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"}]}]}, 0xf78}}, 0x0) 03:03:06 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x1001}], 0x0, &(0x7f0000000040)) 03:03:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x8901, &(0x7f00000000c0)) 03:03:06 executing program 5: madvise(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4) 03:03:06 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x8953, &(0x7f00000000c0)) 03:03:06 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_buf(r0, 0x6, 0x11, &(0x7f00000002c0)="fe7619d0", 0x4) 03:03:06 executing program 5: prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffe000/0x1000)=nil) 03:03:06 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x1800}], 0x0, &(0x7f0000000040)) 03:03:06 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x852, 0x4) 03:03:06 executing program 4: r0 = getpid() process_vm_readv(r0, &(0x7f0000000e00)=[{&(0x7f0000000c80)=""/207, 0xcf}, {&(0x7f0000000d80)=""/58, 0x3a}], 0x2, &(0x7f0000002080)=[{&(0x7f0000000f40)=""/4096, 0x1000}], 0x1, 0x0) 03:03:06 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000000c0)) 03:03:06 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_buf(r0, 0x6, 0x10, &(0x7f00000002c0)="fe7619d0", 0x4) 03:03:06 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x8906, 0x0) 03:03:06 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x2900}], 0x0, &(0x7f0000000040)) 03:03:06 executing program 5: syz_open_procfs$namespace(0x0, &(0x7f0000006100)='ns/user\x00') 03:03:06 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) 03:03:06 executing program 2: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x6000) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x4000) 03:03:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x8904, &(0x7f00000000c0)) 03:03:06 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x102) 03:03:06 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x2e00}], 0x0, &(0x7f0000000040)) 03:03:06 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x40086602, 0x0) 03:03:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0xc0189436, &(0x7f00000000c0)) 03:03:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(r0, 0x11, 0xb, 0x0, &(0x7f0000000040)) 03:03:06 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/power/wake_unlock', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000180)) 03:03:06 executing program 2: r0 = getpid() process_vm_readv(r0, &(0x7f0000000340)=[{0x0}, {&(0x7f00000000c0)=""/51, 0x33}], 0x2, &(0x7f0000000580)=[{&(0x7f00000003c0)=""/227, 0xe3}, {0x0}], 0x2, 0x0) 03:03:06 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000080), r0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICLIST(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 03:03:06 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x1ffff}], 0x0, &(0x7f0000000040)) 03:03:06 executing program 3: clock_gettime(0x0, &(0x7f0000000200)={0x0}) pselect6(0x40, &(0x7f0000000140)={0x7}, &(0x7f0000000180)={0x2}, 0x0, &(0x7f0000000240)={r0}, 0x0) 03:03:06 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5450, 0x0) 03:03:06 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$RTC_UIE_OFF(r0, 0x7004) 03:03:06 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000ff9000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) 03:03:06 executing program 5: socketpair(0x0, 0x7032e72dc141de38, 0x0, 0x0) 03:03:06 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x40000800}], 0x0, &(0x7f0000000040)) 03:03:06 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_buf(r0, 0x6, 0x19, &(0x7f00000002c0)='\x00\x00\x00\x00', 0x4) 03:03:06 executing program 3: r0 = socket(0x11, 0x2, 0x0) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 03:03:06 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_buf(r0, 0x6, 0x12, &(0x7f00000000c0)="008ce952", 0x4) 03:03:06 executing program 4: r0 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x6000) shmat(r0, &(0x7f0000ff9000/0x4000)=nil, 0x6000) 03:03:06 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x7, &(0x7f0000000000)=0x6, 0x4) 03:03:06 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5451, 0x0) 03:03:06 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5460, 0x0) 03:03:06 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0xffffffffffffffff}], 0x0, &(0x7f0000000040)) 03:03:06 executing program 0: r0 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) shmat(r0, &(0x7f0000ffc000/0x4000)=nil, 0x6000) shmat(r0, &(0x7f0000ffd000/0x3000)=nil, 0x4000) 03:03:06 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x14, 0x0, 0x1}, 0x14}}, 0x0) 03:03:06 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x8916, 0x0) 03:03:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x894c, 0x0) 03:03:06 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x2, &(0x7f0000000040)) 03:03:07 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x4, &(0x7f0000000140)=0x8, 0x4) 03:03:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) 03:03:07 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/block/sda', 0x0, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/module/asix', 0x0, 0x0) renameat2(r0, &(0x7f0000000100)='./file0\x00', r1, &(0x7f0000000180)='./file0\x00', 0x0) 03:03:07 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_buf(r0, 0x6, 0x3, &(0x7f00000002c0)="fe7619d0", 0x4) 03:03:07 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={0x0, 0x284}}, 0x0) 03:03:07 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x3, &(0x7f0000000040)) 03:03:07 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000010500)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000900000010", 0x3d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuacct.stat\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x6, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0xffffff1f) socket$netlink(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) 03:03:07 executing program 2: io_setup(0x5, &(0x7f0000000000)=0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) io_submit(r0, 0x2, &(0x7f00000005c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0x0, r2, 0x0, 0x0, 0x8}]) 03:03:07 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) mkdirat(0xffffffffffffffff, 0x0, 0x0) sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)=ANY=[@ANYBLOB='|\x00\x00\x00', @ANYRES16, @ANYBLOB='!'], 0x7c}}, 0x0) 03:03:07 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_int(r0, 0x29, 0x12, 0x0, &(0x7f0000001100)) 03:03:07 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x890b, &(0x7f00000000c0)) 03:03:07 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x4, &(0x7f0000000040)) 03:03:07 executing program 4: accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000040)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000080)) 03:03:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x40049409, &(0x7f00000000c0)) 03:03:07 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) 03:03:07 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x5, &(0x7f0000000040)) 03:03:07 executing program 2: prlimit64(0x0, 0x0, 0x0, &(0x7f0000002300)) 03:03:07 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x8940, &(0x7f00000000c0)) 03:03:07 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_EEE_SET(r0, &(0x7f0000001340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001300)={&(0x7f0000000040)={0xec4, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_EEE_ENABLED={0x5}, @ETHTOOL_A_EEE_TX_LPI_TIMER={0x8}, @ETHTOOL_A_EEE_MODES_OURS={0x50, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_BITS={0x24, 0x3, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}, @ETHTOOL_A_EEE_TX_LPI_TIMER={0x8}, @ETHTOOL_A_EEE_ENABLED={0x5}, @ETHTOOL_A_EEE_MODES_OURS={0x4}, @ETHTOOL_A_EEE_MODES_OURS={0xe3c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_VALUE={0x101, 0x4, "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"}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_MASK={0xd1d, 0x5, "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"}]}]}, 0xec4}}, 0x0) 03:03:07 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x6, &(0x7f0000000040)) 03:03:07 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0xc0189436, 0x0) 03:03:07 executing program 2: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000180)='/sys/kernel/uevent_helper', 0x108002, 0x0) 03:03:07 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x8941, &(0x7f00000000c0)) 03:03:07 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000000400)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x5fe}], 0x0, &(0x7f0000000140)={[{@iocharset={'iocharset', 0x3d, 'utf8'}, 0xa}]}) 03:03:07 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$RTC_ALM_SET(r0, 0x40247007, 0x0) [ 1082.252545][T19419] loop5: detected capacity change from 0 to 5 03:03:07 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x7, &(0x7f0000000040)) 03:03:07 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_EEE_SET(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)={&(0x7f0000000040)={0x11a8, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_EEE_ENABLED={0x5}, @ETHTOOL_A_EEE_TX_LPI_TIMER={0x8, 0x7, 0x5}, @ETHTOOL_A_EEE_MODES_OURS={0x50, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0xc0}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0xff}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_BITS={0x24, 0x3, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7fffffff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x100}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}, @ETHTOOL_A_EEE_TX_LPI_TIMER={0x8, 0x7, 0x1000}, @ETHTOOL_A_EEE_ENABLED={0x5, 0x5, 0x1}, @ETHTOOL_A_EEE_MODES_OURS={0x4}, @ETHTOOL_A_EEE_MODES_OURS={0x1120, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x7be57cfb}, @ETHTOOL_A_BITSET_VALUE={0x102, 0x4, "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"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1}, @ETHTOOL_A_BITSET_MASK={0x1004, 0x5, "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"}]}]}, 0x11a8}, 0x1, 0x0, 0x0, 0x40005}, 0x0) 03:03:07 executing program 4: linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x800) [ 1082.294845][T19419] FAT-fs (loop5): IO charset utf8 [ 1082.294845][T19419] not found 03:03:07 executing program 2: shmat(0x0, &(0x7f0000ffb000/0x2000)=nil, 0x5000) 03:03:07 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={0x24, 0x1, 0x4, 0x201, 0x0, 0x0, {}, [@NFULA_CFG_QTHRESH={0x8}, @NFULA_CFG_CMD={0x5, 0x1, 0x1}]}, 0x24}}, 0x0) 03:03:07 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000300)="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", 0x2e9, 0x11580}], 0x0, &(0x7f00000000c0)) 03:03:07 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_buf(r0, 0x6, 0xa, &(0x7f00000002c0)="fe7619d0", 0x4) [ 1082.347233][T19419] loop5: detected capacity change from 0 to 5 [ 1082.387229][T19419] FAT-fs (loop5): IO charset utf8 [ 1082.387229][T19419] not found 03:03:07 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x8, &(0x7f0000000040)) 03:03:07 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000000400)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x5fe}], 0x0, &(0x7f0000000140)={[{@iocharset={'iocharset', 0x3d, 'utf8'}, 0xa}]}) 03:03:07 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_EEE_SET(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)={&(0x7f0000000040)={0xf90, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_EEE_ENABLED={0x5}, @ETHTOOL_A_EEE_TX_LPI_TIMER={0x8, 0x7, 0x5}, @ETHTOOL_A_EEE_MODES_OURS={0x38, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_BITS={0x1c, 0x3, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x100}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}, @ETHTOOL_A_EEE_TX_LPI_TIMER={0x8, 0x7, 0x1000}, @ETHTOOL_A_EEE_ENABLED={0x5, 0x5, 0x1}, @ETHTOOL_A_EEE_MODES_OURS={0x4}, @ETHTOOL_A_EEE_MODES_OURS={0xf20, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x7be57cfb}, @ETHTOOL_A_BITSET_VALUE={0x102, 0x4, "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"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1}, @ETHTOOL_A_BITSET_MASK={0xe04, 0x5, "5331164be9389e9b15a7fafc291e59777c6e12a0739f1c389ff06cca6b16a78e069358348e76ed2a3da4502c6da65cc2c82dabaedf34d12db3cd5861b3e7b5eaa69b416a10742bd899d087e67f6a2d78b9691d4174622fe4873b56b81cd05d91ff875fda7eeee797d81d633ec629708a6cf5a3492f84f5fa97148e40c133cc83fb43fb76953bea7a55232ad75d828f9031bc67c6610b85e747b3937dff10308b275ac2d480c064040619b7ad3b092752fcc882284d8a3f5f9b797750eee1642f619024f9c633d5c3f5210c2e1aa71eea28ae9c5591aa1743879130435fb8416c1d380b8b0533797234cd3d524967201ccc83be05651661dff8d674c652e7c8cf7fb181c0fa36c458d8ac5887f483819098d438698d1dd92c65823303470eba337f084339b72b9a50231bef3b60c58929330cdcaefe628b4d14da83fe180360cc1ff1a37024b4b924594e443bb29416af7bb89ab02d86af32cdaaf8aacc0938aae26b09d81edb9f0b2b7ec4890347a3d7e272476dfe00926f3d05c54b85a3c11c7e656da6ca63e1f974428f920148370e28ec7ef179ab94450389db07ed0405f39d4e05c2984abf95281d8e541011a7285c991956cb5a1e1df7a798aab759ffdef5a9837a3eabba42e7eba84f7ebdf916a72292e731d3e70326858e24580896046e7187f7a5cd703fbd35d6c5608e2f99956362cd37a7ba8483262bdc529a0723f700ffbadc30ed0ae7723702e2f28ce3ac477acebcddc7a91c5b04ba377567641c0a3384b8c2ac92c0793257973f1fe674d4d4403a8bcfd70eda9478607882cdd4232a7ea56601e7f70806ad74aeb7aed1a9607ce46ba9da2232cab1c98eb469e1910384e8cb21c4d9c7a621c92680b419f40c7d783a143efc974930a0abd5aa6b3ba6d5e3eb2ad0138d3232f1e165894a2a144cda9b9194c6cda34379b633ddaa69578f65a4832e158a6f5b711b7dbf5cbb8f7924c82f47d07fd5aa246ea3a6afbc749744b2f2f63b5be55ed327e46bd398f3b2fe34a55156762b69834a41f55aa29928231b4d3c27515deba6e898c8c0d637e8022bb5b7f350b3d5d6901957f45837e38d9babc19e3bd366e579ec04ec7a284d451c8f88835ec325e44722ed74d040400191a1bcca298a1e6256608f12b95fc42ed0063423f1bc920fd9ac3d1f8060d974b3fd04a44b2ddee080944f5193298f940645f9bd6cce58943d7d3660526a5ab3a9c481867bbabf354a1e4c3d19fb90a1c2f786470dcaee2f8359ffbd5c2ec3a8138a375aebd3aaf52ad408b648e9a5376f383faa978c4a3652ad857bee9a380094c0ebe20b0855d78f66af954419841514d751d90d353c65a9c5602b6694ad55c3d45ac59409d9f2c8458518f7297297d72230fc00a66a02954463d1403ebd16df2d1993e6082db2ba5869e2d99413d3b76050c603584bf0acdb3616c698d032c2c0ddd581a5c3e77db976f00daf033dacb9a36836e58bc0e458e2ad6ff467f8ff5e77742bae41e2de5dca1007b87214e995c742584de326f85acf0099b005919f0fc369fab71c203f7242a0824d97812f38812acf278079e7a38c4f504e05c082102c6cf46eb14b20202a7eda2026387b52e1dd8b35f2349cae3b57719eb3534e54b8ff7964622e4f6aced4919d684e78ea9912ee64342278f7a92ce1c68e0b39573047b14401f9ee017e2edb6b7fa4a96ee31eadbdd1e38bf9474099c8025036d9b018802efe62e55edf5537e30ce86a02d0f20fc4a984c872b0c0bfcc0d5dc2a835be2e33984b671e8f8de68d1959a773f3e6362981e3e59802d33968f9b757e576db355fc9666e6b38f1a540bd986109905dab2cc9328a24693265a5f4b630a3f5fe4e95b9b3a4502b7aa022f39b9d51b5eda095318c24d3b86ca92fdb8d6126bd199f44f4cbbfc01ba53881b331465702141dd08dad3a96679ad865db332df0d7bcfe360dfa66ec8f07779d9321500b938b2f1a52f96d0e95fabe1b22b7d9371c0a67aa9748952cc1f4b735cc83598278aabc0c743bda8c894e356a111c4c7c8ee53fcd44b4b7c7483d55715b945133149c160ad83e772462d198361e28682bf55ed86cf21c01d837613c2a6ac448bd21bde36e5e82bbe51b3c83fa8b1f72a15dbcc6b9b9d359d029f8a965047d950152cc4a796aeaf8ec9a7e281e8dad1a9356ffee8c001149942e47edbd7d0e8ea8bf831172c4732cce969e855395806cbccf2566841f91770f3d605cd73dcbd860a0f5a5b8974ef807216cb95e38d3c8b7e59bf5cd47ece48db59100bc0292eeb2ecc071ea34a1a7f5d7e23d08b475f2242c84b9e1b70b66b0877449dba387edd0590da18af6f1524899fffbde969380c77fbf3971fc3056371e9cb2312f0c4ca17975584ad190a3642c5aa5bdc76b931dec7261d92cb3ae1c2d0c9bcdec4154cea75e0cc0462c584316998b5b31dea57e9f090ac855f95fa1a33cf2bf6f997a4a088094cba18fcb3c30a8ffef7db91900bd9b21469cadec8abaadd9eb4903090cb44b20fadb32ca02fd0abf38713dd4c64804114c7258ec771b75e9a7c3371bfdb103bcc06f8c0a91d5c710ef0eb4e83fc03fb20fd4aad10b24cd81913bff833daedee90f08e70427d0fd2c693400730d1ece293d04ff6d889408f9d2b7e047bc9e1bc477b02c84e761eff9fa745978648d221f3b51a20cdfe77c22fba0157f8282d8b18313412fd0e2ec1a3d92d32be2cfa7a35a3d9b427ec23921ef7a34e535b51f546bfd21040ea4c8cb8dbe913209ba19b94d169051bf0965dc59ee0dc296320a42ee87664915b70672760019312c8aa6941abaac18e84a8d371f7c82e93909ce235dc1c308f59b6158157648d197556f2a2c1436bc8c31e7ddcc73d73b91ab7aa79581773a76d8ef18eb08968098f1f41964ae92f91340527c1accc270e9625f0eea8be97d4e49b4ac07cf2c62115b8a6fafdd716441f211f17ab4567209fca4ad10919090ed47a7c80db1aea1e0f97498a3e362b82d20796231e6ca01c6da69479328fcec0706bd268780d1739dbb8ca7c488fac1b22f4ead7708030237e89e94e3ae7d71a37e6ccfb87b0dd14ea8e85cd0158a516d303ec358096a34cbd875603ba836a264ea7c985ac242ebcad1aaed9b57e2aeb9a0a584ce20ad431eca2c04edefbd8528a1476d90cfe032ef1aebebfaf9ee17d18a01e216feeee98b3a2c308b0c0cf4b1e7466ccdb3fd4968f8433f208e18fb26914e928821c2e94b0cadb9fbbcb89be8e7d7a5a43707f528040c53d4493094688274bc042c5c6527f7feb45f9107d60facccadadf8724010f36d2764e3eb8a208b3b731ba14a766a91f055103fa8ae95eaf2016f33cd572fa41eea4abe7e1a4a9a21931211bbba562c196f73d6ae65b538dfb2d46ebb904acaecb5baeb1474077def64eabf9ccf25a0774d1751938b977a3f3dbb2bf142c2769aae688e8089957100fe0ab8ff4a802d92f865b719b2216b5da8f8587d78529a02b2643a15be376ce44e4f3a0aff89e696229dc8dcc90fa9999ff9289811d040e9675590fc9d6ca5c4420ea64e63b4c7cc6ffe3b29bef9bda53e74e92ad0b933dd876e264e8ab7eb0936e6019833fe884daf3d419227a0ee5ddb511953cca464c5fbd08b0e77a54ec43193b2fa9d273247fada3b92464b6ef5ebbd1d5e88efce8c186e0ca9ef219de3eb2a30e2ab4adf17cae828ebe02682e350e96472e2cbdabb1c6a47fb34df7cc8be75476f5f02a94cb46cc1f8f4f33ab20d9ba99154ab4a457e1d06cfc1a508b4fa7f96dfa4f2a9d9d640a36862bdbc29f6341622ad2baf10272a88b5d57ea96cb9f2119efb3f6724ab40f91e6dd13d3a0db0b859e044f5c536dbc77047d29bcd8e8fc25a4353bce295da61261dc4f4926ccf21aea7bb168e5baa988a8ff95e5610a8fc2ad0fa6fd5cd16d3029f1bd9747cbe1c789d0c9c249c84888d96ee3881fd48de1df5a92e93182fa4c8b275338363f929ec6204a975e8061ff04cc745732cfbfe5c7296d068b3ea8d113719edbb540074e5e9b8131d41f3c85264d04c500be9ab07eac21cff17247a005bd7680ab19f287a4ba48e1e38580023127274146b72ac4ebdee7994b7d922e2e41cb7216cf67c3c98630efd20fd9c55607767f7b639f80eb94baafea50f25dddf6e71b662f3f1d7ef9860d03eb92c2e88edf92f45977e8d8d3e1b052066d2364bbf71aadbedbf69ce9f5d516f6abe146907f2d04c1f6b73b00c5e64390c892c257fb24ea1fd4a53a40e3f719c81efd52e9ab3597d2b6bf0d3483263a5ac3d242109389b113c9a3eed47951d3e5b965c98111bd87f34be67f8ca9e9589549e3aaf014be07956c556708fabe1f8534563001e5a82d39d032876489acb13b1e3e900f560e56c5594102db38038be44e62a7edcdd30cafb4fd899b084821b7d1c864c22768bc5f5137cc01da0a36e3d7205b846e09ef0b2375b79d3f13d5c7aeb27c401d04f6685c678f221b4756443e7998732e0e8b51ff01963cbaa08d75b90e2a1cf6c52b5d39881fe88d7c26cb1b915fe7c525de092d59c22ceaf2ab966a50c540bd14a19a90a605867fa376f68610716c7872f1f235c1f6c78eb11be3062b207a3ba006cf6b1bf1ffa52dd823fdb4bd22e33accd38dcef464ee815b240ea5193eac4aa8d934d181b8358598e2e6212a2ca75f28e23db957e556b405d377a042ed64c2988388e9eabed8fd47051c4e50d4bcfda703cb009a92c7240bc597a6227f5b1c651f44caae38dd7f576ac3b72e25e4b718e6980650a9d884d4e9147864558515aeee773ece436d52106a40ab37584a374d3a3130925efb1b9d31306257aecca43981a9f9a602249da447b6b37ee0a74fc4b65e2380ec38a685ff1541eb374ee35e82a04d9d277e8ebfca0adf4b3ee20773c61db82441a87eee7e7b214ec668703fc090c2041b0ede783b98ab77ec81f3dbcc5f7c74fd2fbb110914a4523cde9f4259c5ff5827a750c0e5b86c3296e9b703964046a0ac9f8f7eda71cbbb944e495a0be10cc88a61e26cfdf6e733f8c1a09420b20da57368979c06165add11375"}]}]}, 0xf90}}, 0x0) 03:03:07 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="84024f"], 0x284}}, 0x0) 03:03:07 executing program 2: getrandom(&(0x7f0000000000)=""/121, 0x79, 0x0) 03:03:07 executing program 4: open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) 03:03:07 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x9, &(0x7f0000000040)) 03:03:07 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0x1f, 0x0, &(0x7f0000000140)) [ 1082.515183][T19468] loop5: detected capacity change from 0 to 5 03:03:07 executing program 2: process_vm_readv(0xffffffffffffffff, &(0x7f0000004440)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0, 0x0, 0x0) 03:03:07 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x89a1, &(0x7f00000000c0)) [ 1082.562954][T19468] FAT-fs (loop5): IO charset utf8 [ 1082.562954][T19468] not found 03:03:07 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r0, &(0x7f0000000600)={0xfffffffffffffffe, 0x0, &(0x7f00000005c0)={0x0}}, 0x0) 03:03:07 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000000400)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x5fe}], 0x0, &(0x7f0000000140)={[{@iocharset={'iocharset', 0x3d, 'utf8'}, 0xa}]}) 03:03:07 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0xa, &(0x7f0000000040)) 03:03:07 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) 03:03:08 executing program 2: prlimit64(0x0, 0x0, &(0x7f00000022c0)={0x7}, 0x0) 03:03:08 executing program 3: openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/power/pm_test', 0x123001, 0x0) [ 1082.678092][T19498] loop5: detected capacity change from 0 to 5 03:03:08 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r2, &(0x7f0000000100)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000020000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000300000000000000", 0x58}], 0x1) 03:03:08 executing program 0: madvise(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x10) 03:03:08 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0xb, &(0x7f0000000040)) [ 1082.719778][T19498] FAT-fs (loop5): IO charset utf8 [ 1082.719778][T19498] not found 03:03:08 executing program 2: clock_gettime(0x0, &(0x7f0000000200)={0x0}) pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180)={0x2}, &(0x7f00000001c0)={0x7}, &(0x7f0000000240)={r0}, 0x0) 03:03:08 executing program 0: r0 = inotify_init() inotify_add_watch(r0, 0x0, 0x8) 03:03:08 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000000400)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x5fe}], 