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
16:30:32 executing program 3:
socket$inet_icmp_raw(0x2, 0x3, 0x1)
r0 = dup(0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
bind$bt_hci(r1, &(0x7f0000000400)={0x1f, 0xffff, 0x3}, 0x6)
write$binfmt_misc(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="8100fffe07"], 0xd)

[  280.954777] UDF-fs: Scanning with blocksize 1024 failed
16:30:32 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x0)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(0x0, 0x0, 0xff)
close(r2)

[  281.003955] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
[  281.055463] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
[  281.098814] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
[  281.135889] UDF-fs: Scanning with blocksize 2048 failed
[  281.161343] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  281.194694] print_req_error: 59 callbacks suppressed
[  281.194709] print_req_error: I/O error, dev loop5, sector 64
[  281.211550] print_req_error: I/O error, dev loop5, sector 2048
[  281.223314] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
[  281.271075] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  281.283245] print_req_error: I/O error, dev loop5, sector 4096
[  281.293715] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
[  281.331277] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  281.331852] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
[  281.351197] UDF-fs: Scanning with blocksize 4096 failed
[  281.363001] UDF-fs: warning (device loop5): udf_fill_super: No partition found (1)
[  281.373058] EXT4-fs (loop0): no journal found
16:30:33 executing program 2:
pipe(&(0x7f0000000000)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c000000020601000000000000000000000000080e0003006269746d61703a697000000005000400000000000900020073797a3000000000240007800c00028008000140ac1e00010c00018008000140a00000000500140008000000050005000200000005000100"], 0x1}}, 0x0)
close(r2)
socket$nl_netfilter(0x10, 0x3, 0xc)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={<r3=>0xffffffffffffffff})
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
splice(r0, 0x0, r2, 0x0, 0x6209, 0x0)

16:30:33 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0)
r2 = socket$nl_generic(0x10, 0x3, 0x10)
r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00')
sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r3, @ANYBLOB="21020000000000000000010000000c0099001526000004"], 0xc}}, 0x0)
r4 = socket$packet(0x11, 0x2, 0x300)
r5 = dup(r4)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
sendfile(r2, r1, 0x0, 0x100000001)

16:30:33 executing program 3:
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
bind$bt_hci(r1, &(0x7f0000000400)={0x1f, 0xffff, 0x3}, 0x6)
write$binfmt_misc(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="8100fffe07"], 0xd)

16:30:33 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x0)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040), 0x0, 0xff)
close(r2)

16:30:33 executing program 5:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = dup3(0xffffffffffffffff, r0, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
mkdir(&(0x7f0000000280)='./file0\x00', 0x0)
mount(&(0x7f00000000c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='udf\x00', 0x0, 0x0)

16:30:33 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x0)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040), 0x0, 0xff)
close(r2)

16:30:33 executing program 3:
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
bind$bt_hci(r1, &(0x7f0000000400)={0x1f, 0xffff, 0x3}, 0x6)
write$binfmt_misc(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="8100fffe07"], 0xd)

[  281.573096] print_req_error: I/O error, dev loop5, sector 64
[  281.583229] print_req_error: I/O error, dev loop5, sector 256
[  281.591346] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
[  281.637620] print_req_error: I/O error, dev loop5, sector 512
[  281.646609] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
16:30:33 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x10, r0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0)
r2 = socket$nl_generic(0x10, 0x3, 0x10)
r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00')
sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r3, @ANYBLOB="21020000000000000000010000000c0099001526000004"], 0xc}}, 0x0)
r4 = socket$packet(0x11, 0x2, 0x300)
r5 = dup(r4)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
sendfile(r2, r1, 0x0, 0x100000001)

[  281.690149] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
[  281.765011] UDF-fs: Scanning with blocksize 512 failed
16:30:33 executing program 3:
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
bind$bt_hci(r1, &(0x7f0000000400)={0x1f, 0xffff, 0x3}, 0x6)
write$binfmt_misc(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="8100fffe07"], 0xd)

16:30:33 executing program 0:
sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="054a38", @ANYRES16, @ANYBLOB="6ffe000000000000000003000000580001800d0001007564"], 0x3}}, 0x0)
sendto$unix(0xffffffffffffffff, &(0x7f0000000340)="53e0f2c2905e9916912f89b23f54185c0e90b38551c81ae3767d56fec3150cd9bd2db58e164473806c6aaaf6964a26b0de86f5fe037f85ea25f3228e5e6dc4672b11ee7418224b4bed0d668c93d4ad2a975309402c1c195f2bd1a1263e107b177c6288fe6160086efbcd133bab74435a30e5da929fcd65882c970886e36ef38c162bf17422221915d31ea852afbc6f78df1e", 0x92, 0x0, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x2, [@fwd, @array, @array, @const={0xb}]}}, 0x0, 0x62}, 0x20)
select(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100686cca8000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4807, 0x0)

[  281.813334] print_req_error: I/O error, dev loop5, sector 64
[  281.824933] print_req_error: I/O error, dev loop5, sector 512
[  281.834883] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
[  281.906247] audit: type=1804 audit(1588955433.731:50): pid=11977 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir210500229/syzkaller.5IFUhd/175/cgroup.controllers" dev="sda1" ino=15827 res=1
16:30:33 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x0)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040), 0x0, 0xff)
close(r2)

[  281.952405] print_req_error: I/O error, dev loop5, sector 1024
[  281.958726] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
16:30:33 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x10, r0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0)
r2 = socket$nl_generic(0x10, 0x3, 0x10)
r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00')
sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r3, @ANYBLOB="21020000000000000000010000000c0099001526000004"], 0xc}}, 0x0)
r4 = socket$packet(0x11, 0x2, 0x300)
r5 = dup(r4)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
sendfile(r2, r1, 0x0, 0x100000001)

[  282.025288] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
[  282.060011] UDF-fs: Scanning with blocksize 1024 failed
[  282.094627] print_req_error: I/O error, dev loop5, sector 64
[  282.104712] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
[  282.138885] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  282.167740] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
[  282.182217] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  282.242937] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
[  282.246548] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  282.283901] EXT4-fs (loop0): no journal found
[  282.289179] UDF-fs: Scanning with blocksize 2048 failed
16:30:34 executing program 2:
pipe(&(0x7f0000000000)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c000000020601000000000000000000000000080e0003006269746d61703a697000000005000400000000000900020073797a3000000000240007800c00028008000140ac1e00010c00018008000140a00000000500140008000000050005000200000005000100"], 0x1}}, 0x0)
close(r2)
socket$nl_netfilter(0x10, 0x3, 0xc)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={<r3=>0xffffffffffffffff})
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
splice(r0, 0x0, r2, 0x0, 0x6209, 0x0)

16:30:34 executing program 3:
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0)
r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
bind$bt_hci(r2, &(0x7f0000000400)={0x1f, 0xffff, 0x3}, 0x6)
write$binfmt_misc(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8100fffe07"], 0xd)

16:30:34 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x0)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{}], 0x1, 0xff)
close(r2)

[  282.338011] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
[  282.363614] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
16:30:34 executing program 3:
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0)
r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
bind$bt_hci(r2, &(0x7f0000000400)={0x1f, 0xffff, 0x3}, 0x6)
write$binfmt_misc(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8100fffe07"], 0xd)

[  282.404266] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
[  282.443524] UDF-fs: Scanning with blocksize 4096 failed
[  282.470472] UDF-fs: warning (device loop5): udf_fill_super: No partition found (1)
16:30:34 executing program 5:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = dup3(0xffffffffffffffff, r0, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
mkdir(&(0x7f0000000280)='./file0\x00', 0x0)
mount(&(0x7f00000000c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='udf\x00', 0x0, 0x0)

16:30:34 executing program 3:
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0)
r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
bind$bt_hci(r2, &(0x7f0000000400)={0x1f, 0xffff, 0x3}, 0x6)
write$binfmt_misc(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8100fffe07"], 0xd)

16:30:34 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x0)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{}], 0x1, 0xff)
close(r2)

16:30:34 executing program 3:
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
bind$bt_hci(0xffffffffffffffff, &(0x7f0000000400)={0x1f, 0xffff, 0x3}, 0x6)
write$binfmt_misc(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8100fffe07"], 0xd)

[  282.698124] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
[  282.727528] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
[  282.772100] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
16:30:34 executing program 0:
sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="054a38", @ANYRES16, @ANYBLOB="6ffe000000000000000003000000580001800d0001007564"], 0x3}}, 0x0)
sendto$unix(0xffffffffffffffff, &(0x7f0000000340)="53e0f2c2905e9916912f89b23f54185c0e90b38551c81ae3767d56fec3150cd9bd2db58e164473806c6aaaf6964a26b0de86f5fe037f85ea25f3228e5e6dc4672b11ee7418224b4bed0d668c93d4ad2a975309402c1c195f2bd1a1263e107b177c6288fe6160086efbcd133bab74435a30e5da929fcd65882c970886e36ef38c162bf17422221915d31ea852afbc6f78df1ea10fd20bd8", 0x97, 0x0, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x2, [@fwd, @array, @array, @const={0xb}]}}, 0x0, 0x62}, 0x20)
select(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100686cca8000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4807, 0x0)

16:30:34 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x0)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{}], 0x1, 0xff)
close(r2)

[  282.818757] UDF-fs: Scanning with blocksize 512 failed
[  282.856645] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
[  282.905825] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
16:30:34 executing program 3:
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
bind$bt_hci(0xffffffffffffffff, &(0x7f0000000400)={0x1f, 0xffff, 0x3}, 0x6)
write$binfmt_misc(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8100fffe07"], 0xd)

[  282.945233] audit: type=1804 audit(1588955434.771:51): pid=11994 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir210500229/syzkaller.5IFUhd/176/cgroup.controllers" dev="sda1" ino=15776 res=1
[  282.968800] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
[  283.010983] UDF-fs: Scanning with blocksize 1024 failed
[  283.057428] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
[  283.095716] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
16:30:35 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x10, r0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0)
r2 = socket$nl_generic(0x10, 0x3, 0x10)
r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00')
sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r3, @ANYBLOB="21020000000000000000010000000c0099001526000004"], 0xc}}, 0x0)
r4 = socket$packet(0x11, 0x2, 0x300)
r5 = dup(r4)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
sendfile(r2, r1, 0x0, 0x100000001)

[  283.128485] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
[  283.157074] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  283.190114] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
[  283.203671] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  283.223005] UDF-fs: Scanning with blocksize 2048 failed
16:30:35 executing program 2:
pipe(&(0x7f0000000000)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c000000020601000000000000000000000000080e0003006269746d61703a697000000005000400000000000900020073797a3000000000240007800c00028008000140ac1e00010c00018008000140a00000000500140008000000050005000200000005000100"], 0x1}}, 0x0)
close(r2)
socket$nl_netfilter(0x10, 0x3, 0xc)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={<r3=>0xffffffffffffffff})
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
splice(r0, 0x0, r2, 0x0, 0x6209, 0x0)

16:30:35 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x0)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0x0)
close(r2)

16:30:35 executing program 3:
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
bind$bt_hci(0xffffffffffffffff, &(0x7f0000000400)={0x1f, 0xffff, 0x3}, 0x6)
write$binfmt_misc(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8100fffe07"], 0xd)

[  283.247924] EXT4-fs (loop0): no journal found
[  283.254222] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
[  283.285179] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
16:30:35 executing program 3:
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
bind$bt_hci(r2, 0x0, 0x0)
write$binfmt_misc(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8100fffe07"], 0xd)

[  283.365483] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
16:30:35 executing program 5:
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = dup3(0xffffffffffffffff, r0, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
mkdir(&(0x7f0000000280)='./file0\x00', 0x0)
mount(&(0x7f00000000c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='udf\x00', 0x0, 0x0)

16:30:35 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x0)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0x0)
close(r2)

16:30:35 executing program 3:
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
bind$bt_hci(r2, 0x0, 0x0)
write$binfmt_misc(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8100fffe07"], 0xd)

[  283.409550] UDF-fs: Scanning with blocksize 4096 failed
[  283.415480] UDF-fs: warning (device loop5): udf_fill_super: No partition found (1)
16:30:35 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x0)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0x0)
close(r2)

[  283.601568] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
[  283.641212] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
[  283.679081] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
[  283.714518] UDF-fs: Scanning with blocksize 512 failed
16:30:35 executing program 0:
sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="054a38", @ANYRES16, @ANYBLOB="6ffe000000000000000003000000580001800d0001007564"], 0x3}}, 0x0)
sendto$unix(0xffffffffffffffff, &(0x7f0000000340)="53e0f2c2905e9916912f89b23f54185c0e90b38551c81ae3767d56fec3150cd9bd2db58e164473806c6aaaf6964a26b0de86f5fe037f85ea25f3228e5e6dc4672b11ee7418224b4bed0d668c93d4ad2a975309402c1c195f2bd1a1263e107b177c6288fe6160086efbcd133bab74435a30e5da929fcd65882c970886e36ef38c162bf17422221915d31ea852afbc6f78df1ea10fd20bd8", 0x97, 0x0, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x2, [@fwd, @array, @array, @const={0xb}]}}, 0x0, 0x62}, 0x20)
select(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100686cca8000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4807, 0x0)

16:30:35 executing program 3:
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
bind$bt_hci(r2, 0x0, 0x0)
write$binfmt_misc(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8100fffe07"], 0xd)

16:30:35 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x0)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(0xffffffffffffffff)

[  283.744443] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
[  283.814825] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
[  283.874755] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
[  283.905384] UDF-fs: Scanning with blocksize 1024 failed
[  283.926443] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
[  283.971320] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  283.987388] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
[  284.049494] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
[  284.058259] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  284.067173] UDF-fs: Scanning with blocksize 2048 failed
[  284.078467] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
[  284.097387] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
[  284.109992] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
[  284.121031] UDF-fs: Scanning with blocksize 4096 failed
[  284.139224] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  284.158292] UDF-fs: warning (device loop5): udf_fill_super: No partition found (1)
[  284.188975] EXT4-fs (loop0): no journal found
16:30:36 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0)
r2 = socket$nl_generic(0x10, 0x3, 0x10)
r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00')
sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r3, @ANYBLOB="21020000000000000000010000000c0099001526000004"], 0xc}}, 0x0)
r4 = socket$packet(0x11, 0x2, 0x300)
r5 = dup(r4)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
sendfile(r2, r1, 0x0, 0x100000001)

16:30:36 executing program 3:
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
bind$bt_hci(r2, &(0x7f0000000400)={0x1f, 0x0, 0x3}, 0x6)
write$binfmt_misc(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8100fffe07"], 0xd)

16:30:36 executing program 5:
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = dup3(0xffffffffffffffff, r0, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
mkdir(&(0x7f0000000280)='./file0\x00', 0x0)
mount(&(0x7f00000000c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='udf\x00', 0x0, 0x0)

16:30:36 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x0)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(0xffffffffffffffff)

16:30:36 executing program 2:
pipe(&(0x7f0000000000)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c000000020601000000000000000000000000080e0003006269746d61703a697000000005000400000000000900020073797a3000000000240007800c00028008000140ac1e00010c00018008000140a0000000050014000800000005000500020000000500010006"], 0x1}}, 0x0)
close(0xffffffffffffffff)
socket$nl_netfilter(0x10, 0x3, 0xc)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={<r3=>0xffffffffffffffff})
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
splice(r0, 0x0, r2, 0x0, 0x6209, 0x0)

[  284.293062] audit: type=1804 audit(1588955436.122:52): pid=12052 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir210500229/syzkaller.5IFUhd/177/cgroup.controllers" dev="sda1" ino=15769 res=1
16:30:36 executing program 3:
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
bind$bt_hci(r2, &(0x7f0000000400)={0x1f, 0x0, 0x3}, 0x6)
write$binfmt_misc(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8100fffe07"], 0xd)

[  284.440979] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
16:30:36 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa9e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000000), 0x200)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getpid()
prlimit64(0x0, 0x0, 0x0, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10)
fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x76, 0x2, 0x1, "c704912dd157fb2988bcbd58c1997045", "580fd75baa3a2bf8faef2367552eb28b58060eeb940d88b2d3a893bfc04c33f79daa7a5cd84f252dd02d067642b5a84ebf368426f69bad363dd79a254fc64f2abe302ea1d6927eb18a1adf919bd8a8f8d9bab5f0622fbdd3d79cddeda996a866ae"}, 0x76, 0x0)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x3d)
sendto$inet6(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c)
sendto$inet6(r2, &(0x7f0000000000)="1f", 0x1, 0x40488d5, 0x0, 0x0)
poll(&(0x7f0000000040)=[{r2}], 0x1, 0xff)
close(0xffffffffffffffff)

[  284.483448] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
[  284.531707] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
[  284.557906] UDF-fs: Scanning with blocksize 512 failed
16:30:36 executing program 3:
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
bind$bt_hci(r2, &(0x7f0000000400)={0x1f, 0x0, 0x3}, 0x6)
write$binfmt_misc(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8100fffe07"], 0xd)

[  284.593756] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
16:30:36 executing program 0:
sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="054a38", @ANYRES16, @ANYBLOB="6ffe000000000000000003000000580001800d0001007564"], 0x3}}, 0x0)
sendto$unix(0xffffffffffffffff, &(0x7f0000000340)="53e0f2c2905e9916912f89b23f54185c0e90b38551c81ae3767d56fec3150cd9bd2db58e164473806c6aaaf6964a26b0de86f5fe037f85ea25f3228e5e6dc4672b11ee7418224b4bed0d668c93d4ad2a975309402c1c195f2bd1a1263e107b177c6288fe6160086efbcd133bab74435a30e5da929fcd65882c970886e36ef38c162bf17422221915d31ea852afbc6f78df1ea10fd20bd8", 0x97, 0x0, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x2, [@fwd, @array, @array, @const={0xb}]}}, 0x0, 0x62}, 0x20)
select(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100686cca8000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4807, 0x0)

[  284.644404] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
[  284.698956] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
16:30:36 executing program 4:
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0)
r0 = getpid()
memfd_create(0x0, 0x0)
sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x4}, 0x0)
socket$inet6(0xa, 0x0, 0x0)
pipe(&(0x7f0000000200)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = dup(0xffffffffffffffff)
perf_event_open(0x0, 0x0, 0x0, r3, 0x8)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
fcntl$setpipe(r2, 0x407, 0x0)
write(r2, &(0x7f0000000340), 0x41395527)
vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0)
sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={0x0, 0x3}, 0x1, 0x0, 0x0, 0x8881}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}, 0x108, 0x0, 0x0, 0x0, 0x0, 0xffff6146}, 0x0, 0x80000000001, 0xffffffffffffffff, 0x1)
clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000", 0x2c, 0x400}], 0x4801, 0x0)

16:30:36 executing program 3:
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
bind$bt_hci(r2, &(0x7f0000000400)={0x1f, 0xffff}, 0x6)
write$binfmt_misc(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8100fffe07"], 0xd)

[  284.740876] UDF-fs: Scanning with blocksize 1024 failed
[  284.772056] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
[  284.824281] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
[  284.875888] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
[  284.914406] UDF-fs: Scanning with blocksize 2048 failed
[  284.935831] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  284.957130] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
16:30:36 executing program 3:
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
bind$bt_hci(r2, &(0x7f0000000400)={0x1f, 0xffff}, 0x6)
write$binfmt_misc(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8100fffe07"], 0xd)

[  285.042099] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  285.094853] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
[  285.112077] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  285.184534] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
[  285.215725] EXT4-fs (loop0): no journal found
[  285.283670] UDF-fs: Scanning with blocksize 4096 failed
[  285.290263] UDF-fs: warning (device loop5): udf_fill_super: No partition found (1)
[  285.436562] audit: type=1804 audit(1588955437.262:53): pid=12100 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir210500229/syzkaller.5IFUhd/178/cgroup.controllers" dev="sda1" ino=15753 res=1
16:30:37 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0)
r2 = socket$nl_generic(0x10, 0x3, 0x10)
r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00')
sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r3, @ANYBLOB="21020000000000000000010000000c0099001526000004"], 0xc}}, 0x0)
r4 = socket$packet(0x11, 0x2, 0x300)
r5 = dup(r4)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
sendfile(r2, r1, 0x0, 0x100000001)