0x0, &(0x7f0000000140)={[{@iocharset={'iocharset', 0x3d, 'utf8'}, 0xa}]}) 03:03:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5452, &(0x7f00000000c0)) 03:03:08 executing program 4: mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3) 03:03:08 executing program 2: open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x1b3843, 0x0) 03:03:08 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_buf(r0, 0x6, 0x22, &(0x7f00000002c0)="fe7619d0", 0x4) 03:03:08 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0xc, &(0x7f0000000040)) 03:03:08 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8, &(0x7f0000000040), 0x4) [ 1082.877386][T19532] loop5: detected capacity change from 0 to 5 03:03:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(r0, 0x11, 0x67, 0x0, &(0x7f0000000100)) 03:03:08 executing program 2: pselect6(0x40, &(0x7f0000000140), 0x0, &(0x7f00000001c0)={0x7}, &(0x7f0000000240), 0x0) 03:03:08 executing program 0: shmget$private(0x0, 0x6000, 0x1000, &(0x7f0000ffa000/0x6000)=nil) [ 1082.922309][T19532] FAT-fs (loop5): IO charset utf8 [ 1082.922309][T19532] not found 03:03:08 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0xd, &(0x7f0000000040)) 03:03:08 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_buf(r0, 0x6, 0x1b, &(0x7f00000002c0)="fe7619d0", 0x4) 03:03:08 executing program 2: msync(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x5) 03:03:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x89a1, 0x0) 03:03:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x6681, 0x0) 03:03:08 executing program 3: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/class/rc', 0x10400, 0x0) 03:03:08 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0xe, &(0x7f0000000040)) 03:03:08 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='cubic\x00', 0xf) 03:03:08 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0xd, &(0x7f0000000300)=""/122, &(0x7f00000000c0)=0x7a) 03:03:08 executing program 4: setuid(0xee00) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000140)={'ip_vti0\x00', 0x0}) 03:03:08 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0xf, &(0x7f0000000040)) 03:03:08 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_buf(r0, 0x6, 0x8, &(0x7f00000002c0)="fe7619d0", 0x4) 03:03:08 executing program 3: syz_open_dev$rtc(&(0x7f0000000080), 0xffffffffffffffc0, 0x0) 03:03:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) 03:03:08 executing program 0: pselect6(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000080)={0x6, 0x0, 0x80}, &(0x7f00000000c0)={0x0, 0x3938700}, &(0x7f0000000140)={0x0}) 03:03:08 executing program 2: r0 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmctl$IPC_SET(r0, 0x1, &(0x7f0000004080)={{0x1, 0x0, 0xee00, 0x0, 0xffffffffffffffff}}) 03:03:08 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x1e, 0x0, &(0x7f0000000180)) 03:03:08 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x10, &(0x7f0000000040)) 03:03:08 executing program 3: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000040)="26000000220047010500eaff8980e8ff64b46d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) sendto(r0, &(0x7f00000005c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x45) 03:03:08 executing program 5: sigaltstack(&(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000000)) 03:03:08 executing program 4: r0 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) shmat(r0, &(0x7f0000ffc000/0x4000)=nil, 0x6000) shmat(r0, &(0x7f0000ff9000/0x4000)=nil, 0x6000) 03:03:08 executing program 2: getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 03:03:08 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x11, &(0x7f0000000040)) 03:03:08 executing program 5: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x111080, 0x0) 03:03:08 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x44200, 0x0) 03:03:08 executing program 4: pselect6(0x40, &(0x7f00000001c0)={0x4}, 0x0, 0x0, &(0x7f0000000280)={0x0, 0x989680}, 0x0) 03:03:08 executing program 3: shmget(0x3, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) shmctl$SHM_INFO(0x0, 0xe, &(0x7f0000000040)=""/229) 03:03:08 executing program 2: openat$full(0xffffffffffffff9c, &(0x7f0000000100), 0x68440, 0x0) 03:03:08 executing program 5: r0 = socket(0x1, 0x2, 0x0) recvmsg(r0, &(0x7f0000001380)={0x0, 0x0, 0x0}, 0x2022) 03:03:08 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x12, &(0x7f0000000040)) 03:03:08 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_buf(r0, 0x6, 0x3, &(0x7f0000000000)="51ef97db", 0x4) 03:03:08 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)) 03:03:08 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = dup(r0) lseek(r1, 0x0, 0x0) 03:03:08 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) setsockopt$inet_tcp_buf(r1, 0x6, 0x5, &(0x7f0000000100)="03000000", 0x4) 03:03:08 executing program 4: r0 = socket(0x1, 0x2, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f00000000c0)) 03:03:08 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x22, &(0x7f0000000040)) 03:03:08 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x7) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000052c0)={'ipvs\x00'}, &(0x7f0000005880)=0x1e) 03:03:08 executing program 4: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/raw6\x00') 03:03:08 executing program 2: r0 = socket(0x18, 0x0, 0x4) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, 0x0) 03:03:08 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = dup(r0) lseek(r1, 0x101, 0x0) getdents(r0, &(0x7f00000003c0)=""/131, 0x83) 03:03:09 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) rmdir(&(0x7f0000000080)='./file0\x00') 03:03:09 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x25, &(0x7f0000000040)) 03:03:09 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_buf(r0, 0x6, 0xe, &(0x7f0000000000)="33d7889b", 0x4) 03:03:09 executing program 4: r0 = socket(0x1, 0x2, 0x0) getsockname$packet(r0, 0x0, &(0x7f0000006600)) 03:03:09 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x0) write(r0, &(0x7f0000000940)="c7", 0x1) 03:03:09 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = dup(r0) lseek(r1, 0x101, 0x0) getdents(r0, &(0x7f00000003c0)=""/131, 0x83) 03:03:09 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) r1 = dup(r0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, 0x0, 0x0) 03:03:09 executing program 4: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/wireless\x00') 03:03:09 executing program 5: r0 = socket(0xa, 0x3, 0x6) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, 0x0, 0x0) 03:03:09 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = dup(r0) lseek(r1, 0x101, 0x0) getdents(r0, &(0x7f00000003c0)=""/131, 0x83) 03:03:09 executing program 3: openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x410002, 0x0) 03:03:09 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x2e, &(0x7f0000000040)) 03:03:09 executing program 4: r0 = socket(0x11, 0x3, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, 0x0, 0x0) 03:03:09 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000003240)={0xec4, 0x0, 0x100, 0x70bd26, 0x0, {}, [@TIPC_NLA_MON={0x34, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x769}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}]}, @TIPC_NLA_PUBL={0x1c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_LOWER={0x8}, @TIPC_NLA_PUBL_TYPE={0x8}, @TIPC_NLA_PUBL_LOWER={0x8}]}, @TIPC_NLA_NODE={0xe60, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ID={0xe19, 0x3, "0ef6de53d4df24373e1f79e9f037bee713fa943bcde366fa6135f3ebefe7d8872c0711a6e32bdf197f3ab06bcf1c0d12ef61f1ddb490f1292473517fff93ef87e7cfb4a4497316390126abfbd05406fdd08babfa6c3fbc0dd60b7ac94989a2e11a0a9d1fd6a49d5c535aa250054239a6037d6943b8df75c645051b1457e761847064ffe9638676b6793f8f2eff0deb0fd5a95bc561c508fec6bc0b79ce2292f0652fbc26a0302fa25a21195576ed027f13b09b682b91e13442912400ebe38de9e6a6748dce6b9566bbff555ed62be67bc06a320d1b1baf4d9e82ccec672c6985608fd9e78e2a2b465b4483d8d9d743beea91de9049634d1a593b7872ad63947a50b6b3dd2d301e8fcf2b1ff8766dd34df49dfbb0122c7ced9e6bf4f9ae670f76328ee0f4c2070866509549561a00e07f4c7e8fee3d59d16020caa4b35eb6f3c602a7f8310d953f8bf9fe77911b4e44f8804a84dce96ec785c1fddb347fc21923a0e72ad133b8a32972b4b348463cebe42d8202cda8fcf4a33a0b99dc33f3a008187f8aea3b6b11c7155550ff974e4feb8373bee4edea6ca6fe76048d0ecbfe5a2a73620b036421d18a744f5fc9939aab43492118bf9d4d9f5e82721825417259e12f1ef4786ee78d84d728f1e819ed31e03e4ab188f9d4b2d0dddc16e0707538c70600de6e8eb5cd205699b2d3c44a1e56f828be57849d243ef68c1a80c074a289bbf55624506df81f3b649c0d175044c9fb4dd197679d3e24a09037f401c1cdcd1708a8fd8b55739ea9ecfe30e83b0f1d3bdc073d31c0cf2b134bd13aa7e5400df9cae2952e1b24cc8558343d8a62ef50c8fbe5bb7ef4bc4c40da9f3320be53ee5f9d58bb0da606a53be6cb6c3ea92c1e3422f8b499b2055f659fa2301ec418eb3f29e6f9881574deeb7768f941058f69095c3f7b2c95363b66d44f9386d537bb3818085703236dcdaa71d5e215c9cfe5d56ecf4abf71f8dc043e99e86c75b5b5e069f7bc5cfaa1f901d2775a5fe875d64b72d6d4ed352c93a0ec80d8499e5e95df28ad38ffb04df2600bdb23cb804be223cb61a3778d7b8a2cd067d566b5af4d131fc9ef8727f746584c0308833f8852252421e80584b08a433b50809b0037eb3e881b3d2dce583d7afe6663db7d8238ff2524c4acd8f4f56b96532a996e9b9ff6226b3268771c13afeb25a87d65d0d2eb8a1345e349755f44f80697d104b3a604a62816d90ec4e76b38510d076eb3f1ea0fb08438fb4471993494337bb4dcbafe28e5ffbd00039ba8bbbaa3119e10977b2d663fcae8353e839fd61eed080837623b6ad4bbb78e35b2f7f09dd77f55813f1401771f89e56aa8dff197fb3869b610a6a187eee9e3ac8f4d85d5d451a238b8ae12f3b10035ad92de066bfb6701f46036ae42e5b54a81e49f83ce273522d153c41598a5a5afc4f7ed1aa72225aabf442fcec6c44817f0da8b99fb7011f9f96f2bde663c26867ab87072457adc21b771199c8fcf930987b334236a6dcce07635f0111511e09f361a90dfd7d913448838dd94b27a7af94a8f1e6a1774b7c494c8b57af0d08db613a0ca6ce51d20ef8bc742ae63b2dc68b1c4e1061ee816ceaef4d63e90b317336477a32d52cfd53bcbf9920d3bdaab99ee5d98657d6e8bd11797066616c08d2c16e679f6618851ab09615dc3945beeb4bb97b7dd6081dc59d13247f6e9c97704cf0f522b105c2b6eb51f98d00f1d262e2051744b2f4027569dd8085b3b3af348494b327da49aed3de1619ea89a0925de2124fbd748708bd10b519fb2dad71bf0b05633320aa45ef05aea5c1c18bb12725935ccd02f70f10b7f2d13798e37bd241c2f7374067025c7da6367e83b61de20884d30cbd12ef0b36c2a47ed8ac4fb26a973330c6d08cc62c09ee32910c65fd3ff42f6b4aa5724f5675499810b3ff605261af7f3d0cd2405d8b391a40117c8d30e60a4d3ef24a57314b0e92ab4e86266abec1561a11e20010d3710136b5e0c55ad63de0708cf510d3bf01e57b914cfa10585b1c2ffeb0a2ac8390338ce8edda1db010b2274c75923979375a3a6ddd14ef9b49e4faf6534835d775b5dd0f88d5f7007615f337f0f1c58c5cf1d090a6297c855e6a8c7e31ce255c6bd08193b3d8ef10506d58e42aa84b80fc7de72833f6461c1fa19c55079c23346bc746d926650a2a846d10a89fae0306eebd33ba2a17d1a382663cb68daa71b26ce9b68781b69b469b4494857135d7f88755b9a3b978bb366539bc6392fe514a3d88ad23f0e7d0a49f70134a22a9eb584b37bceb57523caed5c9ed6cf01e33a962260465357e6dfb1b4f263e2c61e750392f8e1289e428b7fd2e94ecc465de42d4d78f947f1ea19e0107fcf6eff9636fe4825254cfd43703e42b5e01b14d9451984d1d1340e193023efc837b6b09ef37eb3f3085b44f041a56ef04094b6e5ebd942d95682468213dabbbc38c634e37734b5eb11e72bf2d61434b32e08bada16ebd20bf8b4a450f561ba631652b5337a5b2cd4c8a66754756bfb675de0eeb4e616d25c396138fbfc189e5b9aa1aa4af47b3da63de5963560f4d4572d36f8afffc93ffbf161d1c2cf8f8456a3f3be7780248209d55cc164b5e6e758e33594f5be1e310f65c019b8b0ae3e9b0c520b3a36b455b362ee30bfd33e7c01a69393848812a0cc37e027cf5996bd8c0fc8db81114e10b197037873165325bb6388a9a081dcecce5ac049268fbc4aa4173e80b2882c1ad73df56e9b5d4cec7d879bd0bf351a2759ec8520fd8567f2ed0d05117c2edf9b8f11c73934342817c0965cbc88528422b50bd02e5351e6795d15e608ca95d403f6c1b8e9f16e283b5dda58c7411a8747214a1e3dd856b41b3d837f15f6cb35438c20c756aad6a623b94f217d7e6d7d93fa62a5474356818e6f2eb70486485cba793a0bb031af9a674ec0cf2408c14fd80d9ecb44063dc15307d63d535074cee6480653f99917b5374c3ac0d6133d3e2c9b4513eab269bbbc769b8eba4d0486fca393a4247b79aac803ec85143e81f328c245c83fd2681a10868ba073c4f373e6dc6ed85e420880f989f4e970f6a8dfe97929b26d2ddcca9c6d1276e62929f638860af14cfc8de25711de4723945660b6ed174c7279e5554e2020b2398644e895f50e61a9eaebe205c9bc0fe94b13503fe1e268ae19e6e91a7ba25c7a328ce57d04ddaa13bad223cfc72a5b43ecf8e24dfd3eb3a303d27ea70bcbdaeefe3f63ad6d6d4861ae16986afc5898595a104f0614c02ee187cdc56f5b70ffc070fc21719c56a79689e9c472ce04e49cef608a3510fc808dc30b6a569f14f5b29c3c763beaf5c9be1a1b7275820f91186a3c46dadffdaaa4eefbd2194e9feff4506e6a13f541ac67601e65221a568a42a164d7e23605cb9f2093180663a596cf09b9be9965a8dbfda0c73d723ebc834f738d336fd73d3f9b2dd28dd69d7cb361f01b2ae8bfd5ea172214c4237fa3a66ba4475a069d4624aafcabcb7e6363e9815a48ab1418dc480c45b86156f4b4b436c199e4b5ccd636310281a86e15919790fa9a2402d7e55bdbc46c0ba47d034bfdfb0e78b3d7c427d0a2761dc8e705aa0ecb1813ba8bf2ac4f0150befc2fa69c99241866bc99f38d45e715098677016a14873aabde17dcfa6315afe48505b72d8812f51fd67d6d85fbe76f622287b40caf31c46481f7c9e572fceb47c731f7dc36cc238497850833a214cf36aff9022488e49f7fd3faa653547a951e8b686f1c6e61ce0264759a88f0bee1acd551d15b108bfe1e511c41b5fc4fbbfb67c632ca9e915992cc3731ece23b621b44497c10d4c442737b752b37d9b2e309d9115d52c79f2f48c52dd2c09d81ddd03abe0e5ef4702a44fe99416b9f24a773cf6be97828024d706e59e11c1a7460c8e8e19427782a357fc024a4347939837b3263fe018e39da839d2c895288b88f0879b7f4e97426f147ffbdc810235d85ce2ea62f293e652ccf01d2d7642634569edf1de1e023de0dae5ccbfa9c7830c91bd24286ebb628d8798dc17f8b1349fec9602862325f14f87223b427803fce0b3f294ce3f8f9a7141261bfaa6ce9447b9252930be6db7630d0f105cd6ae1b9ad393307915b7f9833a594932987da2240047afc682f8d6a82409fbb1d3111d982537ad9366d4b7016332e4d9dce7807ba129a7bbbe466da07947dc201ef07feadd79d54db947a100b1c527820d026d485fc58780051a33609423d07da3a20bbe600ea9148510058480d7a0364e18c323dadd67501b881e2c1e7d61735dfbce2b1d206a565e49b055da457fe6340624bc65a18ae165ff2aa63c3427216a1749c7cb2881d5e608ebc81f7e446e1730dce2904319290b083871040e8dd1ae3aade95ac9393d118a2bcc2c27a32012c9ffad9373063da17e6504cdb50721d5b4f7f55a34764735f2d6e8dac49e8dbf723b6ebd3262ef7f2c312bacf9d546cfa6d390377c2f930a50af4ddec69e5931351f7c233b13571a6e3b94312bd708d8d9c8907c60a3229f042838959bd0c401818803ba4db2ee6e59f0fd5972bf73310cb634e82439258f2b18a5e9f1a86f5a303d6345cd09f796379198fde17f9cc754bbbf31064c7956fb372396db8d78fcaf80268bb51bbec59dcfe76992abcb96131472ea474093fa04ada748e1f0803181a1efdf61c82b539a8dd79d91983363df245559f6b7601defe22f228f11533b422526db770967b52d0b9007f9026b28197b442f96f1b0ab8b3d1f77f9acafa35580ba77e8e28bb4943d73c83e61f667b6622750b9b2f656950c0d3ea07dac5a614df87ce5a3c4de8861eb58d6912f8ff55a8841a7a56583657f0e2bca275b8932ec3d8e294a4d9538317a239b764810b431a129476382027cebc33d0d33dfba0d69b5367ee6c6489053af5ad0ee48d7fe623c064f1bf27e08db4223656d6641c5446f6a1154f793369e25a50a4e7f0d75cb010686462fbf9fbacbf24714080a7978bc06e0dccf722d936b2d829d508a1a47b56e295872837caf232a5e7c78b3268eb5ac81f30eea67b516ff25020f70b16c7f69a4bf7172f49b3facc513a545c127741ad186cc8a51408642f2fcb4f"}, @TIPC_NLA_NODE_KEY={0x3c, 0x4, {'gcm(aes)\x00', 0x14, "4ef82beb6509575c861ac465e6331f2e3863ed86"}}]}]}, 0xec4}}, 0x0) 03:03:09 executing program 5: r0 = socket(0x10, 0x2, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, 0x0, 0x0) 03:03:09 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x48, &(0x7f0000000040)) 03:03:09 executing program 3: r0 = socket(0x2, 0x3, 0x6) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, 0x0) 03:03:09 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = dup(r0) lseek(r1, 0x101, 0x0) getdents(r0, &(0x7f00000003c0)=""/131, 0x83) 03:03:09 executing program 4: poll(0x0, 0x0, 0x1297) select(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000580)=""/4096, 0x1000}], 0x1}, 0x40002) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xffc2, 0x0, 0x0, 0x800e00778) shutdown(r1, 0x0) r3 = socket(0x2, 0x1, 0x0) connect$inet(r3, &(0x7f00000000c0)={0x34, 0x2}, 0x10) shutdown(r2, 0x0) 03:03:09 executing program 2: r0 = socket(0x2, 0x3, 0x6) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, 0x0, 0x0) 03:03:09 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x8934, &(0x7f0000000000)={'bridge0\x00', @ifru_mtu}) 03:03:09 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) rmdir(&(0x7f0000000080)='./file0\x00') 03:03:09 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x4c, &(0x7f0000000040)) 03:03:09 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='devpts\x00', 0x0, 0x0) 03:03:10 executing program 2: socket(0x26, 0x5, 0x8) 03:03:10 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x60, &(0x7f0000000040)) 03:03:10 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000002440)='./file0\x00', 0x0, 0x810824, 0x0) 03:03:10 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) rmdir(&(0x7f0000000080)='./file0\x00') 03:03:10 executing program 0: r0 = socket(0x1, 0x2, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 03:03:10 executing program 2: r0 = socket(0x2, 0xa, 0x0) getsockname$packet(r0, 0x0, &(0x7f00000001c0)) 03:03:10 executing program 4: shmget$private(0x0, 0x5000, 0x0, &(0x7f0000ffb000/0x5000)=nil) 03:03:10 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x68, &(0x7f0000000040)) 03:03:10 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_DYING(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x14}, 0x14}}, 0x0) 03:03:10 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)=@in={0x2, 0x4e21, @multicast2}, 0x80) 03:03:10 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) rmdir(&(0x7f0000000080)='./file0\x00') 03:03:10 executing program 2: r0 = socket(0x28, 0x2, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000001b80), r0) 03:03:10 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) rmdir(&(0x7f0000000080)='./file0\x00') 03:03:10 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000200)=@buf) 03:03:11 executing program 0: r0 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) shmctl$IPC_RMID(r0, 0x0) shmget$private(0x0, 0x2000, 0x2, &(0x7f0000ffb000/0x2000)=nil) shmget$private(0x0, 0x3000, 0x40, &(0x7f0000ffc000/0x3000)=nil) getuid() getgid() getuid() sched_getparam(0x0, &(0x7f0000000780)) r1 = shmget$private(0x0, 0x5000, 0x1000, &(0x7f0000ffb000/0x5000)=nil) shmat(r1, &(0x7f0000ffe000/0x1000)=nil, 0x5000) 03:03:11 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x6c, &(0x7f0000000040)) 03:03:11 executing program 4: r0 = socket(0x28, 0x2, 0x0) sendmsg$AUDIT_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0xc001) 03:03:11 executing program 2: r0 = socket(0x28, 0x2, 0x0) getsockname$packet(r0, 0x0, &(0x7f0000004680)) 03:03:11 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x74, &(0x7f0000000040)) 03:03:11 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x0) write(r0, &(0x7f0000000940)="c7", 0x1) 03:03:11 executing program 5: r0 = socket(0x1, 0x2, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f00000000c0)) 03:03:11 executing program 0: r0 = socket(0x28, 0x2, 0x0) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x440}}, 0x0) 03:03:11 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@private0, 0x0, 0x1}, 0x20) 03:03:11 executing program 4: r0 = socket(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00'}) 03:03:11 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x7a, &(0x7f0000000040)) 03:03:11 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='rpc_pipefs\x00', 0x0, 0x0) 03:03:11 executing program 5: r0 = socket(0x18, 0x0, 0x4) getsockname$packet(r0, 0x0, 0x0) 03:03:11 executing program 0: r0 = socket(0xa, 0x3, 0x6) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={0x0}}, 0x8041) 03:03:11 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000000000)=0x5, 0x4) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r3, 0x1, 0xf, &(0x7f0000000000)=0x5, 0x4) bind$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) r4 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f0000000380)={0x2, 0x4e22, @dev}, 0x10) listen(r2, 0x0) 03:03:11 executing program 4: r0 = socket(0x2, 0xa, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000040)={'netdevsim0\x00', @ifru_addrs=@sco}) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 03:03:11 executing program 3: r0 = socket(0x28, 0x2, 0x0) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x440}}, 0x4004091) 03:03:11 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0xfe, &(0x7f0000000040)) 03:03:11 executing program 0: r0 = socket(0xa, 0x3, 0x6) r1 = dup(r0) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000240)) 03:03:11 executing program 5: r0 = socket(0x2, 0xa, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 03:03:11 executing program 4: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x0) 03:03:11 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000000000)=0x5, 0x4) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r3, 0x1, 0xf, &(0x7f0000000000)=0x5, 0x4) bind$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) r4 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f0000000380)={0x2, 0x4e22, @dev}, 0x10) listen(r2, 0x0) 03:03:11 executing program 0: r0 = socket(0x1, 0x1, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f00000001c0), r0) 03:03:11 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x102, &(0x7f0000000040)) 03:03:11 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) sendmsg$WG_CMD_SET_DEVICE(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x20008000) 03:03:11 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_DYING(r0, &(0x7f0000000180)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x6, 0x1, 0x101}, 0x14}}, 0x0) 03:03:11 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000000000)=0x5, 0x4) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r3, 0x1, 0xf, &(0x7f0000000000)=0x5, 0x4) bind$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) r4 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f0000000380)={0x2, 0x4e22, @dev}, 0x10) listen(r2, 0x0) 03:03:11 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000003240)={0xec4, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x34, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}]}, @TIPC_NLA_PUBL={0x1c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_LOWER={0x8}, @TIPC_NLA_PUBL_TYPE={0x8}, @TIPC_NLA_PUBL_LOWER={0x8}]}, @TIPC_NLA_NODE={0xe60, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ID={0xe55, 0x3, "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"}]}]}, 0xec4}}, 0x0) 03:03:11 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, 0xfffffffffffffffe, 0x0) 03:03:11 executing program 5: r0 = socket(0x1, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x891e, &(0x7f0000000040)={'veth0\x00', @ifru_names}) 03:03:11 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x201, &(0x7f0000000040)) 03:03:11 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_buf(r0, 0x6, 0xd, &(0x7f00000000c0)="b1", 0x1) 03:03:11 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x7) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @local}, 0x1c) 03:03:11 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000000000)=0x5, 0x4) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r3, 0x1, 0xf, &(0x7f0000000000)=0x5, 0x4) bind$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) r4 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f0000000380)={0x2, 0x4e22, @dev}, 0x10) listen(r2, 0x0) 03:03:11 executing program 5: r0 = socket(0x1, 0x2, 0x0) recvmsg(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x40002060) 03:03:11 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents(r0, &(0x7f00000003c0)=""/131, 0x83) 03:03:11 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x204, &(0x7f0000000040)) 03:03:11 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x7) r1 = socket$inet_udp(0x2, 0x2, 0x0) dup2(r1, r0) 03:03:11 executing program 3: r0 = add_key$keyring(&(0x7f0000000580), &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000002c0)='encrypted\x00', 0x0, 0x0, 0x0, r0) 03:03:11 executing program 2: request_key(&(0x7f00000000c0)='logon\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='^\x00', 0x0) 03:03:11 executing program 5: r0 = socket(0xa, 0x3, 0x6) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, &(0x7f00000001c0)) r1 = dup(r0) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000240)) 03:03:11 executing program 0: gettid() r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) io_setup(0x4bb19af0, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x0) 03:03:11 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x205, &(0x7f0000000040)) 03:03:11 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x1c, r1, 0x1, 0x0, 0x0, {{}, {@void, @void, @void}}}, 0x1c}}, 0x0) 03:03:11 executing program 4: r0 = socket(0x2, 0xa, 0x0) sendmsg$AUDIT_TTY_SET(r0, &(0x7f0000001100)={&(0x7f0000001040), 0xc, &(0x7f00000010c0)={0x0}}, 0x0) 03:03:11 executing program 3: r0 = socket(0x1, 0x2, 0x0) r1 = dup(r0) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000600)) 03:03:11 executing program 5: r0 = socket(0x1, 0x2, 0x0) recvmsg(r0, &(0x7f00000012c0)={0x0, 0x0, 0x0}, 0x1) 03:03:11 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x206, &(0x7f0000000040)) 03:03:11 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @broadcast}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2806, 0x4) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1c}}, 0x10) sendfile(r0, r1, 0x0, 0x1000001) 03:03:11 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x3c, 0x9, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x1f}]}, @IPSET_ATTR_LINENO={0x8}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x3c}}, 0x0) [ 1086.491549][T19966] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 03:03:11 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), 0x0, 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f00000001c0)) syz_mount_image$iso9660(&(0x7f00000028c0), &(0x7f0000002900)='./file0\x00', 0x0, 0x1, &(0x7f0000004c80)=[{0x0}], 0x0, &(0x7f0000004d40)={[{@hide}, {@utf8}, {@check_relaxed}, {@sbsector}]}) 03:03:11 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x207, &(0x7f0000000040)) 03:03:11 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000001080)='.\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000000)=""/4097, 0x1001) 03:03:11 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x6) sendmsg$NL80211_CMD_GET_FTM_RESPONDER_STATS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) [ 1086.550308][T19976] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 03:03:11 executing program 0: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) fork() openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) fork() 03:03:11 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFBR(r0, 0x5452, &(0x7f0000000180)=@get={0x1, 0x0}) 03:03:11 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x216, &(0x7f0000000040)) 03:03:12 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendmsg$netlink(r0, &(0x7f0000005040)={0x0, 0x0, 0x0}, 0x0) 03:03:12 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x217, &(0x7f0000000040)) 03:03:12 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = dup3(r1, r0, 0x0) r3 = accept$inet(r2, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x5452, &(0x7f0000000080)={'syztnl1\x00', 0x0}) [ 1086.694075][T19992] ISOFS: Unable to identify CD-ROM format. 03:03:12 executing program 3: clock_getres(0x0, &(0x7f0000000140)) 03:03:12 executing program 4: connect$inet(0xffffffffffffffff, &(0x7f0000003fc0)={0x2, 0x3}, 0xc) 03:03:12 executing program 2: mincore(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) 03:03:12 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x300, &(0x7f0000000040)) 03:03:12 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = timerfd_create(0x0, 0x0) splice(r2, 0x0, r1, 0x0, 0x43, 0x0) close(r2) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000180)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) r4 = epoll_create(0x1) timer_create(0x0, &(0x7f0000000000)={0x0, 0x16}, &(0x7f0000000100)=0x0) timer_settime(r5, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r0, &(0x7f00000000c0)) 03:03:12 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r0, r1) poll(&(0x7f0000000140)=[{r0, 0xe43500f2371aaa23}], 0x1, 0x0) 03:03:12 executing program 3: r0 = open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x80000000000206, 0x0) ftruncate(r1, 0x7e2780e3) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x20011, r0, 0x0) r2 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) setrlimit(0x0, &(0x7f0000000000)={0x10000000000b35d, 0x800000b35d}) preadv(r2, &(0x7f0000000000), 0x5f, 0x0, 0x0) 03:03:12 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000018c0)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)=[@rights], 0x18}, 0x0) 03:03:12 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000018c0)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0) 03:03:12 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x402, &(0x7f0000000040)) 03:03:12 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f00000001c0)=@file={0x0, './file0\x00'}, 0xfffffffffffffe70) 03:03:12 executing program 5: mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x3, 0x410, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r0, 0x0, 0x1, &(0x7f00000000c0)="9d", 0x1) 03:03:12 executing program 3: r0 = open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x80000000000206, 0x0) ftruncate(r1, 0x7e2780e3) mlockall(0x2) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x1, 0x12, r2, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x20011, r0, 0x0) mmap(&(0x7f00001ce000/0x2000)=nil, 0x2000, 0x0, 0x12, r2, 0x0) mprotect(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x3) 03:03:12 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x406, &(0x7f0000000040)) 03:03:12 executing program 2: socketpair(0x2, 0x3, 0x0, &(0x7f0000000100)) 03:03:12 executing program 0: r0 = socket(0x1f, 0x5, 0x0) setsockopt$sock_timeval(r0, 0xffff, 0x100c, &(0x7f0000000180), 0x10) 03:03:12 executing program 4: sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c00)={0x0, 0x0, 0x0}, 0x0) 03:03:13 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) poll(&(0x7f00000003c0)=[{r0}], 0x1, 0x0) 03:03:13 executing program 0: add_key(&(0x7f0000000100)='asymmetric\x00', 0x0, 0x0, 0x4800, 0xfffffffffffffffb) 03:03:13 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)}, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f0, &(0x7f0000000300)='gre0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f3, &(0x7f0000000300)='gre0\x00') 03:03:13 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x410, &(0x7f0000000040)) 03:03:13 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TIOCSTI(r0, 0x5405, 0x0) 03:03:13 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000a40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) shmat(0xffffffffffffffff, &(0x7f0000ffc000/0x2000)=nil, 0x0) 03:03:13 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000018c0)={0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000005680), 0x1, 0x60, 0x0) 03:03:13 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xc) 03:03:13 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x500, &(0x7f0000000040)) 03:03:13 executing program 3: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TIOCSTI(r0, 0x5414, 0x0) 03:03:13 executing program 2: sysinfo(&(0x7f0000000100)=""/4096) 03:03:13 executing program 0: keyctl$chown(0x1c, 0x0, 0x0, 0xee00) 03:03:13 executing program 4: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r0, &(0x7f0000000440)=""/237, 0xed) 03:03:13 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000000)=@req3={0x0, 0x0, 0x0, 0x5}, 0x1c) 03:03:13 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x502, &(0x7f0000000040)) 03:03:13 executing program 0: faccessat2(0xffffffffffffffff, 0x0, 0x18, 0x0) 03:03:13 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, 0x0) 03:03:13 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000000100)=""/210) 03:03:13 executing program 5: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000011c0), &(0x7f0000001200)={'syz', 0x0}, 0x0, 0x0, r0) add_key(&(0x7f0000001080)='cifs.idmap\x00', &(0x7f0000001140)={'syz', 0x0}, 0x0, 0x0, r1) 03:03:13 executing program 4: add_key(&(0x7f0000000100)='asymmetric\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) 03:03:13 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x600, &(0x7f0000000040)) 03:03:13 executing program 0: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0x0, 0x0) 03:03:13 executing program 2: r0 = socket(0x22, 0x2, 0x2) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x20000090) 03:03:13 executing program 3: io_setup(0x8001, &(0x7f0000000080)) io_setup(0x401, 0x0) 03:03:13 executing program 4: msgrcv(0x0, &(0x7f00000001c0)={0x0, ""/79}, 0x57, 0x0, 0x1000) msgsnd(0x0, &(0x7f0000000880)={0x2}, 0x8, 0x0) 03:03:13 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_ifreq(r0, 0x8919, 0x0) 03:03:13 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TIOCSTI(r0, 0x5437, 0x0) 03:03:13 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x602, &(0x7f0000000040)) 03:03:13 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDENABIO(r0, 0x4b36) 03:03:13 executing program 5: r0 = getpid() sched_rr_get_interval(r0, &(0x7f00000001c0)) 03:03:13 executing program 4: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TIOCSTI(r0, 0x542f, 0x0) 03:03:13 executing program 0: socketpair(0x21, 0x0, 0x2, &(0x7f0000000040)) 03:03:13 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x604, &(0x7f0000000040)) 03:03:13 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TIOCSTI(r0, 0x80285442, 0x0) 03:03:13 executing program 3: keyctl$chown(0x13, 0x0, 0x0, 0xee00) 03:03:13 executing program 5: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TIOCSTI(r0, 0x5410, 0x0) 03:03:13 executing program 4: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r0, 0x0, 0x0) 03:03:13 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x700, &(0x7f0000000040)) 03:03:13 executing program 0: io_setup(0x401, &(0x7f00000000c0)) io_setup(0x6, &(0x7f0000000140)=0x0) io_destroy(r0) 03:03:13 executing program 3: r0 = inotify_init() ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0x40044900, 0x1) 03:03:13 executing program 2: io_setup(0x20000, 0x0) io_setup(0x8001, &(0x7f0000000080)) io_setup(0x401, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) 03:03:13 executing program 5: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "808d285cc82c1cae8b1af9b992862b882077b471c320b0c10dd601fc5a651028b6946c8b043588694c0bd5a76112e782efe566f90b44672026b0b7168c23fe1b"}, 0x48, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, 0x0) 03:03:13 executing program 4: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_keyring_id(0x0, r0, 0x0) 03:03:13 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x702, &(0x7f0000000040)) 03:03:13 executing program 5: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TIOCSTI(r0, 0xc0045878, 0x0) 03:03:13 executing program 3: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000003380)={0x0, 0x0, &(0x7f0000003340)={&(0x7f0000001f80)={0x4c, 0x12, 0x1}, 0x4c}}, 0x0) 03:03:13 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x900, &(0x7f0000000040)) 03:03:13 executing program 4: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TIOCSTI(r0, 0x540c, 0x0) 03:03:13 executing program 5: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TIOCSTI(r0, 0x540f, 0x0) 03:03:13 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0xa00, &(0x7f0000000040)) 03:03:13 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/unix\x00') setsockopt$inet_mreqn(r0, 0x0, 0x0, 0x0, 0x0) 03:03:13 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000001f40), 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x0) 03:03:13 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000001f40), 0x0, 0x0) ioctl$BLKALIGNOFF(r0, 0x127a, &(0x7f0000002200)) 03:03:13 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "808d285cc82c1cae8b1af9b992862b882077b471c320b0c10dd601fc5a651028b6946c8b043588694c0bd5a76112e782efe566f90b44672026b0b7168c23fe1b"}, 0x48, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, &(0x7f0000000140)=@keyring) 03:03:13 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$BTRFS_IOC_BALANCE_CTL(r0, 0x40049421, 0x0) 03:03:13 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0xb00, &(0x7f0000000040)) 03:03:14 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/unix\x00') flistxattr(r0, 0x0, 0x0) 03:03:14 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/unix\x00') ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, 0x0) 03:03:14 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/unix\x00') ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, 0x0) 03:03:14 executing program 5: r0 = socket$inet6(0xa, 0x3, 0xff) recvmmsg(r0, &(0x7f0000006080), 0x0, 0x0, 0x0) 03:03:14 executing program 0: r0 = socket$inet6(0xa, 0x3, 0xff) recvmmsg(r0, 0x0, 0x0, 0x0, 0x0) 03:03:14 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0xc00, &(0x7f0000000040)) 03:03:14 executing program 4: r0 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) shmat(r0, &(0x7f0000ffc000/0x3000)=nil, 0x0) 03:03:14 executing program 0: syz_open_dev$char_raw(&(0x7f0000000200), 0x0, 0x0) 03:03:14 executing program 2: recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x40000000, 0x0, 0x0) 03:03:14 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) recvmmsg(r0, 0x0, 0x0, 0x40002100, &(0x7f0000005cc0)) 03:03:14 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, 0x0) 03:03:14 executing program 0: getresuid(&(0x7f0000000840), &(0x7f0000000880), &(0x7f00000008c0)) 03:03:14 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0xd00, &(0x7f0000000040)) 03:03:14 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/unix\x00') setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x0, 0x0, 0x0) 03:03:14 executing program 5: r0 = socket$inet6(0xa, 0x3, 0xff) recvmmsg(r0, &(0x7f0000006080)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, &(0x7f00000061c0)={0x0, 0x989680}) 03:03:14 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/unix\x00') ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, 0x0) 03:03:14 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/unix\x00') ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, 0x0) 03:03:14 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/unix\x00') sendmmsg(r0, 0x0, 0x0, 0x0) 03:03:14 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/unix\x00') ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, 0x0) 03:03:14 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/unix\x00') recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 03:03:14 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/unix\x00') ioctl$BTRFS_IOC_WAIT_SYNC(r0, 0x40089416, 0x0) 03:03:14 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0xe00, &(0x7f0000000040)) 03:03:14 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0xf00, &(0x7f0000000040)) 03:03:14 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/unix\x00') ioctl$CHAR_RAW_BSZSET(r0, 0x40081271, 0x0) 03:03:14 executing program 4: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) 03:03:14 executing program 0: pipe2(&(0x7f0000001380), 0x800) 03:03:15 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) recvmmsg(r0, 0x0, 0x0, 0x40002140, 0x0) 03:03:15 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_buf(r0, 0x6, 0x3, &(0x7f00000002c0)='\x00\x00\x00\x00', 0x4) 03:03:15 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/unix\x00') setsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, 0x0) 03:03:15 executing program 3: pipe2(&(0x7f000000ca00)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$char_raw(r0, 0x0, 0x0) 03:03:15 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x1004, &(0x7f0000000040)) 03:03:15 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000b00), 0x204480, 0x0) 03:03:15 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/unix\x00') ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, 0x0) 03:03:15 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/unix\x00') fcntl$setsig(r0, 0xa, 0x0) 03:03:15 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000400)='net/ptype\x00') preadv(r0, 0x0, 0x0, 0x0, 0x0) 03:03:15 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x1020, &(0x7f0000000040)) 03:03:15 executing program 3: r0 = socket$inet6(0xa, 0x3, 0xff) recvmmsg(r0, &(0x7f0000006080), 0x0, 0x0, &(0x7f00000061c0)={0x0, 0x989680}) 03:03:15 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/unix\x00') getsockopt$IP_SET_OP_GET_BYINDEX(r0, 0x1, 0x53, 0x0, 0x0) 03:03:15 executing program 2: r0 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) shmat(r0, &(0x7f0000ffc000/0x3000)=nil, 0x5000) 03:03:15 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/unix\x00') 03:03:15 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/unix\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, 0x0) 03:03:15 executing program 3: r0 = socket$inet6(0xa, 0x3, 0xff) recvmmsg(r0, 0x0, 0x0, 0x0, &(0x7f00000061c0)={0x0, 0x989680}) 03:03:15 executing program 4: pipe2(0x0, 0x4400) 03:03:15 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x1100, &(0x7f0000000040)) 03:03:15 executing program 2: pipe2(&(0x7f0000001380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$SIOCGSTAMPNS(r0, 0x8907, 0x0) 03:03:15 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cgroup\x00') fcntl$setlease(r0, 0x400, 0x0) 03:03:15 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x800, 0x0) 03:03:15 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/unix\x00') ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, 0x0) 03:03:15 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/unix\x00') fsetxattr$security_capability(r0, 0x0, 0x0, 0x0, 0x0) 03:03:15 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/unix\x00') connect(r0, 0x0, 0x0) 03:03:15 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x1200, &(0x7f0000000040)) 03:03:15 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/unix\x00') fsetxattr$security_capability(r0, &(0x7f0000001240), 0x0, 0x0, 0x0) 03:03:15 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/unix\x00') ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) 03:03:15 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/unix\x00') ioctl$sock_SIOCBRDELBR(r0, 0x89a1, 0x0) 03:03:15 executing program 2: open$dir(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) clock_gettime(0x2, &(0x7f0000000000)) 03:03:15 executing program 4: syz_open_pts(0xffffffffffffffff, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) 03:03:15 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x1602, &(0x7f0000000040)) 03:03:15 executing program 3: socketpair(0x1, 0x1, 0x1, &(0x7f0000000040)) 03:03:15 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) close(r0) ftruncate(r0, 0x0) 03:03:15 executing program 5: r0 = signalfd(0xffffffffffffffff, &(0x7f0000000000), 0x8) r1 = signalfd(r0, &(0x7f0000000040), 0x8) ioctl$KDADDIO(r1, 0x541b, 0xf19ff3) 03:03:15 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/unix\x00') ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x89f7, 0x0) 03:03:15 executing program 4: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x200, 0x0) poll(&(0x7f0000000300)=[{r0}], 0x1, 0x0) 03:03:15 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x1702, &(0x7f0000000040)) 03:03:15 executing program 5: r0 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x8004741b, &(0x7f0000000240)=0x1) 03:03:15 executing program 3: r0 = socket$inet6(0x18, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0x18, 0x1}, 0xc) 03:03:15 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) readv(r0, &(0x7f0000003300)=[{&(0x7f0000000080)=""/230, 0xe6}], 0x1) 03:03:15 executing