16:30:37 executing program 2:
pipe(&(0x7f0000000000)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c000000020601000000000000000000000000080e0003006269746d61703a697000000005000400000000000900020073797a3000000000240007800c00028008000140ac1e00010c00018008000140a0000000050014000800000005000500020000000500010006"], 0x1}}, 0x0)
close(0xffffffffffffffff)
socket$nl_netfilter(0x10, 0x3, 0xc)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={<r3=>0xffffffffffffffff})
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
splice(r0, 0x0, r2, 0x0, 0x6209, 0x0)

16:30:37 executing program 4:
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000100)={0x77359400}, 0x8)

16:30:37 executing program 3:
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
bind$bt_hci(r2, &(0x7f0000000400)={0x1f, 0xffff}, 0x6)
write$binfmt_misc(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8100fffe07"], 0xd)

16:30:37 executing program 5:
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = dup3(0xffffffffffffffff, r0, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
mkdir(&(0x7f0000000280)='./file0\x00', 0x0)
mount(&(0x7f00000000c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='udf\x00', 0x0, 0x0)

16:30:37 executing program 0:
sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="054a38", @ANYRES16, @ANYBLOB="6ffe000000000000000003000000580001800d0001007564"], 0x3}}, 0x0)
sendto$unix(0xffffffffffffffff, &(0x7f0000000340)="53e0f2c2905e9916912f89b23f54185c0e90b38551c81ae3767d56fec3150cd9bd2db58e164473806c6aaaf6964a26b0de86f5fe037f85ea25f3228e5e6dc4672b11ee7418224b4bed0d668c93d4ad2a975309402c1c195f2bd1a1263e107b177c6288fe6160086efbcd133bab74435a30e5da929fcd65882c970886e36ef38c162bf17422221915d31ea852afbc6f78df1ea10fd20bd8cf77", 0x99, 0x0, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x2, [@fwd, @array, @array, @const={0xb}]}}, 0x0, 0x62}, 0x20)
select(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100686cca8000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4807, 0x0)

16:30:37 executing program 4:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0)
ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000001280)={[0x4, 0x0, 0x40000007, 0x0, 0x0, 0x0, 0x4cb]})
ioctl$KVM_RUN(r2, 0xae80, 0x0)
perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, @perf_config_ext, 0x48, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$KVM_RUN(r2, 0xae80, 0x0)

16:30:37 executing program 3:
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
bind$bt_hci(r2, &(0x7f0000000400)={0x1f, 0xffff, 0x3}, 0x6)
write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="8100fffe07"], 0xd)

[  285.692991] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
[  285.713947] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
[  285.732205] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
16:30:37 executing program 3:
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
bind$bt_hci(r2, &(0x7f0000000400)={0x1f, 0xffff, 0x3}, 0x6)
write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="8100fffe07"], 0xd)

[  285.766324] kvm [12137]: vcpu0, guest rIP: 0x145 Hyper-V unhandled rdmsr: 0x4000004e
[  285.777665] UDF-fs: Scanning with blocksize 512 failed
[  285.803843] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  285.805475] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
[  285.834300] kvm [12137]: vcpu0, guest rIP: 0x145 Hyper-V unhandled rdmsr: 0x40000045
[  285.860886] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  285.875251] kvm [12137]: vcpu0, guest rIP: 0x145 Hyper-V unhandled rdmsr: 0x4000007c
16:30:37 executing program 3:
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
bind$bt_hci(r2, &(0x7f0000000400)={0x1f, 0xffff, 0x3}, 0x6)
write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="8100fffe07"], 0xd)

[  285.908522] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  285.917677] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
[  285.927048] kvm [12137]: vcpu0, guest rIP: 0x145 Hyper-V unhandled rdmsr: 0x40000042
[  285.966851] kvm [12137]: vcpu0, guest rIP: 0x145 Hyper-V unhandled rdmsr: 0x4000008e
[  285.976858] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
16:30:37 executing program 3:
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
bind$bt_hci(r2, &(0x7f0000000400)={0x1f, 0xffff, 0x3}, 0x6)
write$binfmt_misc(r2, 0x0, 0xd)

[  286.018864] EXT4-fs (loop0): no journal found
[  286.020738] UDF-fs: Scanning with blocksize 1024 failed
[  286.039919] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
[  286.097232] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
16:30:38 executing program 4:
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
add_key$user(0x0, 0x0, &(0x7f0000000780), 0x0, 0xfffffffffffffffe)
r0 = socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000180)='l2tp\x00')
sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f00000002c0)={0x0, 0xf00, &(0x7f0000000200)={&(0x7f0000000040)={0x14, r1, 0x301}, 0x14}}, 0x0)

[  286.148596] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
[  286.185563] UDF-fs: Scanning with blocksize 2048 failed
[  286.223948] print_req_error: 50 callbacks suppressed
[  286.223957] print_req_error: I/O error, dev loop5, sector 64
[  286.236177] print_req_error: I/O error, dev loop5, sector 2048
[  286.243279] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
[  286.308768] print_req_error: I/O error, dev loop5, sector 4096
[  286.315264] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
[  286.335232] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
[  286.342593] UDF-fs: Scanning with blocksize 4096 failed
[  286.348211] UDF-fs: warning (device loop5): udf_fill_super: No partition found (1)
[  286.843781] audit: type=1804 audit(1588955438.672:54): pid=12168 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir210500229/syzkaller.5IFUhd/179/cgroup.controllers" dev="sda1" ino=15753 res=1
16:30:38 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0)
r2 = socket$nl_generic(0x10, 0x3, 0x10)
r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00')
sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r3, @ANYBLOB="21020000000000000000010000000c0099001526000004"], 0xc}}, 0x0)
r4 = socket$packet(0x11, 0x2, 0x300)
r5 = dup(r4)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
sendfile(r2, r1, 0x0, 0x100000001)

16:30:38 executing program 4:
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
add_key$user(0x0, 0x0, &(0x7f0000000780), 0x0, 0xfffffffffffffffe)
r0 = socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000180)='l2tp\x00')
sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f00000002c0)={0x0, 0xf00, &(0x7f0000000200)={&(0x7f0000000040)={0x14, r1, 0x301}, 0x14}}, 0x0)

16:30:38 executing program 3:
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
bind$bt_hci(r2, &(0x7f0000000400)={0x1f, 0xffff, 0x3}, 0x6)
write$binfmt_misc(r2, 0x0, 0xd)

16:30:38 executing program 5:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = dup3(r0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
mkdir(&(0x7f0000000280)='./file0\x00', 0x0)
mount(&(0x7f00000000c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='udf\x00', 0x0, 0x0)

16:30:38 executing program 2:
pipe(&(0x7f0000000000)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c000000020601000000000000000000000000080e0003006269746d61703a697000000005000400000000000900020073797a3000000000240007800c00028008000140ac1e00010c00018008000140a0000000050014000800000005000500020000000500010006"], 0x1}}, 0x0)
close(0xffffffffffffffff)
socket$nl_netfilter(0x10, 0x3, 0xc)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={<r3=>0xffffffffffffffff})
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
splice(r0, 0x0, r2, 0x0, 0x6209, 0x0)

16:30:38 executing program 0:
sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="054a38", @ANYRES16, @ANYBLOB="6ffe000000000000000003000000580001800d0001007564"], 0x3}}, 0x0)
sendto$unix(0xffffffffffffffff, &(0x7f0000000340)="53e0f2c2905e9916912f89b23f54185c0e90b38551c81ae3767d56fec3150cd9bd2db58e164473806c6aaaf6964a26b0de86f5fe037f85ea25f3228e5e6dc4672b11ee7418224b4bed0d668c93d4ad2a975309402c1c195f2bd1a1263e107b177c6288fe6160086efbcd133bab74435a30e5da929fcd65882c970886e36ef38c162bf17422221915d31ea852afbc6f78df1ea10fd20bd8cf77", 0x99, 0x0, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x2, [@fwd, @array, @array, @const={0xb}]}}, 0x0, 0x62}, 0x20)
select(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100686cca8000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4807, 0x0)

[  287.012494] print_req_error: I/O error, dev loop5, sector 64
[  287.019816] print_req_error: I/O error, dev loop5, sector 256
[  287.025894] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
16:30:38 executing program 3:
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
bind$bt_hci(r2, &(0x7f0000000400)={0x1f, 0xffff, 0x3}, 0x6)
write$binfmt_misc(r2, 0x0, 0xd)

[  287.055020] print_req_error: I/O error, dev loop5, sector 512
[  287.062547] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
[  287.087394] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
[  287.097675] UDF-fs: Scanning with blocksize 512 failed
16:30:39 executing program 4:
r0 = syz_open_dev$tty1(0xc, 0x4, 0x1)
ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000280))

[  287.105567] print_req_error: I/O error, dev loop5, sector 64
[  287.114459] print_req_error: I/O error, dev loop5, sector 512
[  287.120904] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
[  287.132708] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  287.144007] print_req_error: I/O error, dev loop5, sector 1024
[  287.150710] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
[  287.160019] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
16:30:39 executing program 3:
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
bind$bt_hci(r2, &(0x7f0000000400)={0x1f, 0xffff, 0x3}, 0x6)
write$binfmt_misc(r2, &(0x7f0000000080)=ANY=[], 0xd)

[  287.217112] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
[  287.220967] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock
16:30:39 executing program 4:
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_procfs(0x0, &(0x7f0000000000)='fd\x00')
r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe)
r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f0000000000)="03", 0x1, 0xfffffffffffffffd)
r2 = add_key$user(&(0x7f00000002c0)='user\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000780)="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", 0x199, 0xfffffffffffffffe)
keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00\x00\x00\x00\x00\x00\x00\x00?\x00'}})
getdents64(0xffffffffffffffff, 0x0, 0x0)

[  287.259488] UDF-fs: Scanning with blocksize 1024 failed
[  287.284530] print_req_error: I/O error, dev loop5, sector 64
[  287.298054] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
[  287.328311] EXT4-fs (loop0): no journal found
16:30:39 executing program 3:
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
bind$bt_hci(r2, &(0x7f0000000400)={0x1f, 0xffff, 0x3}, 0x6)
write$binfmt_misc(r2, &(0x7f0000000080)=ANY=[], 0xd)

[  287.351749] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
[  287.396132] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
[  287.406775] UDF-fs: Scanning with blocksize 2048 failed
[  287.418249] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
[  287.431687] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
[  287.462837] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
[  287.491638] UDF-fs: Scanning with blocksize 4096 failed
16:30:39 executing program 4:
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_procfs(0x0, &(0x7f0000000000)='fd\x00')
r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe)
r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f0000000000)="03", 0x1, 0xfffffffffffffffd)
r2 = add_key$user(&(0x7f00000002c0)='user\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000780)="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", 0x199, 0xfffffffffffffffe)
keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00\x00\x00\x00\x00\x00\x00\x00?\x00'}})
getdents64(0xffffffffffffffff, 0x0, 0x0)

[  287.522800] UDF-fs: warning (device loop5): udf_fill_super: No partition found (1)
[  288.179523] audit: type=1804 audit(1588955440.002:55): pid=12222 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir210500229/syzkaller.5IFUhd/180/cgroup.controllers" dev="sda1" ino=16351 res=1
16:30:40 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0)
r2 = socket$nl_generic(0x10, 0x3, 0x10)
r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00')
sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r3, @ANYBLOB="21020000000000000000010000000c0099001526000004"], 0xc}}, 0x0)
r4 = socket$packet(0x11, 0x2, 0x300)
r5 = dup(r4)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
sendfile(r2, r1, 0x0, 0x100000001)

16:30:40 executing program 3:
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
bind$bt_hci(r2, &(0x7f0000000400)={0x1f, 0xffff, 0x3}, 0x6)
write$binfmt_misc(r2, &(0x7f0000000080)=ANY=[], 0xd)

16:30:40 executing program 5:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = dup3(r0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
mkdir(&(0x7f0000000280)='./file0\x00', 0x0)
mount(&(0x7f00000000c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='udf\x00', 0x0, 0x0)

16:30:40 executing program 4:
r0 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40001}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x3c}}, 0x0)

16:30:40 executing program 2:
pipe(&(0x7f0000000000)={<r0=>0xffffffffffffffff})
r1 = socket$inet_udp(0x2, 0x2, 0x0)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c000000020601000000000000000000000000080e0003006269746d61703a697000000005000400000000000900020073797a3000000000240007800c00028008000140ac1e00010c00018008000140a0000000050014000800000005000500020000000500010006"], 0x1}}, 0x0)
close(r1)
socket$nl_netfilter(0x10, 0x3, 0xc)
write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={<r2=>0xffffffffffffffff})
r3 = dup(r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
splice(r0, 0x0, r1, 0x0, 0x6209, 0x0)

16:30:40 executing program 0:
sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="054a38", @ANYRES16, @ANYBLOB="6ffe000000000000000003000000580001800d0001007564"], 0x3}}, 0x0)
sendto$unix(0xffffffffffffffff, &(0x7f0000000340)="53e0f2c2905e9916912f89b23f54185c0e90b38551c81ae3767d56fec3150cd9bd2db58e164473806c6aaaf6964a26b0de86f5fe037f85ea25f3228e5e6dc4672b11ee7418224b4bed0d668c93d4ad2a975309402c1c195f2bd1a1263e107b177c6288fe6160086efbcd133bab74435a30e5da929fcd65882c970886e36ef38c162bf17422221915d31ea852afbc6f78df1ea10fd20bd8cf77", 0x99, 0x0, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x2, [@fwd, @array, @array, @const={0xb}]}}, 0x0, 0x62}, 0x20)
select(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100686cca8000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4807, 0x0)

16:30:40 executing program 3:
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
bind$bt_hci(r2, &(0x7f0000000400)={0x1f, 0xffff, 0x3}, 0x6)
write$binfmt_misc(r2, &(0x7f0000000080)=ANY=[@ANYBLOB], 0xd)

[  288.432239] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
[  288.521015] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
[  288.532066] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  288.563212] IPv6: ADDRCONF(NETDEV_UP): bond1: link is not ready
[  288.564050] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
[  288.580307] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  288.587475] 8021q: adding VLAN 0 to HW filter on device bond1
[  288.603403] UDF-fs: Scanning with blocksize 512 failed
16:30:40 executing program 3:
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
bind$bt_hci(r2, &(0x7f0000000400)={0x1f, 0xffff, 0x3}, 0x6)
write$binfmt_misc(r2, &(0x7f0000000080)=ANY=[@ANYBLOB], 0xd)

16:30:40 executing program 4:
prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0)
r0 = getpid()
sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
recvmmsg(r1, &(0x7f0000000780)=[{{0x0, 0x0, &(0x7f0000000580)}, 0x2}, {{&(0x7f0000001a80)=@un=@abs, 0x80, &(0x7f0000004000)=[{0x0}, {&(0x7f0000002b80)=""/204, 0xcc}, {0x0}, {&(0x7f0000003e00)=""/80, 0x50}, {0x0}, {0x0}], 0x6, &(0x7f0000000100)=""/80, 0x50}, 0x6}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000005540)=""/221, 0xdd}, 0x6}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}, 0x9}, {{0x0, 0x0, 0x0}}], 0x6, 0x100, 0x0)
pipe(&(0x7f00000000c0)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
fcntl$setpipe(r3, 0x407, 0x0)
write(r3, &(0x7f0000000340), 0x41395527)
vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x3}, 0x0)
perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0xfe, 0x0, 0x0, 0x0, 0x0, 0xc80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x4, @perf_config_ext={0x5}, 0x0, 0x2, 0x0, 0x4, 0x0, 0x2}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3a8, 0x0)
clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r4 = socket(0x10, 0x3, 0x0)
write(r4, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c)
recvmmsg(r4, &(0x7f0000002ec0), 0x400000000000ec0, 0x2, &(0x7f00000001c0)={0x77359400})

[  288.633051] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  288.647646] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
16:30:40 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0)
r2 = socket$nl_generic(0x10, 0x3, 0x10)
r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00')
sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r3, @ANYBLOB="21020000000000000000010000000c0099001526000004"], 0xc}}, 0x0)
r4 = socket$packet(0x11, 0x2, 0x300)
r5 = dup(r4)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
sendfile(r2, r1, 0x0, 0x100000001)

[  288.718694] EXT4-fs (loop0): no journal found
[  288.734100] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
[  288.804773] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
[  288.853312] UDF-fs: Scanning with blocksize 1024 failed
16:30:40 executing program 3:
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
bind$bt_hci(r2, &(0x7f0000000400)={0x1f, 0xffff, 0x3}, 0x6)
write$binfmt_misc(r2, &(0x7f0000000080)=ANY=[@ANYBLOB], 0xd)

16:30:40 executing program 4:
prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0)
r0 = getpid()
sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
recvmmsg(r1, &(0x7f0000000780)=[{{0x0, 0x0, &(0x7f0000000580)}, 0x2}, {{&(0x7f0000001a80)=@un=@abs, 0x80, &(0x7f0000004000)=[{0x0}, {&(0x7f0000002b80)=""/204, 0xcc}, {0x0}, {&(0x7f0000003e00)=""/80, 0x50}, {0x0}, {0x0}], 0x6, &(0x7f0000000100)=""/80, 0x50}, 0x6}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000005540)=""/221, 0xdd}, 0x6}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}, 0x9}, {{0x0, 0x0, 0x0}}], 0x6, 0x100, 0x0)
pipe(&(0x7f00000000c0)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
fcntl$setpipe(r3, 0x407, 0x0)
write(r3, &(0x7f0000000340), 0x41395527)
vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x3}, 0x0)
perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0xfe, 0x0, 0x0, 0x0, 0x0, 0xc80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x4, @perf_config_ext={0x5}, 0x0, 0x2, 0x0, 0x4, 0x0, 0x2}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3a8, 0x0)
clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r4 = socket(0x10, 0x3, 0x0)
write(r4, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c)
recvmmsg(r4, &(0x7f0000002ec0), 0x400000000000ec0, 0x2, &(0x7f00000001c0)={0x77359400})

[  289.005462] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
[  289.122246] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
16:30:41 executing program 0:
sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="054a38", @ANYRES16, @ANYBLOB="6ffe000000000000000003000000580001800d0001007564"], 0x3}}, 0x0)
sendto$unix(0xffffffffffffffff, &(0x7f0000000340)="53e0f2c2905e9916912f89b23f54185c0e90b38551c81ae3767d56fec3150cd9bd2db58e164473806c6aaaf6964a26b0de86f5fe037f85ea25f3228e5e6dc4672b11ee7418224b4bed0d668c93d4ad2a975309402c1c195f2bd1a1263e107b177c6288fe6160086efbcd133bab74435a30e5da929fcd65882c970886e36ef38c162bf17422221915d31ea852afbc6f78df1ea10fd20bd8cf77e4", 0x9a, 0x0, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x2, [@fwd, @array, @array, @const={0xb}]}}, 0x0, 0x62}, 0x20)
select(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100686cca8000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4807, 0x0)

16:30:41 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0)
r2 = socket$nl_generic(0x10, 0x3, 0x10)
r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00')
sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r3, @ANYBLOB="21020000000000000000010000000c0099001526000004"], 0xc}}, 0x0)
r4 = socket$packet(0x11, 0x2, 0x300)
r5 = dup(r4)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
sendfile(r2, r1, 0x0, 0x100000001)

[  289.184756] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
[  289.242621] UDF-fs: Scanning with blocksize 2048 failed
[  289.248641] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
[  289.275397] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
[  289.328637] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
[  289.435815] UDF-fs: Scanning with blocksize 4096 failed
[  289.542487] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  289.547944] UDF-fs: warning (device loop5): udf_fill_super: No partition found (1)
[  289.557003] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
16:30:41 executing program 5:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = dup3(r0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
mkdir(&(0x7f0000000280)='./file0\x00', 0x0)
mount(&(0x7f00000000c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='udf\x00', 0x0, 0x0)

16:30:41 executing program 2:
pipe(&(0x7f0000000000)={<r0=>0xffffffffffffffff})
r1 = socket$inet_udp(0x2, 0x2, 0x0)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c000000020601000000000000000000000000080e0003006269746d61703a697000000005000400000000000900020073797a3000000000240007800c00028008000140ac1e00010c00018008000140a0000000050014000800000005000500020000000500010006"], 0x1}}, 0x0)
close(r1)
socket$nl_netfilter(0x10, 0x3, 0xc)
write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={<r2=>0xffffffffffffffff})
r3 = dup(r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
splice(r0, 0x0, r1, 0x0, 0x6209, 0x0)

16:30:41 executing program 3:
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
bind$bt_hci(r2, &(0x7f0000000400)={0x1f, 0xffff, 0x3}, 0x6)
write$binfmt_misc(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8100ff"], 0xd)

16:30:41 executing program 4:
syslog(0x2, &(0x7f0000000500)=""/52, 0x34)

[  289.607869] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  289.621933] EXT4-fs (loop0): no journal found
16:30:41 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0)
r2 = socket$nl_generic(0x10, 0x3, 0x10)
r3 = syz_genetlink_get_family_id$nl80211(0x0)
sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r3, @ANYBLOB="21020000000000000000010000000c0099001526000004"], 0xc}}, 0x0)
r4 = socket$packet(0x11, 0x2, 0x300)
r5 = dup(r4)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
sendfile(r2, r1, 0x0, 0x100000001)

16:30:41 executing program 3:
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
bind$bt_hci(r2, &(0x7f0000000400)={0x1f, 0xffff, 0x3}, 0x6)
write$binfmt_misc(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8100ff"], 0xd)

[  289.784415] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
[  289.815319] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
16:30:41 executing program 3:
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
bind$bt_hci(r2, &(0x7f0000000400)={0x1f, 0xffff, 0x3}, 0x6)
write$binfmt_misc(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8100ff"], 0xd)

[  289.838672] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
[  289.897635] UDF-fs: Scanning with blocksize 512 failed
16:30:41 executing program 3:
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
bind$bt_hci(r2, &(0x7f0000000400)={0x1f, 0xffff, 0x3}, 0x6)
write$binfmt_misc(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8100fffe"], 0xd)

[  289.925298] audit: type=1804 audit(1588955441.752:56): pid=12344 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir210500229/syzkaller.5IFUhd/184/cgroup.controllers" dev="sda1" ino=16369 res=1
[  289.964936] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
16:30:41 executing program 4:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
ioctl$KVM_IOEVENTFD(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x2]})

[  290.021739] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
16:30:41 executing program 3:
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
bind$bt_hci(r2, &(0x7f0000000400)={0x1f, 0xffff, 0x3}, 0x6)
write$binfmt_misc(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8100fffe"], 0xd)

[  290.074304] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
16:30:42 executing program 0:
sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="054a38", @ANYRES16, @ANYBLOB="6ffe000000000000000003000000580001800d0001007564"], 0x3}}, 0x0)
sendto$unix(0xffffffffffffffff, &(0x7f0000000340)="53e0f2c2905e9916912f89b23f54185c0e90b38551c81ae3767d56fec3150cd9bd2db58e164473806c6aaaf6964a26b0de86f5fe037f85ea25f3228e5e6dc4672b11ee7418224b4bed0d668c93d4ad2a975309402c1c195f2bd1a1263e107b177c6288fe6160086efbcd133bab74435a30e5da929fcd65882c970886e36ef38c162bf17422221915d31ea852afbc6f78df1ea10fd20bd8cf77e4", 0x9a, 0x0, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x2, [@fwd, @array, @array, @const={0xb}]}}, 0x0, 0x62}, 0x20)
select(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100686cca8000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4807, 0x0)

[  290.131847] UDF-fs: Scanning with blocksize 1024 failed
16:30:42 executing program 3:
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
bind$bt_hci(r2, &(0x7f0000000400)={0x1f, 0xffff, 0x3}, 0x6)
write$binfmt_misc(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8100fffe"], 0xd)

[  290.198074] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
[  290.260381] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
[  290.340240] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
[  290.364750] UDF-fs: Scanning with blocksize 2048 failed
[  290.386819] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  290.411062] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
[  290.433051] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  290.449911] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
[  290.468369] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  290.499155] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
[  290.533050] UDF-fs: Scanning with blocksize 4096 failed
[  290.541433] EXT4-fs (loop0): no journal found
16:30:42 executing program 5:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
dup3(r0, r1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
mkdir(&(0x7f0000000280)='./file0\x00', 0x0)
mount(&(0x7f00000000c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='udf\x00', 0x0, 0x0)

16:30:42 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0)
r2 = socket$nl_generic(0x10, 0x3, 0x10)
r3 = syz_genetlink_get_family_id$nl80211(0x0)
sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r3, @ANYBLOB="21020000000000000000010000000c0099001526000004"], 0xc}}, 0x0)
r4 = socket$packet(0x11, 0x2, 0x300)
r5 = dup(r4)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
sendfile(r2, r1, 0x0, 0x100000001)

16:30:42 executing program 4:
socket$inet_dccp(0x2, 0x6, 0x0)
perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getpid()
getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000080)={@private2, 0x0, 0x0, 0x0, 0x7}, 0x0)
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f00000003c0)=""/186)
syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0xffffffffffffffb5}], 0xaaaac44, 0x0, 0x0, 0xfffffe41)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000140)={[0x150, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5e]})
ioctl$KVM_RUN(r2, 0xae80, 0x0)
perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$KVM_RUN(r2, 0xae80, 0x0)

16:30:42 executing program 3:
r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0)
poll(&(0x7f0000000000)=[{r0}], 0x1, 0x9)

16:30:42 executing program 2:
pipe(&(0x7f0000000000)={<r0=>0xffffffffffffffff})
r1 = socket$inet_udp(0x2, 0x2, 0x0)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c000000020601000000000000000000000000080e0003006269746d61703a697000000005000400000000000900020073797a3000000000240007800c00028008000140ac1e00010c00018008000140a0000000050014000800000005000500020000000500010006"], 0x1}}, 0x0)
close(r1)
socket$nl_netfilter(0x10, 0x3, 0xc)
write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={<r2=>0xffffffffffffffff})
r3 = dup(r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
splice(r0, 0x0, r1, 0x0, 0x6209, 0x0)

[  290.571151] UDF-fs: warning (device loop5): udf_fill_super: No partition found (1)
[  290.697552] audit: type=1400 audit(1588955442.522:57): avc:  denied  { create } for  pid=12376 comm="syz-executor.4" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dccp_socket permissive=1
16:30:42 executing program 3:
r0 = socket$inet6_sctp(0xa, 0x5, 0x84)
getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000040)={0x0, 0xfffffca5, &(0x7f0000000300)=[@in={0x2, 0x0, @dev}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, @in={0x2, 0x0, @multicast2}, @in={0x2, 0x0, @loopback}, @in6={0xa, 0x0, 0x0, @dev}, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6={0xa, 0x0, 0x0, @mcast1}]}, &(0x7f0000000180)=0x10)

[  290.781745] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
[  290.812833] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
[  290.842358] audit: type=1804 audit(1588955442.672:58): pid=12389 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir210500229/syzkaller.5IFUhd/185/cgroup.controllers" dev="sda1" ino=16370 res=1
[  290.855756] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
16:30:42 executing program 3:
connect$inet(0xffffffffffffffff, &(0x7f0000772000), 0x10)
perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getpid()
getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000080)={@private2, 0x0, 0x0, 0x0, 0x7}, 0x0)
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0xffffffffffffffb5}], 0xaaaac44, 0x0, 0x0, 0xfffffe41)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000140)={[0x150, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5e]})
getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, &(0x7f00000000c0)=0x6b)
ioctl$KVM_RUN(r2, 0xae80, 0x0)
perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20021, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$KVM_RUN(r2, 0xae80, 0x0)

16:30:42 executing program 4:
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000000)='fd\x00')
getdents64(r0, &(0x7f0000000380)=""/87, 0x1f7)
socket$inet6_tcp(0xa, 0x1, 0x0)
openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0)

[  290.975301] UDF-fs: Scanning with blocksize 512 failed
[  291.019783] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
16:30:42 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0)
r2 = socket$nl_generic(0x10, 0x3, 0x10)
r3 = syz_genetlink_get_family_id$nl80211(0x0)
sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r3, @ANYBLOB="21020000000000000000010000000c0099001526000004"], 0xc}}, 0x0)
r4 = socket$packet(0x11, 0x2, 0x300)
r5 = dup(r4)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
sendfile(r2, r1, 0x0, 0x100000001)

16:30:42 executing program 0:
sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="054a38", @ANYRES16, @ANYBLOB="6ffe000000000000000003000000580001800d0001007564"], 0x3}}, 0x0)
sendto$unix(0xffffffffffffffff, &(0x7f0000000340)="53e0f2c2905e9916912f89b23f54185c0e90b38551c81ae3767d56fec3150cd9bd2db58e164473806c6aaaf6964a26b0de86f5fe037f85ea25f3228e5e6dc4672b11ee7418224b4bed0d668c93d4ad2a975309402c1c195f2bd1a1263e107b177c6288fe6160086efbcd133bab74435a30e5da929fcd65882c970886e36ef38c162bf17422221915d31ea852afbc6f78df1ea10fd20bd8cf77e4", 0x9a, 0x0, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x2, [@fwd, @array, @array, @const={0xb}]}}, 0x0, 0x62}, 0x20)
select(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100686cca8000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4807, 0x0)

[  291.074677] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
[  291.105711] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
[  291.161723] UDF-fs: Scanning with blocksize 1024 failed
16:30:43 executing program 4:
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000000)='fd\x00')
getdents64(r0, &(0x7f0000000380)=""/87, 0x1f7)
socket$inet6_tcp(0xa, 0x1, 0x0)
openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0)

[  291.219424] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
[  291.270364] print_req_error: 37 callbacks suppressed
[  291.270373] print_req_error: I/O error, dev loop5, sector 2048
[  291.283423] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
[  291.327558] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
[  291.371278] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  291.399920] UDF-fs: Scanning with blocksize 2048 failed
16:30:43 executing program 3:

[  291.413696] audit: type=1804 audit(1588955443.242:59): pid=12429 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir210500229/syzkaller.5IFUhd/186/cgroup.controllers" dev="sda1" ino=16338 res=1
[  291.448593] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  291.467531] print_req_error: I/O error, dev loop5, sector 64
[  291.475045] print_req_error: I/O error, dev loop5, sector 2048
[  291.482986] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
[  291.541750] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  291.569829] print_req_error: I/O error, dev loop5, sector 4096
[  291.576153] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
[  291.592182] EXT4-fs (loop0): no journal found
[  291.613179] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
[  291.630683] UDF-fs: Scanning with blocksize 4096 failed
[  291.642535] UDF-fs: warning (device loop5): udf_fill_super: No partition found (1)
16:30:43 executing program 5:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
dup3(r0, r1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
mkdir(&(0x7f0000000280)='./file0\x00', 0x0)
mount(&(0x7f00000000c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='udf\x00', 0x0, 0x0)

16:30:43 executing program 4:

16:30:43 executing program 2:
pipe(&(0x7f0000000000)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c000000020601000000000000000000000000080e0003006269746d61703a697000000005000400000000000900020073797a3000000000240007800c00028008000140ac1e00010c00018008000140a0000000050014000800000005000500020000000500010006"], 0x1}}, 0x0)
close(r2)
socket$nl_netfilter(0x10, 0x3, 0xc)
write$binfmt_misc(r1, 0x0, 0x4240a2a0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={<r3=>0xffffffffffffffff})
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
splice(r0, 0x0, r2, 0x0, 0x6209, 0x0)

16:30:43 executing program 3:
clone(0x26102900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
openat$adsp1(0xffffffffffffff9c, &(0x7f0000000100)='/dev/adsp1\x00', 0x4880, 0x0)

16:30:43 executing program 4:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
r3 = dup(r2)
syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x47)

16:30:43 executing program 3:
r0 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=@newlink={0x34, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40001}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0)

16:30:43 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0)
r2 = socket$nl_generic(0x10, 0x3, 0x10)
syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00')
sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0)
r3 = socket$packet(0x11, 0x2, 0x300)
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
sendfile(r2, r1, 0x0, 0x100000001)

[  291.840021] print_req_error: I/O error, dev loop5, sector 64
[  291.847716] print_req_error: I/O error, dev loop5, sector 256
[  291.856110] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
[  291.935425] print_req_error: I/O error, dev loop5, sector 512
[  291.943654] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
[  291.974761] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
[  291.988898] UDF-fs: Scanning with blocksize 512 failed
16:30:43 executing program 0:
sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="054a38", @ANYRES16, @ANYBLOB="6ffe000000000000000003000000580001800d0001007564"], 0x3}}, 0x0)
sendto$unix(0xffffffffffffffff, &(0x7f0000000340)="53e0f2c2905e9916912f89b23f54185c0e90b38551c81ae3767d56fec3150cd9bd2db58e164473806c6aaaf6964a26b0de86f5fe037f85ea25f3228e5e6dc4672b11ee7418224b4bed0d668c93d4ad2a975309402c1c195f2bd1a1263e107b177c6288fe6160086efbcd133bab74435a30e5da929fcd65882c970886e36ef38c162bf17422221915d31ea852afbc6f78df1ea10fd20bd8cf77e433", 0x9b, 0x0, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
select(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100686cca8000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4807, 0x0)

[  292.034658] print_req_error: I/O error, dev loop5, sector 64
[  292.048507] print_req_error: I/O error, dev loop5, sector 512
[  292.073425] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
[  292.112934] IPv6: ADDRCONF(NETDEV_UP): bond2: link is not ready
[  292.122649] print_req_error: I/O error, dev loop5, sector 1024
[  292.133679] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
16:30:44 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet(0x2, 0x1, 0x0)
sendmsg$RDMA_NLDEV_CMD_RES_GET(0xffffffffffffffff, 0x0, 0x20000000)
bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r0, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10)
setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='veth0_virt_wifi\x00', 0x10)
sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37)

[  292.165933] audit: type=1804 audit(1588955443.992:60): pid=12501 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir210500229/syzkaller.5IFUhd/187/cgroup.controllers" dev="sda1" ino=16376 res=1
[  292.169754] 8021q: adding VLAN 0 to HW filter on device bond2
[  292.216636] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
[  292.253000] UDF-fs: Scanning with blocksize 1024 failed
16:30:44 executing program 3:

[  292.283816] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  292.307281] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
[  292.377967] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  292.416948] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  292.454309] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
[  292.477590] EXT4-fs (loop0): invalid journal inode
16:30:44 executing program 3:

16:30:44 executing program 2:
pipe(&(0x7f0000000000)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c000000020601000000000000000000000000080e0003006269746d61703a697000000005000400000000000900020073797a3000000000240007800c00028008000140ac1e00010c00018008000140a0000000050014000800000005000500020000000500010006"], 0x1}}, 0x0)
close(r2)
socket$nl_netfilter(0x10, 0x3, 0xc)
write$binfmt_misc(r1, 0x0, 0x4240a2a0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={<r3=>0xffffffffffffffff})
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
splice(r0, 0x0, r2, 0x0, 0x6209, 0x0)

[  292.512156] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
[  292.548445] UDF-fs: Scanning with blocksize 2048 failed
[  292.594900] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
[  292.675377] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
16:30:44 executing program 5:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
dup3(r0, r1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
mkdir(&(0x7f0000000280)='./file0\x00', 0x0)
mount(&(0x7f00000000c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='udf\x00', 0x0, 0x0)

16:30:44 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0)
r2 = socket$nl_generic(0x10, 0x3, 0x10)
syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00')
sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0)
r3 = socket$packet(0x11, 0x2, 0x300)
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
sendfile(r2, r1, 0x0, 0x100000001)

16:30:44 executing program 3:

16:30:44 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet(0x2, 0x1, 0x0)
sendmsg$RDMA_NLDEV_CMD_RES_GET(0xffffffffffffffff, 0x0, 0x20000000)
bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r0, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10)
setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='veth0_virt_wifi\x00', 0x10)
sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37)

[  292.741009] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
[  292.757783] UDF-fs: Scanning with blocksize 4096 failed
[  292.765491] UDF-fs: warning (device loop5): udf_fill_super: No partition found (1)
16:30:44 executing program 3:

[  292.922907] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
[  292.946861] audit: type=1804 audit(1588955444.772:61): pid=12529 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir210500229/syzkaller.5IFUhd/188/cgroup.controllers" dev="sda1" ino=16375 res=1
16:30:44 executing program 0:
sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="054a38", @ANYRES16, @ANYBLOB="6ffe000000000000000003000000580001800d0001007564"], 0x3}}, 0x0)
sendto$unix(0xffffffffffffffff, &(0x7f0000000340)="53e0f2c2905e9916912f89b23f54185c0e90b38551c81ae3767d56fec3150cd9bd2db58e164473806c6aaaf6964a26b0de86f5fe037f85ea25f3228e5e6dc4672b11ee7418224b4bed0d668c93d4ad2a975309402c1c195f2bd1a1263e107b177c6288fe6160086efbcd133bab74435a30e5da929fcd65882c970886e36ef38c162bf17422221915d31ea852afbc6f78df1ea10fd20bd8cf77e433", 0x9b, 0x0, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
select(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100686cca8000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4807, 0x0)

16:30:44 executing program 3:

[  292.960524] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
[  293.061823] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
[  293.095192] UDF-fs: Scanning with blocksize 512 failed
16:30:45 executing program 3:

[  293.125982] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
[  293.178307] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
16:30:45 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0)
r2 = socket$nl_generic(0x10, 0x3, 0x10)
syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00')
sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0)
r3 = socket$packet(0x11, 0x2, 0x300)
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
sendfile(r2, r1, 0x0, 0x100000001)

[  293.248273] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
[  293.274906] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  293.293342] UDF-fs: Scanning with blocksize 1024 failed
16:30:45 executing program 3:

[  293.310093] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  293.326279] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
16:30:45 executing program 4:

[  293.369675] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  293.393400] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
[  293.425473] EXT4-fs (loop0): invalid journal inode
16:30:45 executing program 2:
pipe(&(0x7f0000000000)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c000000020601000000000000000000000000080e0003006269746d61703a697000000005000400000000000900020073797a3000000000240007800c00028008000140ac1e00010c00018008000140a0000000050014000800000005000500020000000500010006"], 0x1}}, 0x0)
close(r2)
socket$nl_netfilter(0x10, 0x3, 0xc)
write$binfmt_misc(r1, 0x0, 0x4240a2a0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={<r3=>0xffffffffffffffff})
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
splice(r0, 0x0, r2, 0x0, 0x6209, 0x0)

[  293.446228] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
[  293.457957] audit: type=1804 audit(1588955445.282:62): pid=12546 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir210500229/syzkaller.5IFUhd/189/cgroup.controllers" dev="sda1" ino=15759 res=1
[  293.480810] UDF-fs: Scanning with blocksize 2048 failed
[  293.552745] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
[  293.586475] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
16:30:45 executing program 5:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
r2 = dup3(r0, r1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0)
mkdir(&(0x7f0000000280)='./file0\x00', 0x0)
mount(&(0x7f00000000c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='udf\x00', 0x0, 0x0)

16:30:45 executing program 3:

16:30:45 executing program 4:

[  293.611555] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
[  293.623273] UDF-fs: Scanning with blocksize 4096 failed
[  293.634874] UDF-fs: warning (device loop5): udf_fill_super: No partition found (1)
16:30:45 executing program 3:

16:30:45 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0)
r2 = socket$nl_generic(0x10, 0x3, 0x10)
syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00')
sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0)
r3 = socket$packet(0x11, 0x2, 0x300)
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
sendfile(r2, r1, 0x0, 0x100000001)