program 4: r0 = socket$inet(0x2, 0x4001, 0x0) getsockopt$sock_timeval(r0, 0xffff, 0x1006, 0x0, 0x0) 03:03:15 executing program 2: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x200, 0x0) readv(r0, &(0x7f0000000040)=[{0x0}], 0x1) 03:03:15 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x1c43, &(0x7f0000000040)) 03:03:15 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) close(r0) connect(r0, 0x0, 0x0) 03:03:15 executing program 0: mlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) 03:03:15 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x1c44, &(0x7f0000000040)) 03:03:15 executing program 3: open$dir(&(0x7f0000000200)='./file0\x00', 0xa827b57fd53ef2c6, 0x0) 03:03:15 executing program 2: openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0xc82, 0x0) 03:03:15 executing program 4: open$dir(&(0x7f00000000c0)='./file0\x00', 0x200, 0x0) utimensat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) 03:03:15 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) getsockname$inet6(r0, 0x0, 0x0) 03:03:15 executing program 0: r0 = socket$inet6(0x18, 0x3, 0x0) connect$inet6(r0, &(0x7f0000000000)={0x18, 0x1}, 0xc) 03:03:15 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x1c45, &(0x7f0000000040)) 03:03:15 executing program 4: open$dir(&(0x7f00000000c0)='./file0\x00', 0x200, 0x0) 03:03:15 executing program 2: r0 = socket$inet(0x2, 0x4001, 0x0) getsockopt$sock_timeval(r0, 0xffff, 0x0, 0x0, 0x0) 03:03:15 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x2000, &(0x7f0000000040)) 03:03:15 executing program 3: r0 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) shmat(r0, &(0x7f0000ffb000/0x3000)=nil, 0x3000) 03:03:15 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f00000017c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000007c0)="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", 0x801}], 0x1}, 0x0) 03:03:15 executing program 0: open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) chown(&(0x7f00000000c0)='./file2\x00', 0x0, 0x0) 03:03:15 executing program 4: r0 = socket$inet6(0x18, 0x3, 0x0) write(r0, 0x0, 0x0) 03:03:15 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) close(r0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0) 03:03:15 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x200, 0x0) fcntl$getown(r0, 0x5) 03:03:16 executing program 3: r0 = socket$inet6(0x18, 0x3, 0x0) bind$inet6(r0, &(0x7f0000000200)={0x18, 0x1}, 0xc) 03:03:16 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x2010, &(0x7f0000000040)) 03:03:16 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) readv(r0, &(0x7f00000000c0)=[{0x0}], 0x1) 03:03:16 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f00000017c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000007c0)="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", 0x841}], 0x1}, 0x0) 03:03:16 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) recvmsg(r0, &(0x7f0000000040)={&(0x7f0000000000)=@in, 0xc, &(0x7f0000000280)=[{&(0x7f0000000400)=""/220, 0xffffffffffffffbb}, {&(0x7f0000000140)=""/62, 0x3e}, {&(0x7f0000000180)=""/219, 0xdb}], 0x3, &(0x7f00000002c0)=""/245, 0xf5}, 0x0) 03:03:16 executing program 0: mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 03:03:16 executing program 4: sendmsg$unix(0xffffffffffffffff, &(0x7f00000026c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="3482060b5a4e5d2e8896758315192002e3cbe3dcdb92ffefd70467c5b4bee8370044256daeb299ceaba5a4bf1064654f6d472703dcb322768d5ae793261c4ab429d2adf3d4729655fae91ff73f5ce226b5dbc5ea90720f95e00d98393bee5a1aa4ed91d7604ac92f6befd8cd2aa7cf359c2e2151dfc1fe91ad7147d36e3c6e74241f15df7e478556adcb6baed4abe6cbf7", 0x91}], 0x100000000000025c, 0x0, 0x0, 0x4}, 0x3) 03:03:16 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000200)="e9c772f94107a60bb7e916a8b4d2240efda9da551c0127cab5becda9fe3632056d6367f03e540bd684abbc9338d7bd0a", 0x30) 03:03:16 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f00000026c0)={0x0, 0x0, &(0x7f00000024c0)=[{&(0x7f0000000200)="f7ab27c9d5c6cfd9977d33abf50035cded74fa81a748ab417e7b2c8b341046ecc1cafdf042ce22c775125cc02985d78b083f109dc09bb159302690469d560c91efec31d31a578defa6d08d5194fb2fb6c271d97f158711e3c9a2b4bd3fe23cc97a5b87b166daf7", 0x67}, {&(0x7f0000000280)="5e5d4ff04fbf2f0f3f9f5835cfa31efd88d15697305732428743f9f48e237cdc923edb864771fa320db6475b1e29a60ac31d9dd5904fd80659eb5523fde73168c78569123b5e0494d46364fd409bf67c2d9338584fab383c48dd235011e35dbd2c2f3c6091b22a7332d9a3b99bafd68c375d92516e64e68d94e39cf6", 0x7c}, {&(0x7f0000000180)="981c1c46d0a828de24509e423fc6f3fc31a6e7ef83396b00f534344645798b88c6b33db779", 0x25}, {&(0x7f0000000300)="e8c720054e7b1e16067dd0f96b1fd44d70c78d567059e992d69f0fe9fc78fa617c28a91a0b4a06b09b1be8311f24600d514d750bed6a7f39add48339ad19f0", 0x3f}, {&(0x7f0000000340)="e4713496c6", 0x5}, {&(0x7f0000000380)="8dc1647556ef3a4bf77263b3d58fd88065c6787737df693a7cd56fe5c650fce6e3bf7ce9b7970e2a6d2a5e41f1d5499dd89f82f8ef7063ce9b9a8b8c046213892fb9b62749fb13a6ab09f511263f490a4cd49b03c31106cfc6aa4cddf839c46065dba86cab3df0582731a6a9f739c7049f06d4031b15c494c7a473c812563ba8a9b5bd84c91bbfbcabc2a42618e317b503b824202e967fa22fa3f87df5bf8d70b8b3ee16fb9f0b719501cae66d00154ea1749f1d7671e6064635f1274e9fb3ff8382b9dfab524a042ae0a75b238f9b5e2c4214882f1163d4862f1a124a28c5c88f59c11ac3b2f9", 0xe7}, {&(0x7f0000000480)="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", 0x1000}, {&(0x7f0000001480)="c2ead542f5cb333d086c53698dcf722bff1936ad3d240d62a8614ff6f35d5561f813a166f428a80bef1d42c210623a09ed2e2f46c91beab334938dc6a06acdfe7af1374a16963feff23465248cb4ba70e758654fb583154c0cf1a83b11c5bdae720a5c10783d15b4ec79e01179e116da44d73784d484b8ca299e6ae021ad6c61f286dfdcf50520441f06d52a5cba278043af610edd8b608e195a1d68aa8a2d564fe2d7f95e145fb1b6671ade82917234eb036851182c99bca01f5906051b00d3ecd8a17c2e596d4dcf40562e604b775e307bcdde1d694df67d776e9f722433fca8aa9e968e8dd967139277486630a1437bbefdae7fd56d4918a9952bb00c32113e12ad959bea32ca115e146281b97c71b8f8fe73ce42122080471896f8a48509cd263e1fa07a69ffe24ba18bdb54ad238cb68f1fa98a94a24144dbae5471546eeef9e0aee649a2921dc5936863a1df388a6edcbdc41f4922dc75781365b883b43b8bac59428cb24806e2bd2f3e415ddc5f0d7dac3e2d5a5beeec54d4f44a1e352b81d851ac4fc132bb9cf261874676580c6911ccedf7e3acd20e77e0b705a60cb51d8ec9f6f05a3adc41491e7cdd26184c9ae588a25be90d2ce15936c77e7359a806f4365a329d36eff8a970ed056ac200fbbb3db0da2c54404ac3977bf0489121a4e77443a23a579853e642d885f45df896b80b015ca13989b4c36b9733be78685e4cba1f7c0ff35f5cff10908a7964e2b268addcd2bfb9722f3b804f47665d8a8affca3de61869384c93b2596d6ee85f206fbfe9fc32ba9e9b037d7d8e15ee1c0fd1868487cf12c0e8fb79e145706458a094dee7214ea12aef174d17d63ba2235fb0d289f75d528f2fdf06e3d8e483ce7138e97d50ef5ba956d9b18c94a255ef007371d5e739497931af65372e540c635ac7a16d9703f5c6486393cc5444f14943b327632de7d6e13732049572758e651b6c434d0c3d662c847d5ae4398b9822a8ab5dc5b70fd6860cf3d317dd59b831e08ac9ba12fdc7d559d9ca1e59665d48dfd8b142d11e4b5a16742052a2708b4183b3c5ffa43053b2b6bb90cd05db433fd0901620610e57a1a39345fd0a67aa7bd1af64e7b939af13b963052b915d663d832e9706491f8ff9c85e9bcbc6a697d857681c348bdd95e1a7ec05d78c6a1792fdb6fe4cc363454d15e369ae1fd290ac1abe515cf2d1e8bc5514ab861456af77053530c81aeb60ff3f5299069447f49a21d37e149b18dd99a8c5d7aa68e2b2a90c90d864e64fd1a64ae1b4053ab72f0c7e1f1dfb6a8a7a8d54df04d68b9d43054409adea0f2a21bb59b0c634ab8dcf5f26007747ad50c34b5a4a98bc1827b1191174afd000544349eab4bb9b4115eaa6a055ea8b2013fdc3dae1e71e36128439093237197b45b864c8ba611195b272c65aacc6a8267ef059d2f72c25f8af26a8cf4caab55adf0c95fcd4386df31e28de245832720a6e3a38fbda5ac4706310b070070a9784f028a8bc29500a96535d62f8c1df71329e60d9bc60d98c1358c73bc0cbacbf6ee375e9c7e9c48bcbe963ae4a09b85beefcecfa10807a9d6c973aeff8d5dece6be63044bb65a535ff793961dfb2120288d35d903abfa1e06df1d17f9aec11652d05512a2c5a1e45185142d219cb7ad496a0ed6caac85e431b28d43ede05a4a5cb7c4a6388cec04a46f0f6e39a22f0cf39b05510d2a7c89c704db12e0ff98a6fa5ffe0f22b602e71a19cf52252fbf2ffbf5bfe9a229b40503e9705ea19122bd1c56a8c2e723f1816734276df00ab9fcf1c710b01c75b87b65686fbb6798210f48ffc60288cd68c9f9b86144215129ab6f3c10c911257b971f88b40d089821eea81e0f5472ccef2381d2895f13b3ac11c944bc581818747a971f39c3d3ba904b18f7ef9764edcb37cfc9f994aef85cb50efc2952ba458b6ca670e28333e61291969459d908d567d840516130b9f5dbc97071bf9eaa7c191369365b6bc9077b95b2218cc26eed68a688704ca29e7b7209c42c3e6f8163231abaf30e33f8918183d38dced035013767e15abd5eefc2f629776b4389f783454d5a0f667fb19cbeb0aba9ab094636bad5ce365e8d3028e0d2588829988b8020a9653534602b32a5fd84f9102497bd7a17b076da3840a370e955b3ff8e10d7716a3b3b647bae8ae96aff93e2c64b18d90324325e522b7f1cabd445348ba732492a5c64ca025b6c4e29a0b370af646cef3fb87e332e126730d3ffd7ea3cf2814ed284aa1629e2373533d614daf8e3ce298dd5ce3baf6ea01522a3080d8cb6e7b02ac2b23476897993b2530fc579100dcc6a9e88fec4d8c71d43388a37e986ae71aeee815c78413a9f441882fc4b613f7cc2889f1c8af7d70e9ecfa83f28987c8629ec04f408af493768e7fb7acaee2dbbdfd9412de2e494173063a24d6fe84cab0e315509bcec3dafdce7da7f8f4051d6a544eda5747ae2bce74dd182aea53044c1a4eb5e482bf13f33a2bd9adc6e3d74723e8952660ce2efff5793cfeac11da1bbca4dcac818aaedcd912a5a381afcec15d94a99ae2ddd87dcf604e4efe0b792a0080f554f41b41606fbd2546731aa1963441bc6ff220a9c4a2f509d12d92861e31928ccd4bf35145d2aa8aad160f412a606ac181634ac24270af6c4e77eac398ee63589a3479fbf6e12790a864a1fa1a9e333f655d7b31502ee73c8e69e8ba4ebf35296076cfab5c55137deaaa675d2037177d0603bed4c5898c4eb1463d5ba13d1c252f03588221786bf3fa40663a455f3d5a992f0fc0e4665014e3500698a5240bbd451d90725adc4cd7b56354024fb6fa295c3a2b807205e97791a0b69753fdba0596e8be6886f18caa3f18c1de6cd31f18decc39e0af36fd11d2c3f91582f753cbd5af78e66b37d267404ebf8858306879caa8b1ec46538d4b451bb604a36253fba5b3aec8e3386a10e3b26ab9d60e6568c856822967e8f157aefe762538e98788be231d7f811333f7524c043302269f3511d78301e7a112a26cbb8d26e5de17b27b6911e0713caedbd100047af6dc13487a512543b83b346f4b1b89349fe1ebd3651c225ecb5b65f233d437dbb5d5a2670a86eaddeb5ad4b74d13bf54856bd9791c2a76111227d73cdced29d538fd21d61c1905aaac51f943be68bc69e7708385c331c94be61463a7a6e42dcc428db4f80bd28e64a5e280ca70204b6ef037cbc2ad6fe320c1fa35ae2da59882bfddee82b41458a75581747e33c7e1247d2d225fa2d360b06e2feeaabfb49eb612170932fa1ef0ebeda65ca865c419706c6e8103488e83afbac3fb863f4a382058f23cab4254de7c3dc15194fb36b6b6d424c34aeb8769766392c29e1d91d6be49207faee88c511c75fb5031a364271ff0a6024bb79b865fdbf947b6231c894f837988b19558428fb0d28bfddadd792f7a76d1683d969286b275607ae366bc1f68e09d5bc686c5e600c164371fc55b560d47626fb3fdd82faf95e481ce5c54eab5f02c5add66ecb982c19425b3c6b1c2c49b56bb0a9514fb8cd4e1a1a86062d6071ab0e9e33e63197acd51f2118e9f7b8b78b6146eda7debbab95f6a75d77d6ba608b4d2c56c44a9a94e49e6f46b0039c0db031d850c967920c0746ebf99022684ba88bc8fb2934416bf43d1fac64d43db1ed54f4f8b914bc8397e110cbac668266798dd3d730ef6b4a43b8d26f6e18c1e12f7d39300bd656dca6b91adbd152289f43ca216256719ac61a3946216a659b59cec555d6172bd544862907f63ed7f505820ccf46888ccb368458cd1d9202db1d7742e64432126c81ae26eaf44974f3de0df9abec0bff96fa4cd0e79598bf409f0695b7ee30547fa33b8b78324f85e7cac7d734736febfd1c237503c5b8339c9cca2a7c4ef465ef6309d6626b840a89ed8e4d00c30d9cd36c1442cbc319401b7f3ee1505059d2e74dfbf84c6496a54512ddfc09b58b768458e71ac7e352c03d67f82d0fc3c7e56d0808a25d41d413937e1b220378ab743cb190333d77b02e99607404bed58fd79597967eab628928fd09016e022deef362d4804ee325828b79ff229464c2193cff1ea536933be79a16a0d95abe8eba812e6e2489f588ee19250ac53de7676d5d6489a0b634901cdb971bfcfe6744e4d5f63b1f1c85498d45aeed15b685b78184390afef85d70afa781fed82b68342bf5ee81aaedda566fa6c74012bcb212837238c3143eaa05017d414899e51e8d0007b424a655c1cab44e8047ef8350fce96d9b918785b6cc5aa07b2527e3700077ef731812e7843a0e7bb1e704021679fb78b43973c27937951fde2554eb49bcbeb9defd916df49229f779cb39d93be738867fe2a0f3f09d31fe2f303da5f36e9f5001865a63eec86df05d48d9dbdb64c864318adbaac9339520a0347f1238a51717847aa6b797856a41e0787a485bba0caa9f08db379c6afc4cebf53c5efb290ca3d1d3ad047d433f8397c6e2b1ab77e65c9d25a5008385bb4664dd868e29109bbec968c6c06299745a9d7460e1f7205991599e1c2fd821b01fbc186af99dc696fcce8cc3d157bb997188b16c016b740a72d2853ac5c9aba888460b0a342f08941e3842fc6a60147a9cd7101defcb25b8d55c3a5dae5bf092a9541254bec9e979b4a42fea549358df35cdf2780e27a212d471113f0debddbf0259cfe0affe12699263010a6", 0xcf6}], 0x8, &(0x7f00000025c0)=[@cred, @rights, @rights, @cred, @cred, @rights, @rights], 0xd8}, 0x0) 03:03:16 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f00000026c0)={0x0, 0x0, &(0x7f00000004c0), 0xa}, 0x0) 03:03:16 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x2200, &(0x7f0000000040)) 03:03:16 executing program 0: mlock(&(0x7f0000ffa000/0x4000)=nil, 0x4000) pipe(&(0x7f0000000000)) 03:03:16 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r0, 0x9, 0x0) 03:03:16 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f00000026c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="3482060b5a4e5d2e8896758315192002e3cbe3dcdb92ffefd70467c5b4bee8370044256daeb299ceaba5a4bf1064654f6d472703dcb322768d5ae793261c4ab429d2adf3d4729655fae91ff73f5ce226b5dbc5ea90720f95e00d98393bee5a1aa4ed91d7604ac92f6befd8cd2aa7cf359c2e2151dfc1fe91ad7147d36e3c6e74241f15df7e478556adcb6baed4abe6cbf7", 0x91}], 0x1}, 0x0) 03:03:16 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000001800)=0xc) fchown(r1, 0x0, r2) 03:03:16 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x2500, &(0x7f0000000040)) 03:03:16 executing program 0: mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 03:03:16 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f00000026c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="3482060b5a4e5d2e8896758315192002e3cbe3dcdb92ffefd70467c5b4bee8370044256daeb299ceaba5a4bf1064654f6d472703dcb322768d5ae793261c4ab429d2adf3d4729655fae91ff73f5c5fdbc9a001fce5130f95e00d98393bee5a1aa4ed91d7604ac92f6befd8cd2aa7cf359c2e2151dfc1fe91967147d36e3c6e74241f15df7e478556adcb6baed4abe6cbf7", 0xfa9f568f026675}], 0x1, 0x0, 0xfffffffffffffe64, 0x4}, 0x3) 03:03:16 executing program 4: socket$inet(0x2, 0x0, 0x5) 03:03:16 executing program 0: r0 = syz_open_pts(0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000080)="c1b13b8a73aa7b5444ac1a842e1748073ed57c36f4b01423ff60f5a81c54408bf51f108a7c4d78d86a1538cc674f4a76d837a3d8d8879fd7533406effc19312627a946ea8185d0ef12bb393e9848d4fef57fb8d04ff15874cf2da30edf56629f3988fcecf1f13beb0a02777c351a22bce1582ddded8a7eff2ba645fbbd03935da7f452873719e7d3a3c6cc584dfec2b581569370c5482eee189b76527ca7bfb4473b4171d0240d", 0xa7) 03:03:16 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x2e00, &(0x7f0000000040)) 03:03:16 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff}) readv(r0, &(0x7f00000001c0)=[{0x0}], 0x1) 03:03:16 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 03:03:16 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) faccessat(r1, &(0x7f0000000040)='./file0\x00', 0x0) 03:03:16 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) getsockopt$sock_cred(r1, 0xffff, 0x1022, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000001800)=0xc) fchown(r2, 0x0, r3) setgid(r3) fchown(r0, 0x0, 0x0) 03:03:16 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000280)=[{0x0}], 0x1}, 0x0) 03:03:16 executing program 5: r0 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x8004741b, &(0x7f0000000000)=0x9) 03:03:16 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000200)="e9c772f94107a60bb7e916a8b4d2240efda9da551c0127cab5becda9fe3632056d6367f03e540bd684abbc9338d7bd0a14dd", 0x32) 03:03:16 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x3f00, &(0x7f0000000040)) 03:03:16 executing program 2: sendmsg$unix(0xffffffffffffffff, &(0x7f00000026c0)={0x0, 0x0, &(0x7f00000004c0), 0xa}, 0x0) 03:03:16 executing program 0: recvmsg(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)=@in, 0xc, &(0x7f0000000280)=[{&(0x7f0000000400)=""/210, 0xdc}, {&(0x7f0000000140)=""/62, 0x3e}, {&(0x7f0000000180)=""/219, 0xdb}], 0x1000000000000151, &(0x7f00000002c0)=""/245, 0xf5}, 0x0) 03:03:16 executing program 4: socket(0x2, 0xefb26067ef5a1d23, 0x0) 03:03:16 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x7, 0x0, &(0x7f0000000480)) 03:03:16 executing program 5: r0 = syz_open_pts(0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000700)=[{&(0x7f0000000080)="2160c528a5edfce767f99e9c1b2877726345c8686ff4e340465711de271683d803aae20af1debd15c1033afa257f9101ec", 0x31}, {&(0x7f00000001c0)="4184e6919d6adc809f61738fba00b0187c1188f15b9bd69e5b67d2d4df3ca00c237418ba068f10b974e56105465f9c4443740355e866261bdf1672159653e1883e63405ab20d28273d5c3dfe9c8681cbccb7a9c6de1a7b71df8e59176511883c01bba013c97fcfce2b39dd1e841446c3c2bac4fc05bc57fc00ec9c7eece8eb1f956958506963477f5bcb3f7a8821e577d6c8d9efbdc7076e74dce5f7afe02107291085e23c63803e5376f519b1246209a7739cc322b6574adde33f323a0a4213201add100be74f50b652", 0xca}, {&(0x7f00000002c0)="afcdfa8578665112f94dc044e730a25ac1ccb6acad20f964c396e936e095dc70ac38e52f16e985b92fe8d7b653cc5b573eee0f2b7f84cd92bc6218bdab433d1d055eda7b7a263e0e10814589c45a93f48a431ed6e7733dcb58f3c10c093cd1811cd39fa8f0", 0x65}, {&(0x7f00000003c0)="7f3f946ead11865548ecc182a2afea76867e02e021b4cfafd86f5240427e1907944fac59aa5e88eed5a28b2080b92647b6f1579d00ed03685d9ff250cce94e642d7e308f45640304da837683b81eefbbb44d86dc26564fd74fb08712523931fd7b9e3d3ac12890457e0a7c9e444b4bfd61f6f6132fc910c33980f57cf4b9b2e80bd3cedb3769f40fea837ca017498542938b30d835da7fce8ba86364faa26eec1d", 0xa1}], 0x4) 03:03:16 executing program 3: r0 = socket(0x2, 0x1, 0x0) setsockopt(r0, 0x0, 0x3, &(0x7f0000000040), 0x0) 03:03:16 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x4000, &(0x7f0000000040)) 03:03:16 executing program 0: pipe(&(0x7f0000031840)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, 0x0, 0x0) 03:03:16 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff}) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 03:03:16 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r1, r0) 03:03:16 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) io_setup(0x400, &(0x7f0000000040)) 03:03:16 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000080)=0x3ff, 0x4) connect$inet(r1, &(0x7f0000000040), 0x10) 03:03:16 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x431c, &(0x7f0000000040)) 03:03:16 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000040)={0x0, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, {}, {0x2, 0x0, @dev}}) 03:03:16 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x400, &(0x7f0000000040)) 03:03:16 executing program 3: keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000140), &(0x7f0000000180)={'enc=', 'oaep', ' hash=', {'sha512-avx\x00'}}, 0x0, 0x0) 03:03:16 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840), 0x0, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) dup2(r1, r2) 03:03:16 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x441c, &(0x7f0000000040)) 03:03:16 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x400, &(0x7f0000000040)) 03:03:16 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x1a9, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) 03:03:16 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840), 0x0, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) dup2(r1, r2) 03:03:16 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x15, 0x0, &(0x7f0000000480)) 03:03:16 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x451c, &(0x7f0000000040)) 03:03:16 executing program 2: clock_gettime(0x0, &(0x7f0000007a80)) 03:03:16 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x1a9, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) 03:03:16 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x3, 0x0, &(0x7f0000000480)) 03:03:16 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) 03:03:16 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x4800, &(0x7f0000000040)) 03:03:16 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840), 0x0, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) dup2(r1, r2) 03:03:16 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x400, &(0x7f0000000040)) syz_open_dev$sg(0x0, 0x0, 0x5) lseek(0xffffffffffffffff, 0x0, 0x0) 03:03:16 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x21, 0x0, &(0x7f0000000480)) 03:03:16 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x1a9, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) 03:03:16 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @local}, 0xc) dup3(r0, r1, 0x0) 03:03:16 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x4c00, &(0x7f0000000040)) 03:03:16 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="18000000", @ANYRES16=r1, @ANYBLOB="1db700001600000000001700000004000180"], 0x18}}, 0x0) 03:03:16 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x1a9, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) 03:03:16 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r3, 0x0, 0x1420000a77, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="390000001100090468fe07000000000007", 0x11}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffa) 03:03:16 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840), 0x0, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) dup2(r1, r2) 03:03:16 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x6000, &(0x7f0000000040)) 03:03:16 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x1a9, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) tkill(0x0, 0x22) 03:03:16 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840), 0x0, 0x0) dup2(r1, r2) 03:03:16 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f0000000400)={'filter\x00', 0x4, "aa3c1f3c"}, &(0x7f0000000480)=0x2c) 03:03:16 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="18000000", @ANYRES16=r1, @ANYBLOB="1db700001600000000001700000004000180"], 0x18}}, 0x0) 03:03:16 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840), 0x0, 0x0) dup2(r1, r2) 03:03:16 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x6800, &(0x7f0000000040)) 03:03:16 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="18000000", @ANYRES16=r1, @ANYBLOB="1db700001600000000001700000004000180"], 0x18}}, 