[  293.821603] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
[  293.857658] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
[  293.886482] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
[  293.900458] UDF-fs: Scanning with blocksize 512 failed
[  293.906540] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
[  293.923991] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
16:30:45 executing program 0:
sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="054a38", @ANYRES16, @ANYBLOB="6ffe000000000000000003000000580001800d0001007564"], 0x3}}, 0x0)
sendto$unix(0xffffffffffffffff, &(0x7f0000000340)="53e0f2c2905e9916912f89b23f54185c0e90b38551c81ae3767d56fec3150cd9bd2db58e164473806c6aaaf6964a26b0de86f5fe037f85ea25f3228e5e6dc4672b11ee7418224b4bed0d668c93d4ad2a975309402c1c195f2bd1a1263e107b177c6288fe6160086efbcd133bab74435a30e5da929fcd65882c970886e36ef38c162bf17422221915d31ea852afbc6f78df1ea10fd20bd8cf77e433", 0x9b, 0x0, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
select(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100686cca8000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4807, 0x0)

16:30:45 executing program 4:

16:30:45 executing program 3:

[  293.934453] audit: type=1804 audit(1588955445.762:63): pid=12564 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir210500229/syzkaller.5IFUhd/190/cgroup.controllers" dev="sda1" ino=16338 res=1
[  293.993939] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
[  294.050091] UDF-fs: Scanning with blocksize 1024 failed
16:30:45 executing program 3:

16:30:45 executing program 4:

[  294.075087] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
[  294.126320] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
16:30:46 executing program 3:

[  294.180893] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
[  294.193357] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  294.208665] UDF-fs: Scanning with blocksize 2048 failed
[  294.253135] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
[  294.258766] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  294.317124] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
[  294.328471] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock
16:30:46 executing program 2:
pipe(&(0x7f0000000000)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c000000020601000000000000000000000000080e0003006269746d61703a697000000005000400000000000900020073797a3000000000240007800c00028008000140ac1e00010c00018008000140a0000000050014000800000005000500020000000500010006"], 0x1}}, 0x0)
close(r2)
socket$nl_netfilter(0x10, 0x3, 0xc)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={<r3=>0xffffffffffffffff})
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
splice(r0, 0x0, r2, 0x0, 0x6209, 0x0)

[  294.360861] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
[  294.368169] EXT4-fs (loop0): invalid journal inode
16:30:46 executing program 5:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
r2 = dup3(r0, r1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0)
mkdir(&(0x7f0000000280)='./file0\x00', 0x0)
mount(&(0x7f00000000c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='udf\x00', 0x0, 0x0)

16:30:46 executing program 4:

16:30:46 executing program 3:

16:30:46 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0)
r2 = socket$nl_generic(0x10, 0x3, 0x10)
syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00')
sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0)
r3 = socket$packet(0x11, 0x2, 0x300)
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
sendfile(r2, r1, 0x0, 0x100000001)

[  294.443641] UDF-fs: Scanning with blocksize 4096 failed
[  294.450918] UDF-fs: warning (device loop5): udf_fill_super: No partition found (1)
16:30:46 executing program 3:

[  294.645524] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
[  294.659889] audit: type=1804 audit(1588955446.482:64): pid=12594 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir210500229/syzkaller.5IFUhd/191/cgroup.controllers" dev="sda1" ino=16383 res=1
[  294.700370] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
[  294.731275] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
[  294.756887] UDF-fs: Scanning with blocksize 512 failed
[  294.776373] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
[  294.821697] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
[  294.857103] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
16:30:46 executing program 0:
sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="054a38", @ANYRES16, @ANYBLOB="6ffe000000000000000003000000580001800d0001007564"], 0x3}}, 0x0)
sendto$unix(0xffffffffffffffff, &(0x7f0000000340)="53e0f2c2905e9916912f89b23f54185c0e90b38551c81ae3767d56fec3150cd9bd2db58e164473806c6aaaf6964a26b0de86f5fe037f85ea25f3228e5e6dc4672b11ee7418224b4bed0d668c93d4ad2a975309402c1c195f2bd1a1263e107b177c6288fe6160086efbcd133bab74435a30e5da929fcd65882c970886e36ef38c162bf17422221915d31ea852afbc6f78df1ea10fd20bd8cf77e433", 0x9b, 0x0, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20)
select(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100686cca8000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4807, 0x0)

16:30:46 executing program 4:

16:30:46 executing program 3:

16:30:46 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0)
r2 = socket$nl_generic(0x10, 0x3, 0x10)
syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00')
sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0)
r3 = socket$packet(0x11, 0x2, 0x300)
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
sendfile(r2, r1, 0x0, 0x100000001)

[  294.876625] UDF-fs: Scanning with blocksize 1024 failed
[  294.892888] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
16:30:46 executing program 3:

16:30:46 executing program 4:

[  294.967370] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
[  295.003803] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
[  295.051626] UDF-fs: Scanning with blocksize 2048 failed
[  295.075007] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
[  295.111937] audit: type=1804 audit(1588955446.942:65): pid=12610 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir210500229/syzkaller.5IFUhd/192/cgroup.controllers" dev="sda1" ino=15759 res=1
[  295.127837] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
[  295.144231] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  295.194602] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  295.226546] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
[  295.231147] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock
16:30:47 executing program 2:
pipe(&(0x7f0000000000)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c000000020601000000000000000000000000080e0003006269746d61703a697000000005000400000000000900020073797a3000000000240007800c00028008000140ac1e00010c00018008000140a0000000050014000800000005000500020000000500010006"], 0x1}}, 0x0)
close(r2)
socket$nl_netfilter(0x10, 0x3, 0xc)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={<r3=>0xffffffffffffffff})
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
splice(r0, 0x0, r2, 0x0, 0x6209, 0x0)

[  295.260007] EXT4-fs (loop0): invalid journal inode
[  295.264483] UDF-fs: Scanning with blocksize 4096 failed
[  295.291314] UDF-fs: warning (device loop5): udf_fill_super: No partition found (1)
16:30:47 executing program 5:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
r2 = dup3(r0, r1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0)
mkdir(&(0x7f0000000280)='./file0\x00', 0x0)
mount(&(0x7f00000000c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='udf\x00', 0x0, 0x0)

16:30:47 executing program 3:

16:30:47 executing program 4:

16:30:47 executing program 3:

16:30:47 executing program 4:

[  295.482522] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
[  295.524870] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
[  295.577592] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
[  295.610851] UDF-fs: Scanning with blocksize 512 failed
[  295.630846] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
[  295.658092] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
[  295.668205] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
[  295.683126] UDF-fs: Scanning with blocksize 1024 failed
[  295.697048] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
[  295.721187] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
[  295.736154] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
[  295.745212] UDF-fs: Scanning with blocksize 2048 failed
[  295.757020] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=256, location=256
[  295.769793] UDF-fs: error (device loop5): udf_read_tagged: read failed, block=512, location=512
16:30:47 executing program 0:
sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="054a38", @ANYRES16, @ANYBLOB="6ffe000000000000000003000000580001800d0001007564"], 0x3}}, 0x0)
sendto$unix(0xffffffffffffffff, &(0x7f0000000340)="53e0f2c2905e9916912f89b23f54185c0e90b38551c81ae3767d56fec3150cd9bd2db58e164473806c6aaaf6964a26b0de86f5fe037f85ea25f3228e5e6dc4672b11ee7418224b4bed0d668c93d4ad2a975309402c1c195f2bd1a1263e107b177c6288fe6160086efbcd133bab74435a30e5da929fcd65882c970886e36ef38c162bf17422221915d31ea852afbc6f78df1ea10fd20bd8cf77e433", 0x9b, 0x0, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20)
select(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100686cca8000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4807, 0x0)

16:30:47 executing program 3:

16:30:47 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0)
r2 = socket$nl_generic(0x10, 0x3, 0x10)
syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00')
sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={0x0, 0xc}}, 0x0)
r3 = socket$packet(0x11, 0x2, 0x300)
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
sendfile(r2, r1, 0x0, 0x100000001)

16:30:47 executing program 4:

16:30:47 executing program 5:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
r2 = dup3(r0, r1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
mkdir(0x0, 0x0)
mount(&(0x7f00000000c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='udf\x00', 0x0, 0x0)

[  295.779927] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found
[  295.787249] UDF-fs: Scanning with blocksize 4096 failed
[  295.794720] UDF-fs: warning (device loop5): udf_fill_super: No partition found (1)
16:30:47 executing program 3:

[  295.984281] audit: type=1804 audit(1588955447.812:66): pid=12645 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir210500229/syzkaller.5IFUhd/193/cgroup.controllers" dev="sda1" ino=16381 res=1
[  296.012717] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  296.046152] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  296.087990] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  296.110899] EXT4-fs (loop0): invalid journal inode
16:30:48 executing program 2:
pipe(&(0x7f0000000000)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c000000020601000000000000000000000000080e0003006269746d61703a697000000005000400000000000900020073797a3000000000240007800c00028008000140ac1e00010c00018008000140a0000000050014000800000005000500020000000500010006"], 0x1}}, 0x0)
close(r2)
socket$nl_netfilter(0x10, 0x3, 0xc)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={<r3=>0xffffffffffffffff})
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
splice(r0, 0x0, r2, 0x0, 0x6209, 0x0)

16:30:48 executing program 4:

16:30:48 executing program 5:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
r2 = dup3(r0, r1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
mkdir(0x0, 0x0)
mount(&(0x7f00000000c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='udf\x00', 0x0, 0x0)

16:30:48 executing program 3:

16:30:48 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0)
r2 = socket$nl_generic(0x10, 0x3, 0x10)
syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00')
sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={0x0, 0xc}}, 0x0)
r3 = socket$packet(0x11, 0x2, 0x300)
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
sendfile(r2, r1, 0x0, 0x100000001)

16:30:48 executing program 4:

[  296.465662] audit: type=1804 audit(1588955448.293:67): pid=12668 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir210500229/syzkaller.5IFUhd/194/cgroup.controllers" dev="sda1" ino=16396 res=1
16:30:48 executing program 0:
sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="054a38", @ANYRES16, @ANYBLOB="6ffe000000000000000003000000580001800d0001007564"], 0x3}}, 0x0)
sendto$unix(0xffffffffffffffff, &(0x7f0000000340)="53e0f2c2905e9916912f89b23f54185c0e90b38551c81ae3767d56fec3150cd9bd2db58e164473806c6aaaf6964a26b0de86f5fe037f85ea25f3228e5e6dc4672b11ee7418224b4bed0d668c93d4ad2a975309402c1c195f2bd1a1263e107b177c6288fe6160086efbcd133bab74435a30e5da929fcd65882c970886e36ef38c162bf17422221915d31ea852afbc6f78df1ea10fd20bd8cf77e433", 0x9b, 0x0, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20)
select(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100686cca8000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4807, 0x0)

16:30:48 executing program 5:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
r2 = dup3(r0, r1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
mkdir(0x0, 0x0)
mount(&(0x7f00000000c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='udf\x00', 0x0, 0x0)

16:30:48 executing program 3:

16:30:48 executing program 4:

16:30:48 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0)
r2 = socket$nl_generic(0x10, 0x3, 0x10)
syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00')
sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={0x0, 0xc}}, 0x0)
r3 = socket$packet(0x11, 0x2, 0x300)
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
sendfile(r2, r1, 0x0, 0x100000001)

16:30:48 executing program 3:

[  296.900152] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  296.929269] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  296.962005] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  296.985509] audit: type=1804 audit(1588955448.813:68): pid=12692 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir210500229/syzkaller.5IFUhd/195/cgroup.controllers" dev="sda1" ino=16338 res=1
[  297.016021] EXT4-fs (loop0): invalid journal inode
16:30:49 executing program 2:
pipe(&(0x7f0000000000)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c000000020601000000000000000000000000080e0003006269746d61703a697000000005000400000000000900020073797a3000000000240007800c00028008000140ac1e00010c00018008000140a0000000050014000800000005000500020000000500010006"], 0x1}}, 0x0)
close(r2)
socket$nl_netfilter(0x10, 0x3, 0xc)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socketpair$unix(0x1, 0x1, 0x0, 0x0)
r3 = dup(0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
splice(r0, 0x0, r2, 0x0, 0x6209, 0x0)

16:30:49 executing program 5:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
r2 = dup3(r0, r1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
mkdir(&(0x7f0000000280)='./file0\x00', 0x0)
mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='udf\x00', 0x0, 0x0)

16:30:49 executing program 4:

16:30:49 executing program 3:

16:30:49 executing program 5:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
r2 = dup3(r0, r1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
mkdir(&(0x7f0000000280)='./file0\x00', 0x0)
mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='udf\x00', 0x0, 0x0)

16:30:49 executing program 4:

16:30:49 executing program 0:
sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="054a38", @ANYRES16, @ANYBLOB="6ffe000000000000000003000000580001800d0001007564"], 0x3}}, 0x0)
sendto$unix(0xffffffffffffffff, &(0x7f0000000340)="53e0f2c2905e9916912f89b23f54185c0e90b38551c81ae3767d56fec3150cd9bd2db58e164473806c6aaaf6964a26b0de86f5fe037f85ea25f3228e5e6dc4672b11ee7418224b4bed0d668c93d4ad2a975309402c1c195f2bd1a1263e107b177c6288fe6160086efbcd133bab74435a30e5da929fcd65882c970886e36ef38c162bf17422221915d31ea852afbc6f78df1ea10fd20bd8cf77e433", 0x9b, 0x0, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x3c, 0x2, [@fwd, @array, @array]}}, 0x0, 0x56}, 0x20)
select(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100686cca8000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4807, 0x0)

16:30:49 executing program 3:

16:30:49 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0)
r2 = socket$nl_generic(0x10, 0x3, 0x10)
r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00')
sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r3], 0xc}}, 0x0)
r4 = socket$packet(0x11, 0x2, 0x300)
r5 = dup(r4)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
sendfile(r2, r1, 0x0, 0x100000001)

16:30:49 executing program 5:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
r2 = dup3(r0, r1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
mkdir(&(0x7f0000000280)='./file0\x00', 0x0)
mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='udf\x00', 0x0, 0x0)

16:30:49 executing program 4:

16:30:49 executing program 3:

[  297.769089] audit: type=1804 audit(1588955449.603:69): pid=12725 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir210500229/syzkaller.5IFUhd/196/cgroup.controllers" dev="sda1" ino=16382 res=1
[  297.879311] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  297.906291] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  297.939106] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  297.972063] EXT4-fs error (device loop0): ext4_get_journal_inode:4691: inode #8: comm syz-executor.0: iget: bad extended attribute block 50331648
[  298.024124] EXT4-fs (loop0): no journal found
16:30:49 executing program 2:
pipe(&(0x7f0000000000)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c000000020601000000000000000000000000080e0003006269746d61703a697000000005000400000000000900020073797a3000000000240007800c00028008000140ac1e00010c00018008000140a0000000050014000800000005000500020000000500010006"], 0x1}}, 0x0)
close(r2)
socket$nl_netfilter(0x10, 0x3, 0xc)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socketpair$unix(0x1, 0x1, 0x0, 0x0)
r3 = dup(0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
splice(r0, 0x0, r2, 0x0, 0x6209, 0x0)

16:30:49 executing program 4:

16:30:49 executing program 5:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
r2 = dup3(r0, r1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
mkdir(&(0x7f0000000280)='./file0\x00', 0x0)
mount(&(0x7f00000000c0)=@loop={'/dev/loop', 0x0}, 0x0, &(0x7f0000000100)='udf\x00', 0x0, 0x0)

16:30:49 executing program 3:

16:30:49 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0)
r2 = socket$nl_generic(0x10, 0x3, 0x10)
r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00')
sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r3], 0xc}}, 0x0)
r4 = socket$packet(0x11, 0x2, 0x300)
r5 = dup(r4)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
sendfile(r2, r1, 0x0, 0x100000001)

16:30:49 executing program 4:

[  298.287241] audit: type=1804 audit(1588955450.113:70): pid=12751 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir210500229/syzkaller.5IFUhd/197/cgroup.controllers" dev="sda1" ino=16408 res=1
16:30:50 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0)
r2 = socket$nl_generic(0x10, 0x3, 0x10)
r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00')
sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r3], 0xc}}, 0x0)
r4 = socket$packet(0x11, 0x2, 0x300)
r5 = dup(r4)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
sendfile(r2, r1, 0x0, 0x100000001)

16:30:50 executing program 3:

16:30:50 executing program 5:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
r2 = dup3(r0, r1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
mkdir(&(0x7f0000000280)='./file0\x00', 0x0)
mount(&(0x7f00000000c0)=@loop={'/dev/loop', 0x0}, 0x0, &(0x7f0000000100)='udf\x00', 0x0, 0x0)

16:30:50 executing program 4:

16:30:50 executing program 0:
sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="054a38", @ANYRES16, @ANYBLOB="6ffe000000000000000003000000580001800d0001007564"], 0x3}}, 0x0)
sendto$unix(0xffffffffffffffff, &(0x7f0000000340)="53e0f2c2905e9916912f89b23f54185c0e90b38551c81ae3767d56fec3150cd9bd2db58e164473806c6aaaf6964a26b0de86f5fe037f85ea25f3228e5e6dc4672b11ee7418224b4bed0d668c93d4ad2a975309402c1c195f2bd1a1263e107b177c6288fe6160086efbcd133bab74435a30e5da929fcd65882c970886e36ef38c162bf17422221915d31ea852afbc6f78df1ea10fd20bd8cf77e433", 0x9b, 0x0, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x3c, 0x2, [@fwd, @array, @array]}}, 0x0, 0x56}, 0x20)
select(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100686cca8000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4807, 0x0)

16:30:50 executing program 4:

[  298.765301] audit: type=1804 audit(1588955450.593:71): pid=12768 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir210500229/syzkaller.5IFUhd/198/cgroup.controllers" dev="sda1" ino=16397 res=1
[  298.814287] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  298.825053] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  298.863925] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock
16:30:50 executing program 2:
pipe(&(0x7f0000000000)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c000000020601000000000000000000000000080e0003006269746d61703a697000000005000400000000000900020073797a3000000000240007800c00028008000140ac1e00010c00018008000140a0000000050014000800000005000500020000000500010006"], 0x1}}, 0x0)
close(r2)
socket$nl_netfilter(0x10, 0x3, 0xc)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socketpair$unix(0x1, 0x1, 0x0, 0x0)
r3 = dup(0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
splice(r0, 0x0, r2, 0x0, 0x6209, 0x0)

16:30:50 executing program 3:
perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$inet6(0xa, 0x3, 0x7)
connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x80}, {0x0, 0x0, 0x100000000000, 0x0, 0x0, 0x0, 0xffffffffffff90a7}, {}, 0x0, 0x0, 0x1}, {{@in6=@mcast1, 0x4d5, 0x33}, 0x0, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}, 0xe8)
sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x1f4)

16:30:50 executing program 5:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
r2 = dup3(r0, r1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
mkdir(&(0x7f0000000280)='./file0\x00', 0x0)
mount(&(0x7f00000000c0)=@loop={'/dev/loop', 0x0}, 0x0, &(0x7f0000000100)='udf\x00', 0x0, 0x0)

16:30:50 executing program 4:
r0 = open(&(0x7f0000000040)='./bus\x00', 0x8001141042, 0x0)
ftruncate(r0, 0x2007fff)
write$binfmt_misc(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='syz'], 0x1003)
r1 = socket$inet6(0xa, 0x3, 0x2c)
connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c)
r2 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0)
sendfile(r1, r2, 0x0, 0x8482)

[  298.914510] EXT4-fs error (device loop0): ext4_get_journal_inode:4691: inode #8: comm syz-executor.0: iget: bad extended attribute block 50331648
[  298.972453] EXT4-fs (loop0): no journal found
16:30:50 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0)
r2 = socket$nl_generic(0x10, 0x3, 0x10)
r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00')
sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r3, @ANYBLOB], 0xc}}, 0x0)
r4 = socket$packet(0x11, 0x2, 0x300)
r5 = dup(r4)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
sendfile(r2, r1, 0x0, 0x100000001)