0x0) 03:03:16 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r3, 0x0, 0x1420000a77, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="390000001100090468fe07000000000007", 0x11}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffa) 03:03:16 executing program 2: mbind(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x8003, &(0x7f0000000000)=0x9, 0x8, 0x0) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x4, 0x0, 0x0, 0x0) 03:03:17 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840), 0x0, 0x0) dup2(r1, r2) 03:03:17 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="18000000", @ANYRES16=r1, @ANYBLOB="1db700001600000000001700000004000180"], 0x18}}, 0x0) 03:03:17 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x6c00, &(0x7f0000000040)) 03:03:19 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x1a9, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) tkill(0x0, 0x22) 03:03:19 executing program 2: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x4100) ftruncate(r0, 0x800) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) 03:03:19 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) dup2(r1, 0xffffffffffffffff) 03:03:19 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="18000000", @ANYRES16, @ANYBLOB="1db700001600000000001700000004000180"], 0x18}}, 0x0) 03:03:19 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r3, 0x0, 0x1420000a77, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="390000001100090468fe07000000000007", 0x11}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffa) 03:03:19 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x7400, &(0x7f0000000040)) 03:03:19 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="18000000", @ANYRES16, @ANYBLOB="1db700001600000000001700000004000180"], 0x18}}, 0x0) 03:03:19 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) dup2(r1, 0xffffffffffffffff) 03:03:19 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000140)=0x1, 0x4) 03:03:19 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x7a00, &(0x7f0000000040)) 03:03:19 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) dup2(r1, 0xffffffffffffffff) 03:03:19 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="18000000", @ANYRES16, @ANYBLOB="1db700001600000000001700000004000180"], 0x18}}, 0x0) 03:03:22 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x1a9, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) tkill(0x0, 0x22) 03:03:22 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r3, 0x0, 0x1420000a77, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="390000001100090468fe07000000000007", 0x11}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffa) 03:03:22 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x8100, &(0x7f0000000040)) 03:03:22 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840), 0x0, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) dup2(0xffffffffffffffff, r1) 03:03:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x3ff, 0x4) connect$inet(r0, &(0x7f0000000040), 0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000140)) rmdir(0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) 03:03:22 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="18000000", @ANYRES16=r0, @ANYBLOB="1db700001600000000001700000004000180"], 0x18}}, 0x0) 03:03:22 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0xedc0, &(0x7f0000000040)) 03:03:22 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="18000000", @ANYRES16=r0, @ANYBLOB="1db700001600000000001700000004000180"], 0x18}}, 0x0) 03:03:22 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840), 0x0, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) dup2(0xffffffffffffffff, r1) 03:03:22 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_PEER_MEASUREMENT_START(r0, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000040)={&(0x7f00000036c0)={0x1ec4, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @val={0xc}}}, [@NL80211_PMSR_ATTR_PEERS={0x37c, 0x5, 0x0, 0x1, [{0x348, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_REQ={0x23c, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0xdc, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x2c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x40, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x2c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x108, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x4}, @NL80211_PMSR_TYPE_FTM={0x38, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x30, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}]}, @NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}]}]}, @NL80211_PMSR_PEER_ATTR_REQ={0x8, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0x2c, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0x4c, 0x2, 0x0, 0x1, [@NL80211_ATTR_CENTER_FREQ1={0x8}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}, @NL80211_ATTR_CENTER_FREQ2={0x8}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}, @NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0x3c, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8}, @NL80211_ATTR_CENTER_FREQ1={0x8}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random}, @NL80211_ATTR_CENTER_FREQ2={0x8}, @NL80211_ATTR_CENTER_FREQ2={0x8}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0x4c, 0x2, 0x0, 0x1, [@NL80211_ATTR_CENTER_FREQ1={0x8}, @NL80211_ATTR_CENTER_FREQ2={0x8}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8}, @NL80211_ATTR_CENTER_FREQ2={0x8}, @NL80211_ATTR_CHANNEL_WIDTH={0x8}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5}, @NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5}]}]}, {0x30, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_CHAN={0x14, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @broadcast}]}]}, @NL80211_PMSR_ATTR_PEERS={0x7c8, 0x5, 0x0, 0x1, [{0x1fc, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_REQ={0x84, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x78, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x4}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}]}]}, @NL80211_PMSR_PEER_ATTR_REQ={0x174, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_DATA={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x74, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x2c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x30, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0xb4, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x3c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x30, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x2c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}]}, {0x30, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @broadcast}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}, @NL80211_PMSR_PEER_ATTR_REQ={0x8, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @broadcast}]}, {0x14, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @broadcast}, @NL80211_PMSR_PEER_ATTR_CHAN={0x4}]}, {0x138, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_REQ={0x7c, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_DATA={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x6c, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x38, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x4}, @NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0xc, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random}]}, @NL80211_PMSR_PEER_ATTR_REQ={0x54, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x4c, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x3c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}]}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0x14, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0x14, 0x2, 0x0, 0x1, [@NL80211_ATTR_CENTER_FREQ1={0x8}, @NL80211_ATTR_CENTER_FREQ1={0x8}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0x1c, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0x14, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5}, @NL80211_ATTR_CHANNEL_WIDTH={0x8}]}]}, {0xc, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_REQ={0x8, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}]}, {0x274, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_REQ={0x8, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}, @NL80211_PMSR_PEER_ATTR_REQ={0x8, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}, @NL80211_PMSR_PEER_ATTR_REQ={0x58, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x40, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x3c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}, @NL80211_PMSR_PEER_ATTR_REQ={0x194, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_DATA={0x104, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x4c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x84, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x2c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x40, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0x24, 0x2, 0x0, 0x1, [@NL80211_ATTR_CENTER_FREQ2={0x8}, @NL80211_ATTR_CENTER_FREQ1={0x8}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0x34, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8}, @NL80211_ATTR_CENTER_FREQ1={0x8}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8}, @NL80211_ATTR_CENTER_FREQ1={0x8}]}, @NL80211_PMSR_PEER_ATTR_REQ={0x1c, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}]}, {0x1cc, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa}, @NL80211_PMSR_PEER_ATTR_REQ={0x198, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_DATA={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x48, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x30, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x7c, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x64, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x2c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x40, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x3c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @broadcast}]}]}, @NL80211_PMSR_ATTR_PEERS={0x31c, 0x5, 0x0, 0x1, [{0x318, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_CHAN={0x1c, 0x2, 0x0, 0x1, [@NL80211_ATTR_CENTER_FREQ1={0x8}, @NL80211_ATTR_CHANNEL_WIDTH={0x8}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random}]}, @NL80211_PMSR_PEER_ATTR_REQ={0x17c, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_DATA={0x84, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}]}, @NL80211_PMSR_TYPE_FTM={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x3c, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x38, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x40, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x50, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa}, @NL80211_PMSR_PEER_ATTR_REQ={0x8, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0x4}, @NL80211_PMSR_PEER_ATTR_CHAN={0x34, 0x2, 0x0, 0x1, [@NL80211_ATTR_CENTER_FREQ1={0x8}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5}, @NL80211_ATTR_CHANNEL_WIDTH={0x8}, @NL80211_ATTR_CENTER_FREQ1={0x8}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random}, @NL80211_ATTR_CENTER_FREQ2={0x8}]}, @NL80211_PMSR_PEER_ATTR_REQ={0x130, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x74, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x4}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0xa0, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}]}]}]}]}, @NL80211_PMSR_ATTR_PEERS={0x1044, 0x5, 0x0, 0x1, [{0x350, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_REQ={0x34c, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_DATA={0xa8, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x68, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x40, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0xf8, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x3c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}]}, @NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0xbc, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x2c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x4}, @NL80211_PMSR_TYPE_FTM={0x4c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x7c, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}]}, @NL80211_PMSR_TYPE_FTM={0x48, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}]}]}]}, {0x360, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_REQ={0xfc, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_DATA={0x60, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x38, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x60, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x30, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x4}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x38, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}]}]}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0x24, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8}, @NL80211_ATTR_CENTER_FREQ2={0x8}, @NL80211_ATTR_CHANNEL_WIDTH={0x8}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0x2c, 0x2, 0x0, 0x1, [@NL80211_ATTR_CHANNEL_WIDTH={0x8}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8}]}, @NL80211_PMSR_PEER_ATTR_REQ={0x210, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x90, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x48, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x12c, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x2c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x30, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x30, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}]}, @NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}]}]}]}, {0x5a4, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_CHAN={0x14, 0x2, 0x0, 0x1, [@NL80211_ATTR_CENTER_FREQ1={0x8}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa}, @NL80211_PMSR_PEER_ATTR_REQ={0x1a8, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_DATA={0x38, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x158, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}]}, @NL80211_PMSR_TYPE_FTM={0x48, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x2c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x38, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}]}]}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0x2c, 0x2, 0x0, 0x1, [@NL80211_ATTR_CHANNEL_WIDTH={0x8}, @NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0x4c, 0x2, 0x0, 0x1, [@NL80211_ATTR_CHANNEL_WIDTH={0x8}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0x3c, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}, @NL80211_ATTR_CENTER_FREQ1={0x8}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8}]}, @NL80211_PMSR_PEER_ATTR_REQ={0x318, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x98, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x40, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x98, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}]}, @NL80211_PMSR_TYPE_FTM={0x2c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x104, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x2c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x48, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x3c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}]}, @NL80211_PMSR_TYPE_FTM={0x4}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x94, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x2c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}]}, @NL80211_PMSR_TYPE_FTM={0x40, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}]}]}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}]}, {0x13c, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}, @NL80211_PMSR_PEER_ATTR_REQ={0x12c, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_DATA={0x120, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x3c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x38, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x40, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}]}, {0x10, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @broadcast}]}, {0x2a0, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_REQ={0xe4, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0xd8, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x40, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}]}]}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa}, @NL80211_PMSR_PEER_ATTR_REQ={0x1ac, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0xfc, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}]}, @NL80211_PMSR_TYPE_FTM={0x38, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0xa8, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x38, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}]}, @NL80211_PMSR_TYPE_FTM={0x3c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}]}]}]}]}]}]}, 0x1ec4}}, 0x0) 03:03:23 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0xfeff, &(0x7f0000000040)) 03:03:23 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="390000001100090468fe07000000000007", 0x11}], 0x1) 03:03:25 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840), 0x0, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) dup2(0xffffffffffffffff, r1) 03:03:25 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x1a9, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) r1 = gettid() tkill(r1, 0x22) 03:03:25 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x0, @private=0xa010100}, 0x10) 03:03:25 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="18000000", @ANYRES16=r0, @ANYBLOB="1db700001600000000001700000004000180"], 0x18}}, 0x0) 03:03:25 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0xff0f, &(0x7f0000000040)) 03:03:25 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="390000001100090468fe07000000000007", 0x11}], 0x1) 03:03:26 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="18000000", @ANYRES16=r1, @ANYBLOB="1db700001600000000001700000004000180"], 0x18}}, 0x0) 03:03:26 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840), 0x0, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) dup2(r1, r2) 03:03:26 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0xfffe, &(0x7f0000000040)) 03:03:26 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0xb, 0x0, &(0x7f0000000480)) 03:03:26 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x1a9, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) r1 = gettid() tkill(r1, 0x22) 03:03:26 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="18000000", @ANYRES16=r1, @ANYBLOB="1db700001600000000001700000004000180"], 0x18}}, 0x0) 03:03:26 executing program 2: syz_io_uring_setup(0x1ea, &(0x7f0000000140), &(0x7f0000ff7000/0x3000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f00000000c0), &(0x7f0000000040)) 03:03:26 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840), 0x0, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) dup2(r1, r2) 03:03:26 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x101ff, &(0x7f0000000040)) 03:03:26 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x1a9, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) r1 = gettid() tkill(r1, 0x22) 03:03:26 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="18000000", @ANYRES16=r1, @ANYBLOB="1db700001600000000001700000004000180"], 0x18}}, 0x0) 03:03:26 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0xf, 0x0, &(0x7f0000000480)) 03:03:26 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="390000001100090468fe07000000000007", 0x11}], 0x1) 03:03:26 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x10200, &(0x7f0000000040)) 03:03:26 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="18000000", @ANYRES16=r1, @ANYBLOB="1db700001600000000001700000004000180"], 0x18}}, 0x0) 03:03:26 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x1a9, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) 03:03:26 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840), 0x0, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) dup2(r1, r2) 03:03:26 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x19, 0x0, &(0x7f0000000480)) 03:03:26 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840), 0x0, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) dup2(r1, r2) 03:03:26 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x20000, &(0x7f0000000040)) 03:03:26 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x1a9, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) 03:03:26 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="18000000", @ANYRES16=r0, @ANYBLOB="1db700001600000000001700000004000180"], 0x18}}, 0x0) 03:03:26 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0xa, 0x13012, r0, 0x0) 03:03:26 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840), 0x0, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) dup2(r1, r2) 03:03:26 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x1a9, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) 03:03:27 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r3, 0x0, 0x1420000a77, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffa) 03:03:27 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="18000000", @ANYRES16=r0, @ANYBLOB="1db700001600000000001700000004000180"], 0x18}}, 0x0) 03:03:27 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x20100, &(0x7f0000000040)) 03:03:27 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0xa, 0x13012, r0, 0x0) 03:03:27 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840), 0x0, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) dup2(r1, r2) 03:03:27 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x1a9, 0x0}) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) 03:03:27 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="18000000", @ANYRES16=r0, @ANYBLOB="1db700001600000000001700000004000180"], 0x18}}, 0x0) 03:03:27 executing program 4: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840), 0x0, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) dup2(r0, r1) 03:03:27 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0xa, 0x13012, r0, 0x0) 03:03:27 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x1a9, 0x0}) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) 03:03:27 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x20400, &(0x7f0000000040)) 03:03:27 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, 0x0, 0x0) 03:03:27 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r3, 0x0, 0x1420000a77, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffa) 03:03:27 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0xa, 0x13012, r0, 0x0) 03:03:27 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x1a9, 0x0}) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) 03:03:27 executing program 4: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840), 0x0, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) dup2(r0, r1) 03:03:27 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x3ffff, &(0x7f0000000040)) 03:03:27 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, 0x0, 0x0) 03:03:27 executing program 4: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840), 0x0, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) dup2(r0, r1) 03:03:27 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x40000, &(0x7f0000000040)) 03:03:27 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0xa, 0x13012, r0, 0x0) 03:03:27 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, 0x0, 0x0) 03:03:27 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) 03:03:28 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x40200, &(0x7f0000000040)) 03:03:28 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r3, 0x0, 0x1420000a77, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffa) 03:03:28 executing program 4: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840), 0x0, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) dup2(r1, r2) 03:03:28 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0xa, 0x13012, r0, 0x0) 03:03:28 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) 03:03:28 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) 03:03:28 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x407fc, &(0x7f0000000040)) 03:03:28 executing program 4: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840), 0x0, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) dup2(r1, r2) 03:03:28 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0xa, 0x13012, r0, 0x0) 03:03:28 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) 03:03:28 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) 03:03:28 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x40800, &(0x7f0000000040)) 03:03:28 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x1420000a77, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="390000001100090468fe07000000000007", 0x11}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffa) 03:03:28 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) 03:03:28 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0xa, 0x13012, r0, 0x0) 03:03:28 executing program 4: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840), 0x0, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) dup2(r1, r2) 03:03:28 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x1a9, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) 03:03:28 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x80000, &(0x7f0000000040)) 03:03:28 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x1420000a77, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="390000001100090468fe07000000000007", 0x11}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffa) 03:03:28 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={0x0, 0x18}}, 0x0) 03:03:28 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840), 0x0, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) dup2(r1, r2) 03:03:28 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0xa, 0x13012, r0, 0x0) 03:03:28 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x80400, &(0x7f0000000040)) 03:03:28 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={0x0, 0x18}}, 0x0) 03:03:28 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x1420000a77, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="390000001100090468fe07000000000007", 0x11}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffa) 03:03:28 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x1a9, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) 03:03:28 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840), 0x0, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) dup2(r1, r2) 03:03:28 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0xc0000, &(0x7f0000000040)) 03:03:28 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={0x0, 0x18}}, 0x0) 03:03:28 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0xa, 0x13012, r0, 0x0) 03:03:28 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x1a9, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) 03:03:28 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r3, 0x0, 0x1420000a77, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="390000001100090468fe07000000000007", 0x11}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffa) 03:03:28 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840), 0x0, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) dup2(r1, r2) 03:03:28 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0xa, 0x13012, r0, 0x0) 03:03:28 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x1a9, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) 03:03:28 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x810000, &(0x7f0000000040)) 03:03:28 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="18000000", @ANYRES16=r1], 0x18}}, 0x0) 03:03:28 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x1a9, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) 03:03:28 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840), 0x0, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) dup2(r1, r2) 03:03:28 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0xa, 0x13012, r0, 0x0) 03:03:28 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0xe0ffff, &(0x7f0000000040)) 03:03:28 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x1a9, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) 03:03:28 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="18000000", @ANYRES16=r1], 0x18}}, 0x0) 03:03:28 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r3, 0x0, 0x1420000a77, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="390000001100090468fe07000000000007", 0x11}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffa) 03:03:28 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840), 0x0, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) dup2(r1, r2) 03:03:28 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0xa, 0x13012, r0, 0x0) 03:03:28 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x1000000, &(0x7f0000000040)) 03:03:28 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x1a9, 0x0}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x17) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r0 = gettid() tkill(r0, 0x22) 03:03:28 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="18000000", @ANYRES16=r1], 0x18}}, 0x0) 03:03:28 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0xa, 0x13012, r0, 0x0) 03:03:28 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840), 0x0, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) dup2(r1, r2) 03:03:28 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x1a9, 0x0}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x17) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r0 = gettid() tkill(r0, 0x22) 03:03:28 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r3, 0x0, 0x1420000a77, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="390000001100090468fe07000000000007", 0x11}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffa) 03:03:28 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="18000000", @ANYRES16=r1, @ANYBLOB], 0x18}}, 0x0) 03:03:28 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x1020000, &(0x7f0000000040)) 03:03:28 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840), 0x0, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) dup2(r1, r2) 03:03:28 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x1a9, 0x0}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x17) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r0 = gettid() tkill(r0, 0x22) 03:03:28 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0xa, 0x13012, r0, 0x0) 03:03:28 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="18000000", @ANYRES16=r1, @ANYBLOB], 0x18}}, 0x0) 03:03:28 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x2000000, &(0x7f0000000040)) 03:03:28 executing program 3: r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x1a9, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) 03:03:28 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r3, 0x0, 0x1420000a77, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="390000001100090468fe07000000000007", 0x11}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffa) 03:03:28 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840), 0x0, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) dup2(r1, r2) 03:03:28 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0xa, 0x13012, r0, 0x0) 03:03:28 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="18000000", @ANYRES16=r1, @ANYBLOB], 0x18}}, 0x0) 03:03:28 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x2040000, &(0x7f0000000040)) 03:03:28 executing program 3: r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x1a9, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) 03:03:28 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840), 0x0, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) dup2(r1, r2) 03:03:28 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0xa, 0x13012, 0xffffffffffffffff, 0x0) 03:03:28 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x3000000, &(0x7f0000000040)) 03:03:28 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="18000000", @ANYRES16=r1, @ANYBLOB="1db700001600000000"], 0x18}}, 0x0) 03:03:28 executing program 3: r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x1a9, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) 03:03:29 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r3, 0x0, 0x1420000a77, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="390000001100090468fe07000000000007", 0x11}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffa) 03:03:29 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840), 0x0, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) dup2(r1, r2) 03:03:29 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="18000000", @ANYRES16=r1, @ANYBLOB="1db700001600000000"], 0x18}}, 0x0) 03:03:29 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x4000000, &(0x7f0000000040)) 03:03:29 executing program 3: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x1a9, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) 03:03:29 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0xa, 0x13012, 0xffffffffffffffff, 0x0) 03:03:29 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="18000000", @ANYRES16=r1, @ANYBLOB="1db700001600000000"], 0x18}}, 0x0) 03:03:29 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840), 0x0, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) dup2(r1, r2) 03:03:29 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0xa, 0x13012, 0xffffffffffffffff, 0x0) 03:03:29 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x5000000, &(0x7f0000000040)) 03:03:29 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840), 0x0, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) dup2(r1, r2) 03:03:29 executing program 2: r0 = socket$packet(0x11, 0x0, 0x300) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0xa, 0x13012, r0, 0x0) 03:03:29 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r3, 0x0, 0x1420000a77, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="390000001100090468fe07000000000007", 0x11}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffa) 03:03:29 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="18000000", @ANYRES16=r1, @ANYBLOB="1db7000016000000000017000000"], 0x18}}, 0x0) 03:03:29 executing program 3: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x1a9, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) 03:03:29 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x5020000, &(0x7f0000000040)) 03:03:29 executing program 2: r0 = socket$packet(0x11, 0x0, 0x300) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0xa, 0x13012, r0, 0x0) 03:03:29 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840), 0x0, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) dup2(r1, r2) 03:03:29 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x6000000, &(0x7f0000000040)) 03:03:29 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="18000000", @ANYRES16=r1, @ANYBLOB="1db7000016000000000017000000"], 0x18}}, 0x0) 03:03:29 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="390000001100090468fe07000000000007", 0x11}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffa) [ 1103.901452][T21291] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 03:03:29 executing program 2: r0 = socket$packet(0x11, 0x0, 0x300) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0xa, 0x13012, r0, 0x0) 03:03:29 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840), 0x0, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) dup2(r1, r2) 03:03:29 executing program 3: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x1a9, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) 03:03:29 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x6020000, &(0x7f0000000040)) 03:03:29 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0xa, 0x13012, r0, 0x0) 03:03:29 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="18000000", @ANYRES16=r1, @ANYBLOB="1db7000016000000000017000000"], 0x18}}, 0x0) [ 1103.976921][T21307] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 03:03:29 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840), 0x0, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) dup2(r1, r2) 03:03:29 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x6040000, &(0x7f0000000040)) 03:03:29 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="390000001100090468fe07000000000007", 0x11}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffa) 03:03:29 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="18000000", @ANYRES16=r1, @ANYBLOB="1db70000160000000000170000000400"], 0x18}}, 0x0) 03:03:29 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0xa, 0x13012, r0, 0x0) [ 1104.069697][T21328] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 03:03:29 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x7000000, &(0x7f0000000040)) 03:03:29 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x1a9, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) 03:03:29 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840), 0x0, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) dup2(r1, r2) 03:03:29 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="18000000", @ANYRES16=r1, @ANYBLOB="1db70000160000000000170000000400"], 0x18}}, 0x0) 03:03:29 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x1a9, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) 03:03:29 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="390000001100090468fe07000000000007", 0x11}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffa) 03:03:29 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0xa, 0x13012, r0, 0x0) 03:03:29 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x7020000, &(0x7f0000000040)) 03:03:29 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="18000000", @ANYRES16=r1, @ANYBLOB="1db70000160000000000170000000400"], 0x18}}, 0x0) 03:03:29 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840), 0x0, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) dup2(r1, r2) 03:03:29 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x1a9, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) 03:03:29 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0xa, 0x13012, r0, 0x0) 03:03:29 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x8000000, &(0x7f0000000040)) 03:03:29 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x1a9, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) 03:03:29 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="18000000", @ANYRES16=r1, @ANYBLOB="1db7000016000000000017000000040001"], 0x18}}, 0x0) 03:03:29 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840), 0x0, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) dup2(r1, r2) 03:03:29 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x1420000a77, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="390000001100090468fe07000000000007", 0x11}], 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffa) 03:03:29 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0xa, 0x13012, r0, 0x0) 03:03:29 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x9000000, &(0x7f0000000040)) 03:03:29 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="18000000", @ANYRES16=r1, @ANYBLOB="1db7000016000000000017000000040001"], 0x18}}, 0x0) 03:03:29 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x1a9, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) 03:03:29 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x1420000a77, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="390000001100090468fe07000000000007", 0x11}], 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffa) 03:03:29 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, 0x0) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840), 0x0, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) dup2(r1, r2) 03:03:29 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0xa, 0x13012, r0, 0x0) 03:03:29 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0xa000000, &(0x7f0000000040)) 03:03:29 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x1420000a77, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="390000001100090468fe07000000000007", 0x11}], 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffa) 03:03:29 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="18000000", @ANYRES16=r1, @ANYBLOB="1db7000016000000000017000000040001"], 0x18}}, 0x0) 03:03:29 executing program 0: pipe(0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x1420000a77, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="390000001100090468fe07000000000007", 0x11}], 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffa) 03:03:29 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="18000000", @ANYBLOB="1db700001600000000001700000004000180"], 0x18}}, 0x0) 03:03:29 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0xb000000, &(0x7f0000000040)) 03:03:29 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, 0x0) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840), 0x0, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) dup2(r1, r2) 03:03:29 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0xa, 0x13012, r0, 0x0) 03:03:29 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x1a9, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) 03:03:29 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="18000000", @ANYBLOB="1db700001600000000001700000004000180"], 0x18}}, 0x0) 03:03:29 executing program 0: pipe(0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x1420000a77, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="390000001100090468fe07000000000007", 0x11}], 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffa) 03:03:30 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}], 0x1, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x1a9, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) 03:03:30 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0xc000000, &(0x7f0000000040)) 03:03:30 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, 0x0) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840), 0x0, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) dup2(r1, r2) 03:03:30 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0xa, 0x13012, r0, 0x0) 03:03:30 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="18000000", @ANYBLOB="1db700001600000000001700000004000180"], 0x18}}, 0x0) 03:03:30 executing program 0: pipe(0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x1420000a77, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="390000001100090468fe07000000000007", 0x11}], 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffa) 03:03:30 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0xa, 0x13012, r0, 0x0) 03:03:30 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') r2 = openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) dup2(r1, r2) 03:03:30 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0xd000000, &(0x7f0000000040)) 03:03:30 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}], 0x1, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x1a9, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) 03:03:30 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="18000000", @ANYRES16, @ANYBLOB="1db700001600000000001700000004000180"], 0x18}}, 0x0) 03:03:30 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0xa, 0x13012, r0, 0x0) 03:03:30 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r3, 0x0, 0x1420000a77, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="390000001100090468fe07000000000007", 