16:30:50 executing program 5:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
r2 = dup3(r0, r1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
mkdir(&(0x7f0000000280)='./file0\x00', 0x0)
mount(&(0x7f00000000c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0)

[  299.075097] audit: type=1804 audit(1588955450.903:72): pid=12783 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir013094856/syzkaller.S32Xhi/243/bus" dev="sda1" ino=15759 res=1
16:30:51 executing program 4:

16:30:51 executing program 3:

[  299.212967] audit: type=1804 audit(1588955450.973:73): pid=12790 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir013094856/syzkaller.S32Xhi/243/bus" dev="sda1" ino=15759 res=1
16:30:51 executing program 5:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
r2 = dup3(r0, r1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
mkdir(&(0x7f0000000280)='./file0\x00', 0x0)
mount(&(0x7f00000000c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0)

16:30:51 executing program 4:

[  299.345264] audit: type=1800 audit(1588955450.973:74): pid=12783 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed comm="syz-executor.4" name="bus" dev="sda1" ino=15759 res=0
[  299.446077] audit: type=1800 audit(1588955450.973:75): pid=12790 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed comm="syz-executor.4" name="bus" dev="sda1" ino=15759 res=0
16:30:51 executing program 0:
sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="054a38", @ANYRES16, @ANYBLOB="6ffe000000000000000003000000580001800d0001007564"], 0x3}}, 0x0)
sendto$unix(0xffffffffffffffff, &(0x7f0000000340)="53e0f2c2905e9916912f89b23f54185c0e90b38551c81ae3767d56fec3150cd9bd2db58e164473806c6aaaf6964a26b0de86f5fe037f85ea25f3228e5e6dc4672b11ee7418224b4bed0d668c93d4ad2a975309402c1c195f2bd1a1263e107b177c6288fe6160086efbcd133bab74435a30e5da929fcd65882c970886e36ef38c162bf17422221915d31ea852afbc6f78df1ea10fd20bd8cf77e433", 0x9b, 0x0, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x3c, 0x2, [@fwd, @array, @array]}}, 0x0, 0x56}, 0x20)
select(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100686cca8000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4807, 0x0)

16:30:51 executing program 3:

[  299.508085] audit: type=1804 audit(1588955451.093:76): pid=12799 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir210500229/syzkaller.5IFUhd/199/cgroup.controllers" dev="sda1" ino=16081 res=1
[  299.707326] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  299.724322] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  299.759779] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  299.775348] EXT4-fs error (device loop0): ext4_get_journal_inode:4691: inode #8: comm syz-executor.0: iget: bad extended attribute block 50331648
16:30:51 executing program 2:
pipe(&(0x7f0000000000)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c000000020601000000000000000000000000080e0003006269746d61703a697000000005000400000000000900020073797a3000000000240007800c00028008000140ac1e00010c00018008000140a0000000050014000800000005000500020000000500010006"], 0x1}}, 0x0)
close(r2)
socket$nl_netfilter(0x10, 0x3, 0xc)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0))
r3 = dup(0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
splice(r0, 0x0, r2, 0x0, 0x6209, 0x0)

16:30:51 executing program 4:
openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0xe8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00')
sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000180)={0x44, r1, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @remote}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @broadcast}]}, 0x44}}, 0x0)

16:30:51 executing program 5:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
r2 = dup3(r0, r1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
mkdir(&(0x7f0000000280)='./file0\x00', 0x0)
mount(&(0x7f00000000c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0)

16:30:51 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0)
r2 = socket$nl_generic(0x10, 0x3, 0x10)
r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00')
sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r3, @ANYBLOB], 0xc}}, 0x0)
r4 = socket$packet(0x11, 0x2, 0x300)
r5 = dup(r4)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
sendfile(r2, r1, 0x0, 0x100000001)

16:30:51 executing program 3:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = fcntl$dupfd(r1, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0)
r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)
ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60)
r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x81)
ioctl$KVM_SET_LAPIC(r5, 0x4400ae8f, &(0x7f0000000580)={"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"})
ioctl$KVM_RUN(r5, 0xae80, 0x0)
r6 = dup3(r3, r4, 0x0)
ioctl$KVM_TPR_ACCESS_REPORTING(r5, 0x4400ae8f, &(0x7f0000000080))
dup2(r6, r5)

[  299.814099] EXT4-fs (loop0): no journal found
[  300.023892] audit: type=1804 audit(1588955451.853:77): pid=12837 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir210500229/syzkaller.5IFUhd/200/cgroup.controllers" dev="sda1" ino=16412 res=1
16:30:51 executing program 4:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805acf4f8f4b460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f480800b100000000050000be5d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a522e15c7ce71553059a5ef83ca657bc457bc9f8eaa8ee5e4112", 0x11b}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x40)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

16:30:51 executing program 5:
r0 = socket$inet(0x2, 0x4000000000000001, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4)
bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10)
sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10)
sendto$inet(r0, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27)
close(r0)

16:30:52 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0)
r2 = socket$nl_generic(0x10, 0x3, 0x10)
r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00')
sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r3, @ANYBLOB], 0xc}}, 0x0)
r4 = socket$packet(0x11, 0x2, 0x300)
r5 = dup(r4)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
sendfile(r2, r1, 0x0, 0x100000001)

16:30:52 executing program 0:
sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="054a38", @ANYRES16, @ANYBLOB="6ffe000000000000000003000000580001800d0001007564"], 0x3}}, 0x0)
sendto$unix(0xffffffffffffffff, &(0x7f0000000340)="53e0f2c2905e9916912f89b23f54185c0e90b38551c81ae3767d56fec3150cd9bd2db58e164473806c6aaaf6964a26b0de86f5fe037f85ea25f3228e5e6dc4672b11ee7418224b4bed0d668c93d4ad2a975309402c1c195f2bd1a1263e107b177c6288fe6160086efbcd133bab74435a30e5da929fcd65882c970886e36ef38c162bf17422221915d31ea852afbc6f78df1ea10fd20bd8cf77e433", 0x9b, 0x0, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x2, [@fwd, @array, @array, @const]}}, 0x0, 0x62}, 0x20)
select(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100686cca8000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4807, 0x0)

16:30:52 executing program 3:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = fcntl$dupfd(r1, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0)
r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)
ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60)
r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x81)
ioctl$KVM_SET_LAPIC(r5, 0x4400ae8f, &(0x7f0000000580)={"6cdd4237dd245c8404721efdc9c8dc1964125fa96fa42b75fb3488fd8015bba4c81036c93a40c8a4d4412a763b00040000000000003c5ca206c047ecee377aba09e7b88378e3d63a98fc191f361d264ffa8b46485f02baee1ab6b8154252066178868d1ef4b5365c5dc26ca097ddda7c21a984c2b9ca4bbb7a87165c0c1dbc75d7ea4df10000174a3ac8694525952f44500a1f0db509c32cc7ace842c28f37f06e4ea9f1e5f0c6c379f9cc58bf69fcde318ead4825aa1b6a832d4e48cc41bb5a6baa41d614f6c8941bee805954a62d196a4e8d41f6b21224b57f530d0000c1ff53bf79a1f5c5dc34b2262d66ae793b6304a30b97077f1c131045cbc11c4562d22db88d0edc5daee171cc04d96d9ec2db07478f347edbd6404923ad4a5672b1b285c7988c4ec0922c655ff600000000c00dc290d936d93236051fadfb4b95d02c0bda7ce38dabb7cd103fe4d0c9c963cd717a77f8df8d46099b1f58e068af6afbbc19db161c6df3e7c9c71bc08a282fc2c142856b5e4caff4c0a4f72445ef10dcd2c569319d6e9bb2058d023f669a64fc7d9684b45b00000000364673dcfa9235ea5a2ff23c4bb5c5acb290e8976dcac779ff000000000000003d4e185afe28b774b99d3890bd37428617de4cdd6f53c419ce31054182fd098af7b7f1b1152c691611f897558d4b755cb783978d9859b0537b05b623dcb5c4ca9317471a40fa4998cca80e961efffb4e1aa25d8a17deef0c8694c4395fc99be3c3fe7aeb8af4929ce7d346ca62b25d48fda5d10146702f78b233b5208752726ed9f0c340d494b92d19cc930bb8a5f8b4da8f4603ac0c3b698384e17a570dc8524823ed15af4ecfabb4b2541d3c114b7bba1c21a845c9cf0d1cc24aba47e30f558b2246ad95ccf7d2f80cc0ab26f08336ea1a33b79cf35b898837016eb211a1734c7af076e15451e33519fc978f66df7df4557c91024a8dc130a28ef5f63ad07b39c8d23b85cf434e065e8a29a800655d127de6f6347b4951f97b5703dc78b1ca9d74ea6a9ae12ab367c0de2659cc38d2f33ddd86e0597d33361eada119b5132145fa4525c488c7fffd6ceda6e9a02ebd97ced6b0161f2cc84615ceb8b18883299c636e9e46724a9a0600a8bb02f3e489631d522019a35fe12a33caf9dd8768ddbc02a484c345c3eff254297b1dbb04989c3f9f3c7b3c985c39b1d313018068d3809bac8c657e39f4f692613e28387e955722908dd88b56163be8312ff47c5b6f280472935af74e97a5a8110a4d74496f4c8ec82ddb56d9b962d2fc43fa01a047526865c84f7cff36056cc4ac258021e1581d43badaaec6cc5a2ef989de9801fed6d4be2bfcfe07a69c46bffbe9dd03970800000000000000d372bdd6d89dc1ecf63c23d506114d0fba2bd1c69e8f7e3fccdcda85ce975ec1381b1cec6ddaa76e186719d8191643"})
ioctl$KVM_RUN(r5, 0xae80, 0x0)
r6 = dup3(r3, r4, 0x0)
ioctl$KVM_TPR_ACCESS_REPORTING(r5, 0x4400ae8f, &(0x7f0000000080))
dup2(r6, r5)

16:30:52 executing program 5:
perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0xe8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat$sequencer2(0xffffffffffffff9c, 0x0, 0x2001, 0x0)
munlockall()
setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0)

16:30:52 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0)
r2 = socket$nl_generic(0x10, 0x3, 0x10)
r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00')
sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r3, @ANYBLOB="210200000000000000000100"], 0xc}}, 0x0)
r4 = socket$packet(0x11, 0x2, 0x300)
r5 = dup(r4)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
sendfile(r2, r1, 0x0, 0x100000001)

[  300.654268] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  300.688592] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
16:30:52 executing program 2:
pipe(&(0x7f0000000000)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c000000020601000000000000000000000000080e0003006269746d61703a697000000005000400000000000900020073797a3000000000240007800c00028008000140ac1e00010c00018008000140a0000000050014000800000005000500020000000500010006"], 0x1}}, 0x0)
close(r2)
socket$nl_netfilter(0x10, 0x3, 0xc)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0))
r3 = dup(0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
splice(r0, 0x0, r2, 0x0, 0x6209, 0x0)

16:30:52 executing program 5:
r0 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c)
syz_emit_ethernet(0x36, &(0x7f00000001c0)=ANY=[], 0x0)

[  300.712453] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  300.724048] EXT4-fs error (device loop0): ext4_get_journal_inode:4691: inode #8: comm syz-executor.0: iget: bad extended attribute block 50331648
[  300.749535] EXT4-fs (loop0): no journal found
[  300.821874] audit: type=1804 audit(1588955452.643:78): pid=12891 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir210500229/syzkaller.5IFUhd/202/cgroup.controllers" dev="sda1" ino=16382 res=1
[  300.864970] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'.
16:30:52 executing program 3:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = fcntl$dupfd(r1, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0)
r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)
ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60)
r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x81)
ioctl$KVM_SET_LAPIC(r5, 0x4400ae8f, &(0x7f0000000580)={"6cdd4237dd245c8404721efdc9c8dc1964125fa96fa42b75fb3488fd8015bba4c81036c93a40c8a4d4412a763b00040000000000003c5ca206c047ecee377aba09e7b88378e3d63a98fc191f361d264ffa8b46485f02baee1ab6b8154252066178868d1ef4b5365c5dc26ca097ddda7c21a984c2b9ca4bbb7a87165c0c1dbc75d7ea4df10000174a3ac8694525952f44500a1f0db509c32cc7ace842c28f37f06e4ea9f1e5f0c6c379f9cc58bf69fcde318ead4825aa1b6a832d4e48cc41bb5a6baa41d614f6c8941bee805954a62d196a4e8d41f6b21224b57f530d0000c1ff53bf79a1f5c5dc34b2262d66ae793b6304a30b97077f1c131045cbc11c4562d22db88d0edc5daee171cc04d96d9ec2db07478f347edbd6404923ad4a5672b1b285c7988c4ec0922c655ff600000000c00dc290d936d93236051fadfb4b95d02c0bda7ce38dabb7cd103fe4d0c9c963cd717a77f8df8d46099b1f58e068af6afbbc19db161c6df3e7c9c71bc08a282fc2c142856b5e4caff4c0a4f72445ef10dcd2c569319d6e9bb2058d023f669a64fc7d9684b45b00000000364673dcfa9235ea5a2ff23c4bb5c5acb290e8976dcac779ff000000000000003d4e185afe28b774b99d3890bd37428617de4cdd6f53c419ce31054182fd098af7b7f1b1152c691611f897558d4b755cb783978d9859b0537b05b623dcb5c4ca9317471a40fa4998cca80e961efffb4e1aa25d8a17deef0c8694c4395fc99be3c3fe7aeb8af4929ce7d346ca62b25d48fda5d10146702f78b233b5208752726ed9f0c340d494b92d19cc930bb8a5f8b4da8f4603ac0c3b698384e17a570dc8524823ed15af4ecfabb4b2541d3c114b7bba1c21a845c9cf0d1cc24aba47e30f558b2246ad95ccf7d2f80cc0ab26f08336ea1a33b79cf35b898837016eb211a1734c7af076e15451e33519fc978f66df7df4557c91024a8dc130a28ef5f63ad07b39c8d23b85cf434e065e8a29a800655d127de6f6347b4951f97b5703dc78b1ca9d74ea6a9ae12ab367c0de2659cc38d2f33ddd86e0597d33361eada119b5132145fa4525c488c7fffd6ceda6e9a02ebd97ced6b0161f2cc84615ceb8b18883299c636e9e46724a9a0600a8bb02f3e489631d522019a35fe12a33caf9dd8768ddbc02a484c345c3eff254297b1dbb04989c3f9f3c7b3c985c39b1d313018068d3809bac8c657e39f4f692613e28387e955722908dd88b56163be8312ff47c5b6f280472935af74e97a5a8110a4d74496f4c8ec82ddb56d9b962d2fc43fa01a047526865c84f7cff36056cc4ac258021e1581d43badaaec6cc5a2ef989de9801fed6d4be2bfcfe07a69c46bffbe9dd03970800000000000000d372bdd6d89dc1ecf63c23d506114d0fba2bd1c69e8f7e3fccdcda85ce975ec1381b1cec6ddaa76e186719d8191643"})
ioctl$KVM_RUN(r5, 0xae80, 0x0)
r6 = dup3(r3, r4, 0x0)
ioctl$KVM_TPR_ACCESS_REPORTING(r5, 0x4400ae8f, &(0x7f0000000080))
dup2(r6, r5)

16:30:52 executing program 5:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0)
r3 = getpgid(0xffffffffffffffff)
getpgid(r3)
syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0)
pipe(0x0)
getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000000)={@dev, @initdev, @private}, &(0x7f0000000080)=0xc)
ioctl$KVM_NMI(r2, 0xae9a)
perf_event_open(&(0x7f000001d000)={0x1, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$KVM_RUN(r2, 0xae80, 0x0)

16:30:53 executing program 5:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0)
r3 = getpgid(0xffffffffffffffff)
getpgid(r3)
syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0)
pipe(0x0)
getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000000)={@dev, @initdev, @private}, &(0x7f0000000080)=0xc)
ioctl$KVM_NMI(r2, 0xae9a)
perf_event_open(&(0x7f000001d000)={0x1, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$KVM_RUN(r2, 0xae80, 0x0)

16:30:55 executing program 4:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805acf4f8f4b460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f480800b100000000050000be5d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a522e15c7ce71553059a5ef83ca657bc457bc9f8eaa8ee5e4112", 0x11b}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x40)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

16:30:55 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0)
r2 = socket$nl_generic(0x10, 0x3, 0x10)
r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00')
sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r3, @ANYBLOB="210200000000000000000100"], 0xc}}, 0x0)
r4 = socket$packet(0x11, 0x2, 0x300)
r5 = dup(r4)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
sendfile(r2, r1, 0x0, 0x100000001)

16:30:55 executing program 0:
sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="054a38", @ANYRES16, @ANYBLOB="6ffe000000000000000003000000580001800d0001007564"], 0x3}}, 0x0)
sendto$unix(0xffffffffffffffff, &(0x7f0000000340)="53e0f2c2905e9916912f89b23f54185c0e90b38551c81ae3767d56fec3150cd9bd2db58e164473806c6aaaf6964a26b0de86f5fe037f85ea25f3228e5e6dc4672b11ee7418224b4bed0d668c93d4ad2a975309402c1c195f2bd1a1263e107b177c6288fe6160086efbcd133bab74435a30e5da929fcd65882c970886e36ef38c162bf17422221915d31ea852afbc6f78df1ea10fd20bd8cf77e433", 0x9b, 0x0, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x2, [@fwd, @array, @array, @const]}}, 0x0, 0x62}, 0x20)
select(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100686cca8000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4807, 0x0)

16:30:55 executing program 3:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = fcntl$dupfd(r1, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0)
r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)
ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60)
r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x81)
ioctl$KVM_SET_LAPIC(r5, 0x4400ae8f, &(0x7f0000000580)={"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"})
ioctl$KVM_RUN(r5, 0xae80, 0x0)
r6 = dup3(r3, r4, 0x0)
ioctl$KVM_TPR_ACCESS_REPORTING(r5, 0x4400ae8f, &(0x7f0000000080))
dup2(r6, r5)

16:30:55 executing program 5:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, r0, 0x0)
r1 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00')
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
writev(r1, &(0x7f0000000080), 0x53)

16:30:55 executing program 2:
pipe(&(0x7f0000000000)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c000000020601000000000000000000000000080e0003006269746d61703a697000000005000400000000000900020073797a3000000000240007800c00028008000140ac1e00010c00018008000140a0000000050014000800000005000500020000000500010006"], 0x1}}, 0x0)
close(r2)
socket$nl_netfilter(0x10, 0x3, 0xc)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0))
r3 = dup(0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
splice(r0, 0x0, r2, 0x0, 0x6209, 0x0)

16:30:55 executing program 5:
perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0xe8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10)
sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10)

[  303.310241] audit: type=1804 audit(1588955455.133:79): pid=12954 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir210500229/syzkaller.5IFUhd/203/cgroup.controllers" dev="sda1" ino=16421 res=1
[  303.362977] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'.
[  303.365101] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  303.407433] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  303.451629] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  303.498468] EXT4-fs error (device loop0): ext4_get_journal_inode:4691: inode #8: comm syz-executor.0: iget: bad extended attribute block 50331648
16:30:55 executing program 5:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c)
setsockopt$inet6_int(r0, 0x29, 0x43, &(0x7f0000000000)=0x1, 0x4)
setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4)
setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='dctcp\x00', 0x6)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x8bd54b66}, 0x1c)

[  303.549048] EXT4-fs (loop0): no journal found
16:30:55 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0)
r2 = socket$nl_generic(0x10, 0x3, 0x10)
r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00')
sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r3, @ANYBLOB="210200000000000000000100"], 0xc}}, 0x0)
r4 = socket$packet(0x11, 0x2, 0x300)
r5 = dup(r4)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
sendfile(r2, r1, 0x0, 0x100000001)