0x11}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffa) 03:03:30 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0xe000000, &(0x7f0000000040)) 03:03:30 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') r2 = openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) dup2(r1, r2) 03:03:30 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}], 0x1, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x1a9, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) 03:03:30 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="18000000", @ANYRES16, @ANYBLOB="1db700001600000000001700000004000180"], 0x18}}, 0x0) 03:03:30 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0xa, 0x13012, r0, 0x0) 03:03:30 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {0x0}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x1a9, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) 03:03:30 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') r2 = openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) dup2(r1, r2) 03:03:30 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0xf000000, &(0x7f0000000040)) 03:03:30 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r3, 0x0, 0x1420000a77, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="390000001100090468fe07000000000007", 0x11}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffa) 03:03:30 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="18000000", @ANYRES16, @ANYBLOB="1db700001600000000001700000004000180"], 0x18}}, 0x0) 03:03:30 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {0x0}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x1a9, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) 03:03:30 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0xa, 0x13012, r0, 0x0) 03:03:30 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840), 0x0, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) dup2(r1, r2) 03:03:30 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYRES16=r1, @ANYBLOB="1db700001600000000001700000004000180"], 0x18}}, 0x0) 03:03:30 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x10000000, &(0x7f0000000040)) 03:03:30 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {0x0}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x1a9, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) 03:03:30 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r3, 0x0, 0x1420000a77, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="390000001100090468fe07000000000007", 0x11}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffa) 03:03:30 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0xa, 0x13012, r0, 0x0) 03:03:30 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYRES16=r1, @ANYBLOB="1db700001600000000001700000004000180"], 0x18}}, 0x0) 03:03:30 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840), 0x0, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) dup2(r1, r2) 03:03:30 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x1a9, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) 03:03:30 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x10040000, &(0x7f0000000040)) 03:03:30 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYRES16=r1, @ANYBLOB="1db700001600000000001700000004000180"], 0x18}}, 0x0) 03:03:30 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0xa, 0x13012, r0, 0x0) 03:03:30 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r3, 0x0, 0x1420000a77, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="390000001100090468fe07000000000007", 0x11}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffa) 03:03:30 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x11000000, &(0x7f0000000040)) 03:03:30 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x1a9, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) 03:03:30 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840), 0x0, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) dup2(r1, r2) 03:03:30 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r1, @ANYBLOB="1db700001600000000001700000004000180"], 0x18}}, 0x0) 03:03:30 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0xa, 0x13012, r0, 0x0) 03:03:30 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x1a9, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) 03:03:30 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840), 0x0, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) dup2(0xffffffffffffffff, r1) 03:03:30 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r1, @ANYBLOB="1db700001600000000001700000004000180"], 0x18}}, 0x0) 03:03:30 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x12000000, &(0x7f0000000040)) 03:03:30 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r1, @ANYBLOB="1db700001600000000001700000004000180"], 0x18}}, 0x0) 03:03:30 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, 0x0, 0x0, 0xd9f, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0xa, 0x13012, r0, 0x0) 03:03:31 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r3, 0x0, 0x1420000a77, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="390000001100090468fe07000000000007", 0x11}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffa) 03:03:31 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe", 0x23}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x1a9, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) 03:03:31 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x16020000, &(0x7f0000000040)) 03:03:31 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840), 0x0, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) dup2(0xffffffffffffffff, r1) 03:03:31 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="1800", @ANYRES16=r1, @ANYBLOB="1db700001600000000001700000004000180"], 0x18}}, 0x0) 03:03:31 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, 0x0, 0x0, 0xd9f, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0xa, 0x13012, r0, 0x0) 03:03:31 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="1800", @ANYRES16=r1, @ANYBLOB="1db700001600000000001700000004000180"], 0x18}}, 0x0) 03:03:31 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840), 0x0, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) dup2(0xffffffffffffffff, r1) 03:03:31 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x17020000, &(0x7f0000000040)) 03:03:31 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, 0x0, 0x0, 0xd9f, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0xa, 0x13012, r0, 0x0) 03:03:31 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="1800", @ANYRES16=r1, @ANYBLOB="1db700001600000000001700000004000180"], 0x18}}, 0x0) 03:03:31 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe", 0x23}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x1a9, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) 03:03:32 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r3, 0x0, 0x1420000a77, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="390000001100090468fe07000000000007", 0x11}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffa) 03:03:32 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x20000000, &(0x7f0000000040)) 03:03:32 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0xa, 0x13012, r0, 0x0) 03:03:32 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840), 0x0, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) dup2(r1, 0xffffffffffffffff) 03:03:32 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe", 0x23}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x1a9, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) 03:03:32 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="180000", @ANYRES16=r1, @ANYBLOB="1db700001600000000001700000004000180"], 0x18}}, 0x0) 03:03:32 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0xa, 0x13012, r0, 0x0) 03:03:32 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840), 0x0, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) dup2(r1, 0xffffffffffffffff) 03:03:32 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="180000", @ANYRES16=r1, @ANYBLOB="1db700001600000000001700000004000180"], 0x18}}, 0x0) 03:03:32 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb", 0x34}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x1a9, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) 03:03:32 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x20100000, &(0x7f0000000040)) 03:03:32 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0xa, 0x13012, r0, 0x0) 03:03:33 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="180000", @ANYRES16=r1, @ANYBLOB="1db700001600000000001700000004000180"], 0x18}}, 0x0) 03:03:33 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840), 0x0, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) dup2(r1, 0xffffffffffffffff) 03:03:33 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb", 0x34}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x1a9, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) 03:03:33 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x22000000, &(0x7f0000000040)) 03:03:33 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r3, 0x0, 0x1420000a77, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="390000001100090468fe07000000000007", 0x11}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffa) 03:03:33 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0xa, 0x13012, r0, 0x0) 03:03:33 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0xa, 0x13012, r0, 0x0) 03:03:33 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000001180), 0x0, 0x1e1d41) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write$evdev(r0, &(0x7f0000000040), 0x200002f8) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000040)=""/39) 03:03:33 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) recvmmsg(r0, 0x0, 0x0, 0x2101, &(0x7f0000005cc0)) 03:03:33 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb", 0x34}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x1a9, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) 03:03:33 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x25000000, &(0x7f0000000040)) 03:03:33 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0xa, 0x13012, r0, 0x0) 03:03:33 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x2e000000, &(0x7f0000000040)) 03:03:33 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r3, 0x0, 0x1420000a77, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="390000001100090468fe07000000000007", 0x11}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffa) 03:03:33 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f00000001c0)=0x2, 0x4) sendmmsg(r0, &(0x7f00000005c0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002240)='9', 0x1}], 0x1}}], 0x1, 0x0) 03:03:33 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1", 0x3d}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x1a9, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) 03:03:33 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, 0x0, 0x0) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0xa, 0x13012, r0, 0x0) 03:03:33 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x18, 0x0, &(0x7f0000000480)) 03:03:33 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1", 0x3d}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x1a9, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) 03:03:33 executing program 4: getresgid(&(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)) 03:03:33 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x3f000000, &(0x7f0000000040)) 03:03:33 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, 0x0, 0x0) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0xa, 0x13012, r0, 0x0) 03:03:33 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r3, 0x0, 0x1420000a77, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="390000001100090468fe07000000000007", 0x11}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffa) 03:03:33 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) madvise(&(0x7f00005c6000/0x1000)=nil, 0x1000, 0x12) io_setup(0x0, 0x0) clock_gettime(0x0, 0x0) 03:03:33 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1", 0x3d}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x1a9, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) 03:03:33 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x40000000, &(0x7f0000000040)) 03:03:33 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x12, 0x0, &(0x7f0000000480)) 03:03:33 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, 0x0, 0x0) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0xa, 0x13012, r0, 0x0) 03:03:33 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000003840), 0x0, 0x0) mknodat(r0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) 03:03:33 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce868250", 0x41}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x1a9, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) 03:03:33 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x0, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0xa, 0x13012, r0, 0x0) 03:03:33 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r3, 0x0, 0x1420000a77, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="390000001100090468fe07000000000007", 0x11}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffa) 03:03:33 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x431c0000, &(0x7f0000000040)) 03:03:33 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce868250", 0x41}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x1a9, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) 03:03:33 executing program 5: syz_genetlink_get_family_id$smc(&(0x7f00000000c0), 0xffffffffffffffff) syz_btf_id_by_name$bpf_lsm(0x0) 03:03:33 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000002c0)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00', @private1}}) 03:03:33 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x0, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0xa, 0x13012, r0, 0x0) 03:03:34 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x0, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0xa, 0x13012, r0, 0x0) 03:03:34 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r3, 0x0, 0x1420000a77, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="390000001100090468fe07000000000007", 0x11}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffa) 03:03:34 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x441c0000, &(0x7f0000000040)) 03:03:34 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce868250", 0x41}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x1a9, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) 03:03:34 executing program 4: syz_mount_image$msdos(&(0x7f0000002080), &(0x7f00000020c0)='./file0\x00', 0x0, 0x0, &(0x7f0000003200), 0x0, &(0x7f0000003280)={[{@fat=@codepage={'codepage', 0x3d, '1251'}}]}) 03:03:34 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x0, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0xa, 0x13012, r0, 0x0) 03:03:34 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fce", 0x43}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x1a9, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) 03:03:34 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_SET_MACPARAMS(r0, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={&(0x7f0000000840)={0xfffffdef}, 0x14}}, 0x0) 03:03:34 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x0, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0xa, 0x13012, r0, 0x0) 03:03:34 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x6, 0x0, &(0x7f0000000480)) [ 1108.814959][T21816] FAT-fs (loop4): bogus number of reserved sectors [ 1108.821519][T21816] FAT-fs (loop4): Can't find a valid FAT filesystem 03:03:34 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fce", 0x43}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x1a9, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) 03:03:34 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000003840), 0x0, 0x0) mknodat$loop(r0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) 03:03:34 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x0, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0xa, 0x13012, r0, 0x0) 03:03:34 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r3, 0x0, 0x1420000a77, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="390000001100090468fe07000000000007", 0x11}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffa) 03:03:34 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x451c0000, &(0x7f0000000040)) 03:03:34 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fce", 0x43}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x1a9, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) 03:03:34 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x0, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0xa, 0x13012, r0, 0x0) 03:03:34 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd", 0x44}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x1a9, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) 03:03:34 executing program 4: r0 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r0, &(0x7f0000001200)={0x0, 0x0, 0x0}, 0x0) 03:03:34 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000004580), 0x0, 0x0) fstat(r0, &(0x7f0000006600)) 03:03:34 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x48000000, &(0x7f0000000040)) [ 1108.944553][T21816] FAT-fs (loop4): bogus number of reserved sectors [ 1108.951217][T21816] FAT-fs (loop4): Can't find a valid FAT filesystem 03:03:34 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x0, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0xa, 0x13012, r0, 0x0) 03:03:34 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd", 0x44}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x1a9, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) 03:03:34 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000003840), 0x0, 0x0) read$char_raw(r0, 0x0, 0x0) 03:03:34 executing program 4: getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) 03:03:34 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r3, 0x0, 0x1420000a77, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="390000001100090468fe07000000000007", 0x11}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffa) 03:03:34 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd", 0x44}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x1a9, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) 03:03:34 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x4c000000, &(0x7f0000000040)) 03:03:34 executing program 4: openat$zero(0xffffffffffffff9c, &(0x7f0000000600), 0x80000, 0x0) 03:03:34 executing program 5: lsetxattr$trusted_overlay_upper(&(0x7f0000002100)='./file0\x00', &(0x7f0000002140), 0x0, 0x0, 0x0) 03:03:34 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x0, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0xa, 0x13012, r0, 0x0) 03:03:34 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x1, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x1a9, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) 03:03:34 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='cpuacct.usage_user\x00', 0x0, 0x0) 03:03:34 executing program 4: openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) 03:03:34 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x60000000, &(0x7f0000000040)) 03:03:34 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x1, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x1a9, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) 03:03:34 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0xa, 0x13012, r0, 0x0) 03:03:34 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r3, 0x0, 0x1420000a77, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="390000001100090468fe07000000000007", 0x11}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffa) 03:03:34 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x68000000, &(0x7f0000000040)) 03:03:34 executing program 5: openat$zero(0xffffffffffffff9c, &(0x7f0000003840), 0x800, 0x0) 03:03:34 executing program 4: pselect6(0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000280), 0x0) 03:03:34 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x1, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x1a9, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) 03:03:34 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0xa, 0x13012, r0, 0x0) 03:03:34 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x6c000000, &(0x7f0000000040)) 03:03:34 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000003840), 0x0, 0x0) getdents64(r0, 0x0, 0x0) 03:03:34 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg$inet(r0, 0x0, 0x0, 0x4044000) 03:03:34 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x1a9, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) 03:03:34 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0xa, 0x13012, r0, 0x0) 03:03:34 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r3, 0x0, 0x1420000a77, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="390000001100090468fe07000000000007", 0x11}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffa) 03:03:34 executing program 5: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x80001, 0x0) 03:03:34 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x74000000, &(0x7f0000000040)) 03:03:34 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) fstat(r0, &(0x7f0000002880)) 03:03:34 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x1a9, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) 03:03:34 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x13012, r0, 0x0) 03:03:34 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000003840), 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, 