[  303.803952] audit: type=1804 audit(1588955455.623:80): pid=12977 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir210500229/syzkaller.5IFUhd/204/cgroup.controllers" dev="sda1" ino=16421 res=1
[  303.841985] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'.
16:30:55 executing program 0:
sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="054a38", @ANYRES16, @ANYBLOB="6ffe000000000000000003000000580001800d0001007564"], 0x3}}, 0x0)
sendto$unix(0xffffffffffffffff, &(0x7f0000000340)="53e0f2c2905e9916912f89b23f54185c0e90b38551c81ae3767d56fec3150cd9bd2db58e164473806c6aaaf6964a26b0de86f5fe037f85ea25f3228e5e6dc4672b11ee7418224b4bed0d668c93d4ad2a975309402c1c195f2bd1a1263e107b177c6288fe6160086efbcd133bab74435a30e5da929fcd65882c970886e36ef38c162bf17422221915d31ea852afbc6f78df1ea10fd20bd8cf77e433", 0x9b, 0x0, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x2, [@fwd, @array, @array, @const]}}, 0x0, 0x62}, 0x20)
select(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100686cca8000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4807, 0x0)

16:30:55 executing program 2:
pipe(&(0x7f0000000000)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c000000020601000000000000000000000000080e0003006269746d61703a697000000005000400000000000900020073797a3000000000240007800c00028008000140ac1e00010c00018008000140a0000000050014000800000005000500020000000500010006"], 0x1}}, 0x0)
close(r2)
socket$nl_netfilter(0x10, 0x3, 0xc)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={<r3=>0xffffffffffffffff})
dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
splice(r0, 0x0, r2, 0x0, 0x6209, 0x0)

16:30:55 executing program 3:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = fcntl$dupfd(r1, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0)
r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)
ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60)
r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x81)
ioctl$KVM_SET_LAPIC(r5, 0x4400ae8f, &(0x7f0000000580)={"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"})
ioctl$KVM_RUN(r5, 0xae80, 0x0)
dup3(r3, r4, 0x0)
ioctl$KVM_TPR_ACCESS_REPORTING(r5, 0x4400ae8f, &(0x7f0000000080))

[  304.185307] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  304.261364] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  304.274319] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  304.293085] EXT4-fs error (device loop0): ext4_get_journal_inode:4691: inode #8: comm syz-executor.0: iget: bad extended attribute block 50331648
[  304.312876] EXT4-fs (loop0): no journal found
16:30:58 executing program 4:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805acf4f8f4b460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f480800b100000000050000be5d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a522e15c7ce71553059a5ef83ca657bc457bc9f8eaa8ee5e4112", 0x11b}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x40)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

16:30:58 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0)
r2 = socket$nl_generic(0x10, 0x3, 0x10)
r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00')
sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r3, @ANYBLOB="21020000000000000000010000000c009900"], 0xc}}, 0x0)
r4 = socket$packet(0x11, 0x2, 0x300)
r5 = dup(r4)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
sendfile(r2, r1, 0x0, 0x100000001)

16:30:58 executing program 5:
r0 = socket$pppl2tp(0x18, 0x1, 0x1)
r1 = socket$inet6_udp(0xa, 0x2, 0x0)
connect$pppl2tp(r0, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r1, {0x2, 0x0, @dev}, 0x1}}, 0x2e)
connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0xa}, 0x1c)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
r3 = fcntl$dupfd(r2, 0x0, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
sendmmsg(r0, &(0x7f0000000280)=[{{0x0, 0x7000000, 0x0}}], 0x400000000000085, 0x0)

16:30:58 executing program 3:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = fcntl$dupfd(r1, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0)
r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)
ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60)
r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x81)
ioctl$KVM_SET_LAPIC(r5, 0x4400ae8f, &(0x7f0000000580)={"6cdd4237dd245c8404721efdc9c8dc1964125fa96fa42b75fb3488fd8015bba4c81036c93a40c8a4d4412a763b00040000000000003c5ca206c047ecee377aba09e7b88378e3d63a98fc191f361d264ffa8b46485f02baee1ab6b8154252066178868d1ef4b5365c5dc26ca097ddda7c21a984c2b9ca4bbb7a87165c0c1dbc75d7ea4df10000174a3ac8694525952f44500a1f0db509c32cc7ace842c28f37f06e4ea9f1e5f0c6c379f9cc58bf69fcde318ead4825aa1b6a832d4e48cc41bb5a6baa41d614f6c8941bee805954a62d196a4e8d41f6b21224b57f530d0000c1ff53bf79a1f5c5dc34b2262d66ae793b6304a30b97077f1c131045cbc11c4562d22db88d0edc5daee171cc04d96d9ec2db07478f347edbd6404923ad4a5672b1b285c7988c4ec0922c655ff600000000c00dc290d936d93236051fadfb4b95d02c0bda7ce38dabb7cd103fe4d0c9c963cd717a77f8df8d46099b1f58e068af6afbbc19db161c6df3e7c9c71bc08a282fc2c142856b5e4caff4c0a4f72445ef10dcd2c569319d6e9bb2058d023f669a64fc7d9684b45b00000000364673dcfa9235ea5a2ff23c4bb5c5acb290e8976dcac779ff000000000000003d4e185afe28b774b99d3890bd37428617de4cdd6f53c419ce31054182fd098af7b7f1b1152c691611f897558d4b755cb783978d9859b0537b05b623dcb5c4ca9317471a40fa4998cca80e961efffb4e1aa25d8a17deef0c8694c4395fc99be3c3fe7aeb8af4929ce7d346ca62b25d48fda5d10146702f78b233b5208752726ed9f0c340d494b92d19cc930bb8a5f8b4da8f4603ac0c3b698384e17a570dc8524823ed15af4ecfabb4b2541d3c114b7bba1c21a845c9cf0d1cc24aba47e30f558b2246ad95ccf7d2f80cc0ab26f08336ea1a33b79cf35b898837016eb211a1734c7af076e15451e33519fc978f66df7df4557c91024a8dc130a28ef5f63ad07b39c8d23b85cf434e065e8a29a800655d127de6f6347b4951f97b5703dc78b1ca9d74ea6a9ae12ab367c0de2659cc38d2f33ddd86e0597d33361eada119b5132145fa4525c488c7fffd6ceda6e9a02ebd97ced6b0161f2cc84615ceb8b18883299c636e9e46724a9a0600a8bb02f3e489631d522019a35fe12a33caf9dd8768ddbc02a484c345c3eff254297b1dbb04989c3f9f3c7b3c985c39b1d313018068d3809bac8c657e39f4f692613e28387e955722908dd88b56163be8312ff47c5b6f280472935af74e97a5a8110a4d74496f4c8ec82ddb56d9b962d2fc43fa01a047526865c84f7cff36056cc4ac258021e1581d43badaaec6cc5a2ef989de9801fed6d4be2bfcfe07a69c46bffbe9dd03970800000000000000d372bdd6d89dc1ecf63c23d506114d0fba2bd1c69e8f7e3fccdcda85ce975ec1381b1cec6ddaa76e186719d8191643"})
ioctl$KVM_RUN(r5, 0xae80, 0x0)
dup3(r3, r4, 0x0)
ioctl$KVM_TPR_ACCESS_REPORTING(r5, 0x4400ae8f, &(0x7f0000000080))

16:30:58 executing program 0:
sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="054a38", @ANYRES16, @ANYBLOB="6ffe000000000000000003000000580001800d0001007564"], 0x3}}, 0x0)
sendto$unix(0xffffffffffffffff, &(0x7f0000000340)="53e0f2c2905e9916912f89b23f54185c0e90b38551c81ae3767d56fec3150cd9bd2db58e164473806c6aaaf6964a26b0de86f5fe037f85ea25f3228e5e6dc4672b11ee7418224b4bed0d668c93d4ad2a975309402c1c195f2bd1a1263e107b177c6288fe6160086efbcd133bab74435a30e5da929fcd65882c970886e36ef38c162bf17422221915d31ea852afbc6f78df1ea10fd20bd8cf77e433", 0x9b, 0x0, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@fwd, @array, @const={0xb}]}}, 0x0, 0x4a}, 0x20)
select(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100686cca8000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4807, 0x0)

16:30:58 executing program 2:
pipe(&(0x7f0000000000)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c000000020601000000000000000000000000080e0003006269746d61703a697000000005000400000000000900020073797a3000000000240007800c00028008000140ac1e00010c00018008000140a0000000050014000800000005000500020000000500010006"], 0x1}}, 0x0)
close(r2)
socket$nl_netfilter(0x10, 0x3, 0xc)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={<r3=>0xffffffffffffffff})
dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
splice(r0, 0x0, r2, 0x0, 0x6209, 0x0)

[  306.403592] audit: type=1804 audit(1588955458.223:81): pid=13034 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir210500229/syzkaller.5IFUhd/205/cgroup.controllers" dev="sda1" ino=16451 res=1
[  306.435105] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
16:30:58 executing program 5:
perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="7c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000540012800e00010069703665727370616e00000040000280080015005c0e050006000f000100000008000100", @ANYRES32=0x0, @ANYBLOB="14000600fe8000000000000000000000000000bb0600110000940000040012020400120008000a00", @ANYRES32], 0x7c}}, 0x10)

[  306.459210] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  306.471194] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  306.483377] EXT4-fs error (device loop0): ext4_get_journal_inode:4691: inode #8: comm syz-executor.0: iget: bad extended attribute block 50331648
[  306.502138] EXT4-fs (loop0): no journal found
16:30:58 executing program 3:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = fcntl$dupfd(r1, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0)
r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)
ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60)
r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x81)
ioctl$KVM_SET_LAPIC(r5, 0x4400ae8f, &(0x7f0000000580)={"6cdd4237dd245c8404721efdc9c8dc1964125fa96fa42b75fb3488fd8015bba4c81036c93a40c8a4d4412a763b00040000000000003c5ca206c047ecee377aba09e7b88378e3d63a98fc191f361d264ffa8b46485f02baee1ab6b8154252066178868d1ef4b5365c5dc26ca097ddda7c21a984c2b9ca4bbb7a87165c0c1dbc75d7ea4df10000174a3ac8694525952f44500a1f0db509c32cc7ace842c28f37f06e4ea9f1e5f0c6c379f9cc58bf69fcde318ead4825aa1b6a832d4e48cc41bb5a6baa41d614f6c8941bee805954a62d196a4e8d41f6b21224b57f530d0000c1ff53bf79a1f5c5dc34b2262d66ae793b6304a30b97077f1c131045cbc11c4562d22db88d0edc5daee171cc04d96d9ec2db07478f347edbd6404923ad4a5672b1b285c7988c4ec0922c655ff600000000c00dc290d936d93236051fadfb4b95d02c0bda7ce38dabb7cd103fe4d0c9c963cd717a77f8df8d46099b1f58e068af6afbbc19db161c6df3e7c9c71bc08a282fc2c142856b5e4caff4c0a4f72445ef10dcd2c569319d6e9bb2058d023f669a64fc7d9684b45b00000000364673dcfa9235ea5a2ff23c4bb5c5acb290e8976dcac779ff000000000000003d4e185afe28b774b99d3890bd37428617de4cdd6f53c419ce31054182fd098af7b7f1b1152c691611f897558d4b755cb783978d9859b0537b05b623dcb5c4ca9317471a40fa4998cca80e961efffb4e1aa25d8a17deef0c8694c4395fc99be3c3fe7aeb8af4929ce7d346ca62b25d48fda5d10146702f78b233b5208752726ed9f0c340d494b92d19cc930bb8a5f8b4da8f4603ac0c3b698384e17a570dc8524823ed15af4ecfabb4b2541d3c114b7bba1c21a845c9cf0d1cc24aba47e30f558b2246ad95ccf7d2f80cc0ab26f08336ea1a33b79cf35b898837016eb211a1734c7af076e15451e33519fc978f66df7df4557c91024a8dc130a28ef5f63ad07b39c8d23b85cf434e065e8a29a800655d127de6f6347b4951f97b5703dc78b1ca9d74ea6a9ae12ab367c0de2659cc38d2f33ddd86e0597d33361eada119b5132145fa4525c488c7fffd6ceda6e9a02ebd97ced6b0161f2cc84615ceb8b18883299c636e9e46724a9a0600a8bb02f3e489631d522019a35fe12a33caf9dd8768ddbc02a484c345c3eff254297b1dbb04989c3f9f3c7b3c985c39b1d313018068d3809bac8c657e39f4f692613e28387e955722908dd88b56163be8312ff47c5b6f280472935af74e97a5a8110a4d74496f4c8ec82ddb56d9b962d2fc43fa01a047526865c84f7cff36056cc4ac258021e1581d43badaaec6cc5a2ef989de9801fed6d4be2bfcfe07a69c46bffbe9dd03970800000000000000d372bdd6d89dc1ecf63c23d506114d0fba2bd1c69e8f7e3fccdcda85ce975ec1381b1cec6ddaa76e186719d8191643"})
ioctl$KVM_RUN(r5, 0xae80, 0x0)
dup3(r3, r4, 0x0)
ioctl$KVM_TPR_ACCESS_REPORTING(r5, 0x4400ae8f, &(0x7f0000000080))

16:30:58 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0)
r2 = socket$nl_generic(0x10, 0x3, 0x10)
r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00')
sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r3, @ANYBLOB="21020000000000000000010000000c009900"], 0xc}}, 0x0)
r4 = socket$packet(0x11, 0x2, 0x300)
r5 = dup(r4)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
sendfile(r2, r1, 0x0, 0x100000001)

16:30:58 executing program 5:

16:30:58 executing program 5:

16:30:58 executing program 5:

[  306.889673] audit: type=1804 audit(1588955458.713:82): pid=13066 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir210500229/syzkaller.5IFUhd/206/cgroup.controllers" dev="sda1" ino=16428 res=1
16:31:01 executing program 4:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805acf4f8f4b460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f480800b100000000050000be5d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a522e15c7ce71553059a5ef83ca657bc457bc9f8eaa8ee5e4112", 0x11b}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x40)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

16:31:01 executing program 5:

16:31:01 executing program 0:
sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="054a38", @ANYRES16, @ANYBLOB="6ffe000000000000000003000000580001800d0001007564"], 0x3}}, 0x0)
sendto$unix(0xffffffffffffffff, &(0x7f0000000340)="53e0f2c2905e9916912f89b23f54185c0e90b38551c81ae3767d56fec3150cd9bd2db58e164473806c6aaaf6964a26b0de86f5fe037f85ea25f3228e5e6dc4672b11ee7418224b4bed0d668c93d4ad2a975309402c1c195f2bd1a1263e107b177c6288fe6160086efbcd133bab74435a30e5da929fcd65882c970886e36ef38c162bf17422221915d31ea852afbc6f78df1ea10fd20bd8cf77e433", 0x9b, 0x0, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@fwd, @array, @const={0xb}]}}, 0x0, 0x4a}, 0x20)
select(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100686cca8000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4807, 0x0)

16:31:01 executing program 2:
pipe(&(0x7f0000000000)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c000000020601000000000000000000000000080e0003006269746d61703a697000000005000400000000000900020073797a3000000000240007800c00028008000140ac1e00010c00018008000140a0000000050014000800000005000500020000000500010006"], 0x1}}, 0x0)
close(r2)
socket$nl_netfilter(0x10, 0x3, 0xc)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={<r3=>0xffffffffffffffff})
dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
splice(r0, 0x0, r2, 0x0, 0x6209, 0x0)

16:31:01 executing program 3:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = fcntl$dupfd(r1, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0)
r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)
ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60)
r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x81)
ioctl$KVM_SET_LAPIC(r5, 0x4400ae8f, &(0x7f0000000580)={"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"})
ioctl$KVM_RUN(r5, 0xae80, 0x0)
ioctl$KVM_TPR_ACCESS_REPORTING(r5, 0x4400ae8f, &(0x7f0000000080))
dup2(0xffffffffffffffff, r5)

16:31:01 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0)
r2 = socket$nl_generic(0x10, 0x3, 0x10)
r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00')
sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r3, @ANYBLOB="21020000000000000000010000000c009900"], 0xc}}, 0x0)
r4 = socket$packet(0x11, 0x2, 0x300)
r5 = dup(r4)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
sendfile(r2, r1, 0x0, 0x100000001)

16:31:01 executing program 5:

[  309.411547] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  309.432098] audit: type=1804 audit(1588955461.253:83): pid=13102 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir210500229/syzkaller.5IFUhd/207/cgroup.controllers" dev="sda1" ino=15828 res=1
16:31:01 executing program 5:

[  309.442413] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
16:31:01 executing program 5:

[  309.564425] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock
16:31:01 executing program 5:

[  309.612641] EXT4-fs error (device loop0): ext4_get_journal_inode:4691: inode #8: comm syz-executor.0: iget: bad extended attribute block 50331648
16:31:01 executing program 3:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = fcntl$dupfd(r1, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0)
r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)
ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60)
r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x81)
ioctl$KVM_SET_LAPIC(r5, 0x4400ae8f, &(0x7f0000000580)={"6cdd4237dd245c8404721efdc9c8dc1964125fa96fa42b75fb3488fd8015bba4c81036c93a40c8a4d4412a763b00040000000000003c5ca206c047ecee377aba09e7b88378e3d63a98fc191f361d264ffa8b46485f02baee1ab6b8154252066178868d1ef4b5365c5dc26ca097ddda7c21a984c2b9ca4bbb7a87165c0c1dbc75d7ea4df10000174a3ac8694525952f44500a1f0db509c32cc7ace842c28f37f06e4ea9f1e5f0c6c379f9cc58bf69fcde318ead4825aa1b6a832d4e48cc41bb5a6baa41d614f6c8941bee805954a62d196a4e8d41f6b21224b57f530d0000c1ff53bf79a1f5c5dc34b2262d66ae793b6304a30b97077f1c131045cbc11c4562d22db88d0edc5daee171cc04d96d9ec2db07478f347edbd6404923ad4a5672b1b285c7988c4ec0922c655ff600000000c00dc290d936d93236051fadfb4b95d02c0bda7ce38dabb7cd103fe4d0c9c963cd717a77f8df8d46099b1f58e068af6afbbc19db161c6df3e7c9c71bc08a282fc2c142856b5e4caff4c0a4f72445ef10dcd2c569319d6e9bb2058d023f669a64fc7d9684b45b00000000364673dcfa9235ea5a2ff23c4bb5c5acb290e8976dcac779ff000000000000003d4e185afe28b774b99d3890bd37428617de4cdd6f53c419ce31054182fd098af7b7f1b1152c691611f897558d4b755cb783978d9859b0537b05b623dcb5c4ca9317471a40fa4998cca80e961efffb4e1aa25d8a17deef0c8694c4395fc99be3c3fe7aeb8af4929ce7d346ca62b25d48fda5d10146702f78b233b5208752726ed9f0c340d494b92d19cc930bb8a5f8b4da8f4603ac0c3b698384e17a570dc8524823ed15af4ecfabb4b2541d3c114b7bba1c21a845c9cf0d1cc24aba47e30f558b2246ad95ccf7d2f80cc0ab26f08336ea1a33b79cf35b898837016eb211a1734c7af076e15451e33519fc978f66df7df4557c91024a8dc130a28ef5f63ad07b39c8d23b85cf434e065e8a29a800655d127de6f6347b4951f97b5703dc78b1ca9d74ea6a9ae12ab367c0de2659cc38d2f33ddd86e0597d33361eada119b5132145fa4525c488c7fffd6ceda6e9a02ebd97ced6b0161f2cc84615ceb8b18883299c636e9e46724a9a0600a8bb02f3e489631d522019a35fe12a33caf9dd8768ddbc02a484c345c3eff254297b1dbb04989c3f9f3c7b3c985c39b1d313018068d3809bac8c657e39f4f692613e28387e955722908dd88b56163be8312ff47c5b6f280472935af74e97a5a8110a4d74496f4c8ec82ddb56d9b962d2fc43fa01a047526865c84f7cff36056cc4ac258021e1581d43badaaec6cc5a2ef989de9801fed6d4be2bfcfe07a69c46bffbe9dd03970800000000000000d372bdd6d89dc1ecf63c23d506114d0fba2bd1c69e8f7e3fccdcda85ce975ec1381b1cec6ddaa76e186719d8191643"})
ioctl$KVM_RUN(r5, 0xae80, 0x0)
ioctl$KVM_TPR_ACCESS_REPORTING(r5, 0x4400ae8f, &(0x7f0000000080))
dup2(0xffffffffffffffff, r5)

[  309.712328] EXT4-fs (loop0): no journal found
16:31:01 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0)
r2 = socket$nl_generic(0x10, 0x3, 0x10)
r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00')
sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r3, @ANYBLOB="21020000000000000000010000000c009900152600"], 0xc}}, 0x0)
r4 = socket$packet(0x11, 0x2, 0x300)
r5 = dup(r4)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
sendfile(r2, r1, 0x0, 0x100000001)

[  309.978147] audit: type=1804 audit(1588955461.803:84): pid=13130 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir210500229/syzkaller.5IFUhd/208/cgroup.controllers" dev="sda1" ino=15830 res=1
16:31:04 executing program 4:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x11b}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x40)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$cont(0x20, r0, 0x0, 0x0)

16:31:04 executing program 5:

16:31:04 executing program 0:
sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="054a38", @ANYRES16, @ANYBLOB="6ffe000000000000000003000000580001800d0001007564"], 0x3}}, 0x0)
sendto$unix(0xffffffffffffffff, &(0x7f0000000340)="53e0f2c2905e9916912f89b23f54185c0e90b38551c81ae3767d56fec3150cd9bd2db58e164473806c6aaaf6964a26b0de86f5fe037f85ea25f3228e5e6dc4672b11ee7418224b4bed0d668c93d4ad2a975309402c1c195f2bd1a1263e107b177c6288fe6160086efbcd133bab74435a30e5da929fcd65882c970886e36ef38c162bf17422221915d31ea852afbc6f78df1ea10fd20bd8cf77e433", 0x9b, 0x0, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@fwd, @array, @const={0xb}]}}, 0x0, 0x4a}, 0x20)
select(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100686cca8000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4807, 0x0)

16:31:04 executing program 2:
pipe(&(0x7f0000000000)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c000000020601000000000000000000000000080e0003006269746d61703a697000000005000400000000000900020073797a3000000000240007800c00028008000140ac1e00010c00018008000140a0000000050014000800000005000500020000000500010006"], 0x1}}, 0x0)
close(r2)
socket$nl_netfilter(0x10, 0x3, 0xc)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={<r3=>0xffffffffffffffff})
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x0)
splice(r0, 0x0, r2, 0x0, 0x6209, 0x0)

16:31:04 executing program 3:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = fcntl$dupfd(r1, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0)
r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)
ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60)
r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x81)
ioctl$KVM_SET_LAPIC(r5, 0x4400ae8f, &(0x7f0000000580)={"6cdd4237dd245c8404721efdc9c8dc1964125fa96fa42b75fb3488fd8015bba4c81036c93a40c8a4d4412a763b00040000000000003c5ca206c047ecee377aba09e7b88378e3d63a98fc191f361d264ffa8b46485f02baee1ab6b8154252066178868d1ef4b5365c5dc26ca097ddda7c21a984c2b9ca4bbb7a87165c0c1dbc75d7ea4df10000174a3ac8694525952f44500a1f0db509c32cc7ace842c28f37f06e4ea9f1e5f0c6c379f9cc58bf69fcde318ead4825aa1b6a832d4e48cc41bb5a6baa41d614f6c8941bee805954a62d196a4e8d41f6b21224b57f530d0000c1ff53bf79a1f5c5dc34b2262d66ae793b6304a30b97077f1c131045cbc11c4562d22db88d0edc5daee171cc04d96d9ec2db07478f347edbd6404923ad4a5672b1b285c7988c4ec0922c655ff600000000c00dc290d936d93236051fadfb4b95d02c0bda7ce38dabb7cd103fe4d0c9c963cd717a77f8df8d46099b1f58e068af6afbbc19db161c6df3e7c9c71bc08a282fc2c142856b5e4caff4c0a4f72445ef10dcd2c569319d6e9bb2058d023f669a64fc7d9684b45b00000000364673dcfa9235ea5a2ff23c4bb5c5acb290e8976dcac779ff000000000000003d4e185afe28b774b99d3890bd37428617de4cdd6f53c419ce31054182fd098af7b7f1b1152c691611f897558d4b755cb783978d9859b0537b05b623dcb5c4ca9317471a40fa4998cca80e961efffb4e1aa25d8a17deef0c8694c4395fc99be3c3fe7aeb8af4929ce7d346ca62b25d48fda5d10146702f78b233b5208752726ed9f0c340d494b92d19cc930bb8a5f8b4da8f4603ac0c3b698384e17a570dc8524823ed15af4ecfabb4b2541d3c114b7bba1c21a845c9cf0d1cc24aba47e30f558b2246ad95ccf7d2f80cc0ab26f08336ea1a33b79cf35b898837016eb211a1734c7af076e15451e33519fc978f66df7df4557c91024a8dc130a28ef5f63ad07b39c8d23b85cf434e065e8a29a800655d127de6f6347b4951f97b5703dc78b1ca9d74ea6a9ae12ab367c0de2659cc38d2f33ddd86e0597d33361eada119b5132145fa4525c488c7fffd6ceda6e9a02ebd97ced6b0161f2cc84615ceb8b18883299c636e9e46724a9a0600a8bb02f3e489631d522019a35fe12a33caf9dd8768ddbc02a484c345c3eff254297b1dbb04989c3f9f3c7b3c985c39b1d313018068d3809bac8c657e39f4f692613e28387e955722908dd88b56163be8312ff47c5b6f280472935af74e97a5a8110a4d74496f4c8ec82ddb56d9b962d2fc43fa01a047526865c84f7cff36056cc4ac258021e1581d43badaaec6cc5a2ef989de9801fed6d4be2bfcfe07a69c46bffbe9dd03970800000000000000d372bdd6d89dc1ecf63c23d506114d0fba2bd1c69e8f7e3fccdcda85ce975ec1381b1cec6ddaa76e186719d8191643"})
ioctl$KVM_RUN(r5, 0xae80, 0x0)
ioctl$KVM_TPR_ACCESS_REPORTING(r5, 0x4400ae8f, &(0x7f0000000080))
dup2(0xffffffffffffffff, r5)

16:31:04 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0)
r2 = socket$nl_generic(0x10, 0x3, 0x10)
r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00')
sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r3, @ANYBLOB="21020000000000000000010000000c009900152600"], 0xc}}, 0x0)
r4 = socket$packet(0x11, 0x2, 0x300)
r5 = dup(r4)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
sendfile(r2, r1, 0x0, 0x100000001)

16:31:04 executing program 5:

[  312.522135] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  312.536163] audit: type=1804 audit(1588955464.364:85): pid=13161 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir210500229/syzkaller.5IFUhd/209/cgroup.controllers" dev="sda1" ino=16456 res=1
[  312.539680] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
16:31:04 executing program 5:

[  312.574366] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  312.586755] EXT4-fs error (device loop0): ext4_get_journal_inode:4691: inode #8: comm syz-executor.0: iget: bad extended attribute block 50331648
[  312.614423] EXT4-fs (loop0): no journal found
16:31:04 executing program 5:

16:31:04 executing program 3:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = fcntl$dupfd(r1, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0)
r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)
ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60)
r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x81)
ioctl$KVM_SET_LAPIC(r5, 0x4400ae8f, &(0x7f0000000580)={"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"})
r6 = dup3(r3, r4, 0x0)
ioctl$KVM_TPR_ACCESS_REPORTING(r5, 0x4400ae8f, &(0x7f0000000080))
dup2(r6, r5)

16:31:04 executing program 5:

16:31:04 executing program 5:
r0 = socket$inet(0x2, 0x4000000000000001, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4)
bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$null(0xffffff9c, 0x0, 0x0, 0x0)
sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005600), 0x0, 0x0)
sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10)
setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4)
write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[], 0x2bcf)
shutdown(r0, 0x1)
recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0xf99e}], 0x1, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x0)
setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="20c7fd6bc8b03f37df28c3094431cee07b5b87583e876f399747a96c6b9a098d461170cd", 0x24)
syz_open_procfs(0x0, 0x0)

16:31:07 executing program 4:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x11b}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x40)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$cont(0x20, r0, 0x0, 0x0)

16:31:07 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0)
r2 = socket$nl_generic(0x10, 0x3, 0x10)
r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00')
sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r3, @ANYBLOB="21020000000000000000010000000c009900152600"], 0xc}}, 0x0)
r4 = socket$packet(0x11, 0x2, 0x300)
r5 = dup(r4)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
sendfile(r2, r1, 0x0, 0x100000001)

16:31:07 executing program 3:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = fcntl$dupfd(r1, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0)
r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)
ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60)
r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x81)
ioctl$KVM_SET_LAPIC(r5, 0x4400ae8f, &(0x7f0000000580)={"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"})
r6 = dup3(r3, r4, 0x0)
ioctl$KVM_TPR_ACCESS_REPORTING(r5, 0x4400ae8f, &(0x7f0000000080))
dup2(r6, r5)

16:31:07 executing program 5:
r0 = getpgid(0x0)
perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x1}}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
readv(r1, &(0x7f0000000040)=[{&(0x7f0000000240)=""/205, 0xcd}], 0x1)
ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000080)={'syzkaller0\x00', {0x2, 0x4e20, @broadcast}})
ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000180))
r2 = syz_open_dev$loop(&(0x7f0000000880)='/dev/loop#\x00', 0x0, 0x182)
inotify_init1(0x800)
r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0)
pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805)
ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3)
sendfile(r2, r2, 0x0, 0x24000000)
r4 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0)
mkdirat$cgroup(r4, &(0x7f0000000000)='syz1\x00', 0x1ff)
ioctl$LOOP_CLR_FD(r2, 0x4c01)
ioctl$LOOP_SET_FD(r2, 0x4c00, r3)
openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x200, 0x96)

16:31:07 executing program 0:
sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="054a38", @ANYRES16, @ANYBLOB="6ffe000000000000000003000000580001800d0001007564"], 0x3}}, 0x0)
sendto$unix(0xffffffffffffffff, &(0x7f0000000340)="53e0f2c2905e9916912f89b23f54185c0e90b38551c81ae3767d56fec3150cd9bd2db58e164473806c6aaaf6964a26b0de86f5fe037f85ea25f3228e5e6dc4672b11ee7418224b4bed0d668c93d4ad2a975309402c1c195f2bd1a1263e107b177c6288fe6160086efbcd133bab74435a30e5da929fcd65882c970886e36ef38c162bf17422221915d31ea852afbc6f78df1ea10fd20bd8cf77e433", 0x9b, 0x0, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@fwd, @array, @const={0xb}]}}, 0x0, 0x4a}, 0x20)
select(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100686cca8000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4807, 0x0)

16:31:07 executing program 2:
pipe(&(0x7f0000000000)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c000000020601000000000000000000000000080e0003006269746d61703a697000000005000400000000000900020073797a3000000000240007800c00028008000140ac1e00010c00018008000140a0000000050014000800000005000500020000000500010006"], 0x1}}, 0x0)
close(r2)
socket$nl_netfilter(0x10, 0x3, 0xc)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={<r3=>0xffffffffffffffff})
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x0)
splice(r0, 0x0, r2, 0x0, 0x6209, 0x0)

16:31:07 executing program 3:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = fcntl$dupfd(r1, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0)
r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)
ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60)
r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x81)
ioctl$KVM_SET_LAPIC(r5, 0x4400ae8f, &(0x7f0000000580)={"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"})
r6 = dup3(r3, r4, 0x0)
ioctl$KVM_TPR_ACCESS_REPORTING(r5, 0x4400ae8f, &(0x7f0000000080))
dup2(r6, r5)

[  315.586387] audit: type=1804 audit(1588955467.404:86): pid=13217 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir210500229/syzkaller.5IFUhd/210/cgroup.controllers" dev="sda1" ino=16470 res=1
[  315.620816] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  315.700819] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  315.775255] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock
16:31:07 executing program 3:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = fcntl$dupfd(r1, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0)
r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)
ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60)
r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x81)
ioctl$KVM_RUN(r5, 0xae80, 0x0)
r6 = dup3(r3, r4, 0x0)
ioctl$KVM_TPR_ACCESS_REPORTING(r5, 0x4400ae8f, &(0x7f0000000080))
dup2(r6, r5)

[  315.854092] EXT4-fs error (device loop0): ext4_get_journal_inode:4691: inode #8: comm syz-executor.0: iget: bad extended attribute block 50331648
[  315.896940] EXT4-fs (loop0): no journal found
16:31:07 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0)
r2 = socket$nl_generic(0x10, 0x3, 0x10)
r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00')
sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r3, @ANYBLOB="21020000000000000000010000000c00990015260000"], 0xc}}, 0x0)
r4 = socket$packet(0x11, 0x2, 0x300)
r5 = dup(r4)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
sendfile(r2, r1, 0x0, 0x100000001)

16:31:08 executing program 0:
sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="054a38", @ANYRES16, @ANYBLOB="6ffe000000000000000003000000580001800d0001007564"], 0x3}}, 0x0)
sendto$unix(0xffffffffffffffff, &(0x7f0000000340)="53e0f2c2905e9916912f89b23f54185c0e90b38551c81ae3767d56fec3150cd9bd2db58e164473806c6aaaf6964a26b0de86f5fe037f85ea25f3228e5e6dc4672b11ee7418224b4bed0d668c93d4ad2a975309402c1c195f2bd1a1263e107b177c6288fe6160086efbcd133bab74435a30e5da929fcd65882c970886e36ef38c162bf17422221915d31ea852afbc6f78df1ea10fd20bd8cf77e433", 0x9b, 0x0, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@fwd, @array, @const={0xb}]}}, 0x0, 0x4a}, 0x20)
select(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100686cca8000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4807, 0x0)

16:31:08 executing program 2:
pipe(&(0x7f0000000000)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c000000020601000000000000000000000000080e0003006269746d61703a697000000005000400000000000900020073797a3000000000240007800c00028008000140ac1e00010c00018008000140a0000000050014000800000005000500020000000500010006"], 0x1}}, 0x0)
close(r2)
socket$nl_netfilter(0x10, 0x3, 0xc)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={<r3=>0xffffffffffffffff})
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x0)
splice(r0, 0x0, r2, 0x0, 0x6209, 0x0)

[  316.261011] audit: type=1804 audit(1588955468.084:87): pid=13243 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir210500229/syzkaller.5IFUhd/211/cgroup.controllers" dev="sda1" ino=16470 res=1
16:31:08 executing program 5:
r0 = openat$rtc(0xffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0)
r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fcntl$setstatus(r1, 0x4, 0x42000)
ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, &(0x7f00000004c0))
ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x3, 0x8})
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={<r2=>0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000000)='em1\x00'}, 0x30)
ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r2, 0x10, &(0x7f0000000080))
r3 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r3, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10)
sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10)
writev(r3, &(0x7f0000001c80)=[{&(0x7f0000001d80)="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", 0x1b1}, {&(0x7f00000016c0)="7507747dd9bcc24bc9201e9ab3851c2352e456a59990f36599f89b848cf73dba62e0ee4d214b4ea417ba047283d923aa85916b00b017843fb4dd334d8bf4ab10c73e81992e6fd44138b794415b5cc26106b7db3a6b8796ce064e031f8f35e3f749cb730bb38dcfb2cf9155bf417d427a6ea7c2284e317a87736058c4140d8fe5d67450f4e38f91d2457b1f20672e51d2a112668d", 0x94}, {&(0x7f0000001780)="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", 0xff02}, {&(0x7f0000000240)="12c71968000337b1b2f259279cf3cbae68b4a79f199aa96eeb040a55e0754425be97eaef95fe75f97589b483f7", 0x2d}, {&(0x7f0000001400)="08e86f253471f8584cf7bc71385fcddcbfa4e8f3124ea5b928a61864fd231d182c245c939bf9bb3d505939d05143aae47802dca92d850500564444dea266a90000d7cb1d9971d4e18eaca43b25b27710b0e677e9a263d82203c1ac6afb8d11f0d6a6ea388d7c600b74ce740020fa3ca09c9a387f06cfaa889ac1bcdb33788aa5995060573eb060d0f503771e6308466d4ba91321", 0x94}, {&(0x7f0000000080)="132419b3d35b8af26552785e69b97c1d6aa4d97ec22836c5db91d23988a3a977831aaeb84c43b98d62da16114deafd83114df5134a4487dd857700", 0x3b}, {&(0x7f0000001600)="0ebbb218be8d3954e135df5f396071992eaf48c6be4575b2cd72fafc81e3f622ab81bfb5e04f14d17c07fe83b134220a96be624987f9ee8bdc941ee0455bfd319b6812e89ad48ebe1e3f924f9467125948fbe0fd43d11c277ad671710da0a26430c907cce20848c55cb51bd29bc14120d0f35700eed18d4b01c01ce4e70800000076628888dbdbf14a77083aa99620ea3327afa7ee0edbab96b0c24e3aff00475c", 0xa1}, {&(0x7f0000000180)}, {0x0}, {&(0x7f0000001500)}, {&(0x7f0000000200)="351ce2be840483e42ad559c760174fbc8a7236d9b0d4000000000000000000", 0x1f}, {0x0, 0x62}], 0xc)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32, @ANYBLOB="000000b604000000280012000900010076657468"], 0x48}}, 0x0)
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0)
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000001140)=@newtfilter={0x3c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {}, {0x5}}, [@filter_kind_options=@f_bpf={{0x8, 0x1, 'bpf\x00'}, {0x10, 0x2, [@TCA_BPF_OPS={{0x6, 0x4, 0x4}, {0x4}}]}}]}, 0x3c}}, 0x0)
sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001580)={&(0x7f0000001f40)={0x218, 0x0, 0x100, 0x70bd27, 0x25dfdbff, {}, [{{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x5}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x40}}}]}}, {{0x8}, {0x104, 0x2, 0x0, 0x1, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x10001}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x5}, {0x8}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0x10001}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x116}}}]}}]}, 0x218}, 0x1, 0x0, 0x0, 0x10}, 0x1)
ioctl$RTC_WKALM_SET(r0, 0x7001, 0x0)
r4 = socket(0x28, 0xa, 0x32)
getsockopt$IP_VS_SO_GET_INFO(r4, 0x0, 0x481, &(0x7f0000000340), &(0x7f0000000380)=0xc)
r5 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c')

[  316.621851] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  316.678404] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  316.699847] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  316.784983] EXT4-fs error (device loop0): ext4_get_journal_inode:4691: inode #8: comm syz-executor.0: iget: bad extended attribute block 50331648
[  316.884671] EXT4-fs (loop0): no journal found
16:31:10 executing program 4:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x11b}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x40)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$cont(0x20, r0, 0x0, 0x0)

16:31:10 executing program 3:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = fcntl$dupfd(r1, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0)
r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)
ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60)
r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x81)
ioctl$KVM_RUN(r5, 0xae80, 0x0)
r6 = dup3(r3, r4, 0x0)
ioctl$KVM_TPR_ACCESS_REPORTING(r5, 0x4400ae8f, &(0x7f0000000080))
dup2(r6, r5)

16:31:10 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0)
r2 = socket$nl_generic(0x10, 0x3, 0x10)
r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00')
sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r3, @ANYBLOB="21020000000000000000010000000c00990015260000"], 0xc}}, 0x0)
r4 = socket$packet(0x11, 0x2, 0x300)
r5 = dup(r4)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
sendfile(r2, r1, 0x0, 0x100000001)

16:31:10 executing program 2:
pipe(&(0x7f0000000000)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = socket$inet_udp(0x2, 0x2, 0x0)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c000000020601000000000000000000000000080e0003006269746d61703a697000000005000400000000000900020073797a3000000000240007800c00028008000140ac1e00010c00018008000140a0000000050014000800000005000500020000000500010006"], 0x1}}, 0x0)
close(r1)
socket$nl_netfilter(0x10, 0x3, 0xc)
write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={<r2=>0xffffffffffffffff})
r3 = dup(r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x6209, 0x0)

16:31:10 executing program 0:
sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="054a38", @ANYRES16, @ANYBLOB="6ffe000000000000000003000000580001800d0001007564"], 0x3}}, 0x0)
sendto$unix(0xffffffffffffffff, &(0x7f0000000340)="53e0f2c2905e9916912f89b23f54185c0e90b38551c81ae3767d56fec3150cd9bd2db58e164473806c6aaaf6964a26b0de86f5fe037f85ea25f3228e5e6dc4672b11ee7418224b4bed0d668c93d4ad2a975309402c1c195f2bd1a1263e107b177c6288fe6160086efbcd133bab74435a30e5da929fcd65882c970886e36ef38c162bf17422221915d31ea852afbc6f78df1ea10fd20bd8cf77e433", 0x9b, 0x0, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@fwd, @array, @const={0xb}]}}, 0x0, 0x4a}, 0x20)
select(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100686cca8000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4807, 0x0)

[  318.809802] audit: type=1804 audit(1588955470.634:88): pid=13295 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir210500229/syzkaller.5IFUhd/212/cgroup.controllers" dev="sda1" ino=16485 res=1
[  318.863422] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  318.954989] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  319.033217] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock
[  319.105649] EXT4-fs error (device loop0): ext4_get_journal_inode:4691: inode #8: comm syz-executor.0: iget: bad extended attribute block 50331648
[  319.211205] EXT4-fs (loop0): no journal found
16:31:12 executing program 2:
pipe(&(0x7f0000000000)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = socket$inet_udp(0x2, 0x2, 0x0)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c000000020601000000000000000000000000080e0003006269746d61703a697000000005000400000000000900020073797a3000000000240007800c00028008000140ac1e00010c00018008000140a0000000050014000800000005000500020000000500010006"], 0x1}}, 0x0)
close(r1)
socket$nl_netfilter(0x10, 0x3, 0xc)
write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={<r2=>0xffffffffffffffff})
r3 = dup(r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x6209, 0x0)

16:31:12 executing program 3:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = fcntl$dupfd(r1, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0)
r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)
ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60)
r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x81)
ioctl$KVM_RUN(r5, 0xae80, 0x0)
r6 = dup3(r3, r4, 0x0)
ioctl$KVM_TPR_ACCESS_REPORTING(r5, 0x4400ae8f, &(0x7f0000000080))
dup2(r6, r5)

16:31:13 executing program 4:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x11b}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x40)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

16:31:45 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0)
r2 = socket$nl_generic(0x10, 0x3, 0x10)
r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00')
sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r3, @ANYBLOB="21020000000000000000010000000c00990015260000"], 0xc}}, 0x0)
r4 = socket$packet(0x11, 0x2, 0x300)
r5 = dup(r4)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
sendfile(r2, r1, 0x0, 0x100000001)

[  451.340469] rcu: INFO: rcu_preempt self-detected stall on CPU
[  451.346708] rcu: 	1-....: (10499 ticks this GP) idle=826/1/0x4000000000000004 softirq=36260/36260 fqs=5196 
[  451.357200] rcu: 	 (t=10500 jiffies g=33953 q=159939)
[  451.362399] NMI backtrace for cpu 1
[  451.366024] CPU: 1 PID: 13259 Comm: syz-executor.5 Not tainted 4.19.121-syzkaller #0
[  451.373898] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  451.383318] Call Trace:
[  451.385881]  <IRQ>
[  451.388135]  dump_stack+0x188/0x20d
[  451.391754]  nmi_cpu_backtrace.cold+0x63/0xa2
[  451.396230]  ? lapic_can_unplug_cpu.cold+0x44/0x44
[  451.401147]  nmi_trigger_cpumask_backtrace+0x1a6/0x1eb
[  451.406409]  rcu_dump_cpu_stacks+0x170/0x1bb
[  451.410812]  rcu_check_callbacks.cold+0x634/0xddc
[  451.415725]  ? trace_hardirqs_off+0x50/0x200
[  451.420128]  update_process_times+0x2a/0x70
[  451.424427]  tick_sched_handle+0x9b/0x180
[  451.428563]  tick_sched_timer+0x42/0x130
[  451.432603]  __hrtimer_run_queues+0x2fc/0xd50
[  451.437076]  ? tick_sched_do_timer+0x1a0/0x1a0
[  451.441648]  ? hrtimer_fixup_activate+0x30/0x30
[  451.446319]  ? kvm_clock_read+0x14/0x30
[  451.450288]  ? ktime_get_update_offsets_now+0x2db/0x450
[  451.455644]  hrtimer_interrupt+0x312/0x770
[  451.459931]  smp_apic_timer_interrupt+0x10c/0x550
[  451.464758]  apic_timer_interrupt+0xf/0x20
[  451.468975] RIP: 0010:_raw_spin_unlock_irqrestore+0x91/0xe0
[  451.474666] Code: 48 c7 c0 c8 56 d2 88 48 ba 00 00 00 00 00 fc ff df 48 c1 e8 03 80 3c 10 00 75 37 48 83 3d 7e bb b0 01 00 74 22 48 89 df 57 9d <0f> 1f 44 00 00 bf 01 00 00 00 e8 a0 1f 25 fa 65 8b 05 69 52 e0 78
[  451.493631] RSP: 0018:ffff8880ae707cf8 EFLAGS: 00000282 ORIG_RAX: ffffffffffffff13
[  451.501315] RAX: 1ffffffff11a4ad9 RBX: 0000000000000282 RCX: 1ffff11013f8b9c5
[  451.508586] RDX: dffffc0000000000 RSI: ffff88809fc5ce08 RDI: 0000000000000282
[  451.516018] RBP: ffffffff8ba84348 R08: ffff88809fc5c580 R09: 0000000000000000
[  451.523283] R10: 0000000000000000 R11: 0000000000000000 R12: ffff88804c630c78
[  451.530550] R13: dffffc0000000000 R14: 1ffff11015ce0fa8 R15: ffffffff8ba84348
[  451.537800]  ? apic_timer_interrupt+0xa/0x20
[  451.542232]  debug_object_active_state+0x25d/0x380
[  451.547141]  ? debug_object_deactivate+0x360/0x360
[  451.552063]  ? lock_downgrade+0x740/0x740
[  451.556193]  ? kfree+0xe4/0x220
[  451.559451]  ? rcu_process_callbacks+0xc3c/0x17f0
[  451.564271]  ? lockdep_hardirqs_on+0x196/0x5d0
[  451.568844]  rcu_process_callbacks+0xbde/0x17f0
[  451.573497]  ? add_timer+0xab0/0xab0
[  451.577197]  ? __rcu_read_unlock+0x160/0x160
[  451.581589]  __do_softirq+0x26c/0x93c
[  451.585372]  irq_exit+0x17b/0x1c0
[  451.588803]  smp_apic_timer_interrupt+0x136/0x550
[  451.593636]  apic_timer_interrupt+0xf/0x20
[  451.597856]  </IRQ>
[  451.600072] RIP: 0010:lock_release+0x42b/0x820
[  451.604633] Code: 84 08 00 00 00 00 00 00 48 c1 e8 03 80 3c 10 00 0f 85 e4 02 00 00 48 83 3d d9 84 82 07 00 0f 84 36 02 00 00 48 8b 3c 24 57 9d <0f> 1f 44 00 00 48 b8 00 00 00 00 00 fc ff df 48 c7 04 03 00 00 00
[  451.623530] RSP: 0018:ffff88804913f668 EFLAGS: 00000282 ORIG_RAX: ffffffffffffff13
[  451.631219] RAX: 1ffffffff11a4ad9 RBX: 1ffff11009227ed1 RCX: 1ffff11013f8b9bf
[  451.638466] RDX: dffffc0000000000 RSI: 0000000000000002 RDI: 0000000000000282
[  451.645715] RBP: ffff88809fc5c580 R08: 0000000000000000 R09: 0000000000000001
[  451.652962] R10: ffffed1015ce4732 R11: ffff8880ae723993 R12: ffffffff81a37fbf
[  451.660209] R13: 0000000000000003 R14: ffff88809fc5c580 R15: 0000000000000002
[  451.667469]  ? __unlock_page_memcg+0x4f/0x100
[  451.671954]  ? lock_downgrade+0x740/0x740
[  451.676086]  page_remove_rmap+0x55e/0x1260
[  451.680303]  unmap_page_range+0xcec/0x1de0
[  451.684525]  ? vm_normal_page_pmd+0x2d0/0x2d0
[  451.689003]  ? retint_kernel+0x2d/0x2d
[  451.692869]  ? uprobe_munmap+0x2d/0x2a0
[  451.696841]  unmap_single_vma+0x196/0x300
[  451.701026]  unmap_vmas+0xa9/0x180
[  451.704557]  exit_mmap+0x2b2/0x510
[  451.708125]  ? __ia32_sys_munmap+0x80/0x80
[  451.712344]  ? lockdep_hardirqs_on+0x40b/0x5d0
[  451.717002]  ? __khugepaged_exit+0x2e4/0x3d0
[  451.721391]  ? mmput+0x13f/0x4a0
[  451.724750]  mmput+0x14e/0x4a0
[  451.727922]  do_exit+0xac8/0x2f30
[  451.731398]  ? firmware_map_remove+0x19a/0x19a
[  451.736007]  ? mm_update_next_owner+0x650/0x650
[  451.740665]  ? ___preempt_schedule+0x16/0x18
[  451.745152]  ? preempt_schedule_common+0x4a/0xc0
[  451.749904]  do_group_exit+0x125/0x350
[  451.753795]  get_signal+0x3ec/0x1f90
[  451.757952]  do_signal+0x8f/0x1710
[  451.761478]  ? lock_downgrade+0x740/0x740
[  451.765604]  ? setup_sigcontext+0x820/0x820
[  451.769907]  ? __might_fault+0x192/0x1d0
[  451.773991]  ? _copy_to_user+0xb8/0x100
[  451.777948]  ? put_timespec64+0xcb/0x120
[  451.781985]  ? nsecs_to_jiffies+0x30/0x30
[  451.786117]  ? __x64_sys_clock_gettime+0x165/0x240
[  451.791026]  ? exit_to_usermode_loop+0x36/0x2b0
[  451.795686]  exit_to_usermode_loop+0x22b/0x2b0
[  451.800302]  do_syscall_64+0x538/0x620
[  451.804193]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  451.809366] RIP: 0033:0x45f66a
[  451.812568] Code: Bad RIP value.
[  451.815911] RSP: 002b:00007fbf53429c58 EFLAGS: 00000246 ORIG_RAX: 00000000000000e4
[  451.823627] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 000000000045f66a
[  451.831016] RDX: 000000000000024e RSI: 00007fbf53429c60 RDI: 0000000000000001
[  451.838271] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000
[  451.845522] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
[  451.852797] R13: 00000000000031c0 R14: 00000000004c353a R15: 00007fbf5342a6d4
[  451.960444] rcu: INFO: rcu_sched detected stalls on CPUs/tasks:
[  451.966569] rcu: 	1-....: (1 GPs behind) idle=826/1/0x4000000000000004 softirq=36257/36260 fqs=5196 
[  451.975913] rcu: 	(detected by 0, t=10563 jiffies, g=437, q=1)
[  451.981885] Sending NMI from CPU 0 to CPUs 1:
[  451.987466] NMI backtrace for cpu 1
[  451.987472] CPU: 1 PID: 13259 Comm: syz-executor.5 Not tainted 4.19.121-syzkaller #0
[  451.987477] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  451.987479] RIP: 0010:mark_lock+0x13/0x11b0
[  451.987489] Code: d2 88 e8 80 4f 4e 00 eb 8a 48 c7 c7 00 eb 9f 8b e8 62 4f 4e 00 eb c3 48 b8 00 00 00 00 00 fc ff df 41 57 89 d1 41 89 d7 41 56 <49> 89 fe 41 55 4c 8d 6e 20 4c 89 ea 41 54 41 bc 01 00 00 00 55 48
[  451.987492] RSP: 0018:ffff8880ae707948 EFLAGS: 00000046
[  451.987499] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: 0000000000000008
[  451.987503] RDX: 0000000000000008 RSI: ffff88809fc5ce58 RDI: ffff88809fc5c580
[  451.987507] RBP: ffff8880ae707b28 R08: 0000000000000000 R09: 0000000000000002
[  451.987511] R10: ffff88809fc5ce58 R11: 000000000000002d R12: 0000000000000000
[  451.987515] R13: 00000000000a602d R14: ffff88809fc5c580 R15: 0000000000000008
[  451.987519] FS:  00007fbf5342a700(0000) GS:ffff8880ae700000(0000) knlGS:0000000000000000
[  451.987523] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  451.987527] CR2: 000000000045f640 CR3: 000000009fb98000 CR4: 00000000001406e0
[  451.987531] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  451.987535] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  451.987537] Call Trace:
[  451.987539]  <IRQ>
[  451.987542]  __lock_acquire+0x6ee/0x49c0
[  451.987545]  ? __lock_acquire+0x6ee/0x49c0
[  451.987547]  ? mark_held_locks+0xf0/0xf0
[  451.987550]  ? debug_object_activate+0x206/0x4e0
[  451.987553]  ? mark_held_locks+0xf0/0xf0
[  451.987556]  ? mark_held_locks+0xf0/0xf0
[  451.987559]  ? clockevents_program_event+0x14a/0x350
[  451.987561]  lock_acquire+0x170/0x400
[  451.987564]  ? kill_fasync+0x3d/0x470
[  451.987566]  kill_fasync+0x6c/0x470
[  451.987569]  ? kill_fasync+0x3d/0x470
[  451.987572]  perf_event_wakeup+0x267/0x3c0
[  451.987575]  perf_pending_event+0x10f/0x180
[  451.987577]  irq_work_run_list+0x140/0x1c0
[  451.987580]  irq_work_run+0x4e/0xc0
[  451.987583]  ? rcu_read_lock_sched_held+0x10a/0x130
[  451.987586]  smp_irq_work_interrupt+0x98/0x440
[  451.987589]  irq_work_interrupt+0xf/0x20
[  451.987591] RIP: 0010:write_comp_data+0x9/0x70
[  451.987601] Code: 80 dc 12 00 00 48 8b 11 48 83 c2 01 48 39 d0 76 07 48 89 34 d1 48 89 11 c3 0f 1f 84 00 00 00 00 00 65 4c 8b 04 25 40 ee 01 00 <65> 8b 05 d0 23 9a 7e a9 00 01 1f 00 75 51 41 8b 80 d8 12 00 00 83
[  451.987604] RSP: 0018:ffff8880ae707d70 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff09
[  451.987610] RAX: ffff88809fc5c580 RBX: 0000000000000103 RCX: ffffffff8357b1b3
[  451.987614] RDX: 0000000000000103 RSI: 0000000000000000 RDI: 0000000000000005
[  451.987618] RBP: ffffffff87cb0320 R08: ffff88809fc5c580 R09: ffffed1015ce4733
[  451.987622] R10: ffffed1015ce4732 R11: ffff8880ae723993 R12: 0000000000000001
[  451.987626] R13: ffffffff87cb02e0 R14: ffff8880ae707e90 R15: dffffc0000000000
[  451.987629]  ? irq_work_interrupt+0xa/0x20
[  451.987632]  ? check_preemption_disabled+0x33/0x280
[  451.987635]  check_preemption_disabled+0x33/0x280
[  451.987638]  rcu_lockdep_current_cpu_online+0xb2/0x1b0
[  451.987642]  ? rcu_dynticks_curr_cpu_in_eqs+0x4c/0xa0
[  451.987645]  ? rcu_process_callbacks+0xc3c/0x17f0
[  451.987648]  rcu_read_lock_sched_held+0x92/0x130
[  451.987650]  kfree+0x1f2/0x220
[  451.987653]  rcu_process_callbacks+0xc3c/0x17f0
[  451.987656]  ? add_timer+0xab0/0xab0
[  451.987659]  ? __rcu_read_unlock+0x160/0x160
[  451.987661]  __do_softirq+0x26c/0x93c
[  451.987664]  irq_exit+0x17b/0x1c0
[  451.987667]  smp_apic_timer_interrupt+0x136/0x550
[  451.987669]  apic_timer_interrupt+0xf/0x20
[  451.987671]  </IRQ>
[  451.987674] RIP: 0010:lock_release+0x42b/0x820
[  451.987683] Code: 84 08 00 00 00 00 00 00 48 c1 e8 03 80 3c 10 00 0f 85 e4 02 00 00 48 83 3d d9 84 82 07 00 0f 84 36 02 00 00 48 8b 3c 24 57 9d <0f> 1f 44 00 00 48 b8 00 00 00 00 00 fc ff df 48 c7 04 03 00 00 00
[  451.987686] RSP: 0018:ffff88804913f668 EFLAGS: 00000282 ORIG_RAX: ffffffffffffff13
[  451.987693] RAX: 1ffffffff11a4ad9 RBX: 1ffff11009227ed1 RCX: 1ffff11013f8b9bf
[  451.987697] RDX: dffffc0000000000 RSI: 0000000000000002 RDI: 0000000000000282
[  451.987701] RBP: ffff88809fc5c580 R08: 0000000000000000 R09: 0000000000000001
[  451.987705] R10: ffffed1015ce4732 R11: ffff8880ae723993 R12: ffffffff81a37fbf
[  451.987709] R13: 0000000000000003 R14: ffff88809fc5c580 R15: 0000000000000002
[  451.987712]  ? __unlock_page_memcg+0x4f/0x100
[  451.987715]  ? lock_downgrade+0x740/0x740
[  451.987718]  page_remove_rmap+0x55e/0x1260
[  451.987720]  unmap_page_range+0xcec/0x1de0
[  451.987723]  ? vm_normal_page_pmd+0x2d0/0x2d0
[  451.987726]  ? retint_kernel+0x2d/0x2d
[  451.987729]  ? uprobe_munmap+0x2d/0x2a0
[  451.987731]  unmap_single_vma+0x196/0x300
[  451.987734]  unmap_vmas+0xa9/0x180
[  451.987736]  exit_mmap+0x2b2/0x510
[  451.987739]  ? __ia32_sys_munmap+0x80/0x80
[  451.987742]  ? lockdep_hardirqs_on+0x40b/0x5d0
[  451.987745]  ? __khugepaged_exit+0x2e4/0x3d0
[  451.987747]  ? mmput+0x13f/0x4a0
[  451.987749]  mmput+0x14e/0x4a0
[  451.987752]  do_exit+0xac8/0x2f30
[  451.987755]  ? firmware_map_remove+0x19a/0x19a
[  451.987758]  ? mm_update_next_owner+0x650/0x650
[  451.987760]  ? ___preempt_schedule+0x16/0x18
[  451.987764]  ? preempt_schedule_common+0x4a/0xc0
[  451.987766]  do_group_exit+0x125/0x350
[  451.987769]  get_signal+0x3ec/0x1f90
[  451.987771]  do_signal+0x8f/0x1710
[  451.987774]  ? lock_downgrade+0x740/0x740
[  451.987777]  ? setup_sigcontext+0x820/0x820
[  451.987779]  ? __might_fault+0x192/0x1d0
[  451.987782]  ? _copy_to_user+0xb8/0x100
[  451.987785]  ? put_timespec64+0xcb/0x120
[  451.987787]  ? nsecs_to_jiffies+0x30/0x30
[  451.987790]  ? __x64_sys_clock_gettime+0x165/0x240
[  451.987793]  ? exit_to_usermode_loop+0x36/0x2b0
[  451.987796]  exit_to_usermode_loop+0x22b/0x2b0
[  451.987799]  do_syscall_64+0x538/0x620
[  451.987802]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  451.987804] RIP: 0033:0x45f66a
[  451.987807] Code: Bad RIP value.
[  451.987810] RSP: 002b:00007fbf53429c58 EFLAGS: 00000246 ORIG_RAX: 00000000000000e4
[  451.987817] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 000000000045f66a
[  451.987821] RDX: 000000000000024e RSI: 00007fbf53429c60 RDI: 0000000000000001
[  451.987825] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000
[  451.987829] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
[  451.987833] R13: 00000000000031c0 R14: 00000000004c353a R15: 00007fbf5342a6d4