0xffffffffffffffff, 0x0) 03:03:34 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, 0x0) 03:03:34 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x7a000000, &(0x7f0000000040)) 03:03:34 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, 0x0, 0x0, 0xd9f, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r3, 0x0, 0x1420000a77, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="390000001100090468fe07000000000007", 0x11}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffa) 03:03:34 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x1a9, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) 03:03:34 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000540)='./file0\x00', 0x0, 0xb) 03:03:34 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x13012, r0, 0x0) 03:03:34 executing program 4: openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x109000, 0x0) 03:03:34 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) 03:03:35 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x8cffffff, &(0x7f0000000040)) 03:03:35 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x13012, r0, 0x0) 03:03:35 executing program 4: pselect6(0x0, 0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280), &(0x7f0000000300)={0x0}) 03:03:35 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname(r0, 0x0, &(0x7f0000000340)) 03:03:35 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, 0x0, 0x0, 0xd9f, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r3, 0x0, 0x1420000a77, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="390000001100090468fe07000000000007", 0x11}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffa) 03:03:35 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) 03:03:35 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0xc0ed0000, &(0x7f0000000040)) 03:03:35 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0xa, 0x10, r0, 0x0) 03:03:35 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) 03:03:35 executing program 5: setxattr$incfs_metadata(&(0x7f0000006440)='./file0\x00', &(0x7f0000006480), 0x0, 0x0, 0x0) 03:03:35 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000003840), 0x0, 0x0) futimesat(r0, 0x0, &(0x7f0000000040)={{0x0, 0xea60}}) 03:03:35 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0xdaffffff, &(0x7f0000000040)) 03:03:35 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0xa, 0x10, r0, 0x0) 03:03:35 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000003840), 0x0, 0x0) mknodat$null(r0, &(0x7f0000000080)='./file0/file0\x00', 0x0, 0x103) 03:03:35 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, 0x0, 0x0, 0xd9f, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r3, 0x0, 0x1420000a77, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="390000001100090468fe07000000000007", 0x11}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffa) 03:03:35 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) 03:03:35 executing program 4: pselect6(0x0, 0x0, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280), &(0x7f0000000300)={0x0}) 03:03:35 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0xa, 0x10, r0, 0x0) 03:03:35 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0xf4ffffff, &(0x7f0000000040)) 03:03:35 executing program 5: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) unlinkat(r0, &(0x7f00000025c0)='./file0\x00', 0x0) 03:03:35 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) 03:03:35 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0xf5ffffff, &(0x7f0000000040)) 03:03:35 executing program 4: mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, 0x0) 03:03:35 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0xa, 0x13012, 0xffffffffffffffff, 0x0) 03:03:35 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) 03:03:35 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r3, 0x0, 0x1420000a77, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="390000001100090468fe07000000000007", 0x11}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffa) 03:03:35 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000003840), 0x0, 0x0) ioctl$CHAR_RAW_FLSBUF(r0, 0x1261, 0x0) 03:03:35 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000003840), 0x0, 0x0) readlinkat(r0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=""/24, 0x18) 03:03:35 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0xa, 0x13012, 0xffffffffffffffff, 0x0) 03:03:35 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0xf6ffffff, &(0x7f0000000040)) 03:03:35 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) getsockname(r0, 0x0, &(0x7f0000000080)) 03:03:35 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x1a9, 0x0}) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) 03:03:35 executing program 4: pipe(&(0x7f0000000440)) 03:03:35 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0xa, 0x13012, 0xffffffffffffffff, 0x0) 03:03:35 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0xf9fdffff, &(0x7f0000000040)) 03:03:35 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x1a9, 0x0}) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) 03:03:35 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r3, 0x0, 0x1420000a77, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="390000001100090468fe07000000000007", 0x11}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffa) 03:03:35 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$CHAR_RAW_PG(r0, 0x1269, 0x0) 03:03:35 executing program 2: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_udp_int(r0, 0x11, 0x0, 0x0, 0x0) 03:03:35 executing program 4: timer_create(0x7, 0x0, &(0x7f0000000180)) 03:03:35 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0xfbffffff, &(0x7f0000000040)) 03:03:35 executing program 2: openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000002cc0)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) 03:03:35 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x1a9, 0x0}) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) 03:03:35 executing program 5: waitid(0x0, 0x0, 0x0, 0x1000002, 0x0) 03:03:35 executing program 4: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x220800, 0x0) 03:03:35 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000003840), 0x0, 0x0) ioctl$CHAR_RAW_IOOPT(r0, 0x1279, 0x0) 03:03:35 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r3, 0x0, 0x1420000a77, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="390000001100090468fe07000000000007", 0x11}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffa) 03:03:35 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0xfc070400, &(0x7f0000000040)) 03:03:35 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x1a9, 0x0}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) 03:03:35 executing program 5: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/netfilter\x00') 03:03:35 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000004580), 0x0, 0x0) fstat(r0, 0x0) 03:03:35 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000003a00)=@abs, 0x6e) 03:03:35 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0xfdfdffff, &(0x7f0000000040)) 03:03:35 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x1a9, 0x0}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) 03:03:35 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000003840), 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, 0x0) 03:03:35 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x1420000a77, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="390000001100090468fe07000000000007", 0x11}], 0x1) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xfffa) 03:03:35 executing program 4: mknodat$null(0xffffffffffffffff, &(0x7f0000000080)='./file0/file0\x00', 0x0, 0x103) 03:03:35 executing program 2: openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000004280), 0x1, 0x0) 03:03:35 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x1420000a77, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="390000001100090468fe07000000000007", 0x11}], 0x1) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xfffa) 03:03:35 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0xfeffffff, &(0x7f0000000040)) 03:03:35 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000003840), 0x0, 0x0) symlinkat(&(0x7f0000003800)='./file0\x00', r0, &(0x7f0000003880)='./file0\x00') 03:03:35 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x1a9, 0x0}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) 03:03:35 executing program 2: pselect6(0x40, &(0x7f00000001c0), &(0x7f0000000200)={0x49}, 0x0, 0x0, 0x0) 03:03:35 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000003840), 0x0, 0x0) ioctl$CHAR_RAW_DISCARD(r0, 0x1277, 0x0) 03:03:35 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x1420000a77, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="390000001100090468fe07000000000007", 0x11}], 0x1) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xfffa) 03:03:35 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x1a9, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) 03:03:35 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000002b40)={0xffffffffffffffff}) ioctl$sock_SIOCADDRT(r0, 0x890b, 0x0) 03:03:35 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000003840), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, 0x0) 03:03:35 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0xff010100, &(0x7f0000000040)) 03:03:36 executing program 5: select(0x40, &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000180)) 03:03:36 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x1420000a77, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="390000001100090468fe07000000000007", 0x11}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffa) 03:03:36 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x1a9, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) 03:03:36 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000003840), 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, 0x0) 03:03:36 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f000000a2c0)) 03:03:36 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0xff0f0000, &(0x7f0000000040)) 03:03:36 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x1a9, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) 03:03:36 executing program 4: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e) 03:03:36 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x1420000a77, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="390000001100090468fe07000000000007", 0x11}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffa) 03:03:36 executing program 2: lstat(&(0x7f0000003200)='./file0\x00', 0x0) 03:03:36 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x1420000a77, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="390000001100090468fe07000000000007", 0x11}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffa) 03:03:36 executing program 4: chmod(&(0x7f00000037c0)='./file0\x00', 0x0) 03:03:36 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0xfff7ffff, &(0x7f0000000040)) 03:03:36 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000003840), 0x0, 0x0) sendmmsg$unix(r0, 0x0, 0x0, 0x0) 03:03:36 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x1a9, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) 03:03:36 executing program 2: openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000004bc0), 0x2, 0x0) 03:03:36 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r3, 0x0, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="390000001100090468fe07000000000007", 0x11}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffa) 03:03:36 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000003840), 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) renameat2(r0, &(0x7f0000000000)='./file0\x00', r1, &(0x7f0000000080)='./file0\x00', 0x0) 03:03:36 executing program 4: getxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140)=@random={'system.', '!-]\x00'}, 0x0, 0x0) 03:03:36 executing program 5: pselect6(0x40, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000280), &(0x7f0000000300)={0x0}) 03:03:36 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0xfffbffff, &(0x7f0000000040)) 03:03:36 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x1a9, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) 03:03:36 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r3, 0x0, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="390000001100090468fe07000000000007", 0x11}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffa) 03:03:36 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000003840), 0x0, 0x0) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) 03:03:36 executing program 5: r0 = getpid() syz_open_procfs$userns(r0, 0x0) 03:03:36 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000003840), 0x0, 0x0) futimesat(r0, 0x0, 0x0) 03:03:36 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x1a9, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) 03:03:36 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0xffff0300, &(0x7f0000000040)) 03:03:36 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r3, 0x0, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="390000001100090468fe07000000000007", 0x11}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffa) 03:03:36 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000003840), 0x0, 0x0) futimesat(r0, &(0x7f0000000000)='./file0\x00', 0x0) 03:03:36 executing program 4: mknodat(0xffffffffffffffff, &(0x7f00000037c0)='./file0\x00', 0x0, 0x0) 03:03:36 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$unix(r0, 0x0, 0x0, 0x0) 03:03:36 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x1a9, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) 03:03:36 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r3, 0x0, 0x1420000a77, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffa) 03:03:36 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0xffffe000, &(0x7f0000000040)) 03:03:36 executing program 4: mount$9p_unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 03:03:36 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x1a9, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) 03:03:36 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x40000023, 0x0) 03:03:36 executing program 2: openat$cgroup_devices(0xffffffffffffffff, &(0x7f00000021c0)='devices.allow\x00', 0x2, 0x0) 03:03:36 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f000000a2c0)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r0, 0x0, &(0x7f000000a380)) 03:03:36 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0xfffff7ff, &(0x7f0000000040)) 03:03:36 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r3, 0x0, 0x1420000a77, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffa) 03:03:36 executing program 5: mknodat$null(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x103) 03:03:36 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x1a9, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) 03:03:36 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/udp6\x00') openat$cgroup_type(r0, &(0x7f0000000180), 0x2, 0x0) 03:03:36 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000003840), 0x0, 0x0) openat$cgroup_freezer_state(r0, &(0x7f0000000000), 0x2, 0x0) 03:03:36 executing program 5: openat$pidfd(0xffffffffffffff9c, &(0x7f0000004b80), 0x0, 0x0) 03:03:36 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0xfffffbff, &(0x7f0000000040)) 03:03:36 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x1a9, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) 03:03:36 executing program 2: readlinkat(0xffffffffffffffff, &(0x7f0000003740)='./file0\x00', &(0x7f0000003780)=""/22, 0x16) 03:03:36 executing program 5: clock_gettime(0x0, &(0x7f0000002680)) 03:03:36 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r3, 0x0, 0x1420000a77, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffa) 03:03:36 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000003840), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, 0xffffffffffffffff) 03:03:36 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0xfffffdf9, &(0x7f0000000040)) 03:03:36 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x1a9, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) 03:03:36 executing program 5: unlinkat(0xffffffffffffffff, &(0x7f00000025c0)='./file0\x00', 0x0) 03:03:36 executing program 2: chown(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) chown(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) chown(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 03:03:36 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) getsockname(r0, 0x0, &(0x7f00000000c0)) 03:03:36 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0xfffffdfd, &(0x7f0000000040)) 03:03:36 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x1a9, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) 03:03:36 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r3, 0x0, 0x1420000a77, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040), 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffa) 03:03:36 executing program 5: pipe(&(0x7f0000003200)={0xffffffffffffffff}) recvfrom$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 03:03:36 executing program 2: openat$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0)='pids.max\x00', 0x2, 0x0) 03:03:36 executing program 4: pipe2(0x0, 0x8800) 03:03:37 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0xffffff7f, &(0x7f0000000040)) 03:03:37 executing program 2: pselect6(0x40, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000280), 0x0) 03:03:37 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x1a9, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, 0x0) r1 = gettid() tkill(r1, 0x22) 03:03:37 executing program 5: sendmsg$unix(0xffffffffffffffff, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001340)}, 0x0) 03:03:37 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r3, 0x0, 0x1420000a77, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040), 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffa) 03:03:37 executing program 4: r0 = shmget(0x1, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$IPC_SET(r0, 0x1, &(0x7f0000000340)={{}, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) 03:03:37 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0xffffff8c, &(0x7f0000000040)) 03:03:37 executing program 2: select(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f00000004c0)=[{&(0x7f0000000280)=""/112, 0x70}], 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r1, &(0x7f0000000680)=[{&(0x7f0000000080)=""/209, 0xd1}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5) r2 = dup(r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0xccf3, 0x0, 0x0, 0x800e007ce) shutdown(r2, 0x0) shutdown(r3, 0x0) 03:03:37 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x1a9, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, 0x0) r1 = gettid() tkill(r1, 0x22) 03:03:37 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0xffffffda, &(0x7f0000000040)) 03:03:37 executing program 5: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0x40, &(0x7f00000000c0)='cdg\x00', 0x4) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) dup2(r1, r0) 03:03:37 executing program 4: r0 = socket(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000000240)={0x10, 0x2}, 0x10) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000480)=@in6={0x1c, 0x1c, 0x2}, 0x1c) 03:03:37 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x1a9, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, 0x0) r1 = gettid() tkill(r1, 0x22) 03:03:37 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r3, 0x0, 0x1420000a77, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040), 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffa) 03:03:37 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/115, 0x73}], 0x1}, 0x0) r1 = socket(0x1c, 0x5, 0x0) recvfrom$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r2, &(0x7f0000001600)={0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000140)=""/77, 0x4d}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0x1e51de7a2ef3af5, 0x0, 0x0, 0x800e00746) shutdown(r2, 0x0) read(r4, &(0x7f0000000300)=""/164, 0xa4) shutdown(r3, 0x0) 03:03:37 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0xfffffff4, &(0x7f0000000040)) 03:03:37 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x1a9, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) gettid() tkill(0x0, 0x22) 03:03:37 executing program 5: shmat(0xffffffffffffffff, &(0x7f0000fff000/0x1000)=nil, 0x0) fork() 03:03:37 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0xfffffff5, &(0x7f0000000040)) 03:03:38 executing program 2: r0 = semget(0x3, 0x0, 0x0) semop(r0, &(0x7f0000000000)=[{0x2, 0x7fff, 0x1800}, {0x2, 0x9eb}], 0x2) 03:03:38 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0xfffffff6, &(0x7f0000000040)) 03:03:38 executing program 5: fchownat(0xffffffffffffffff, &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0) 03:03:38 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r3, 0x0, 0x1420000a77, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{0x0}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffa) 03:03:38 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0xfffffffb, &(0x7f0000000040)) 03:03:38 executing program 2: r0 = semget(0x3, 0x0, 0x0) semop(r0, &(0x7f0000000000)=[{0x0, 0x7fff}, {}], 0x2) 03:03:38 executing program 5: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0x40, &(0x7f0000000000)='htcp\x00', 0x5) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0x40, &(0x7f0000000040)='dctcp\x00', 0x6) 03:03:38 executing program 4: r0 = socket$unix(0x1, 0x2, 0x0) fcntl$setown(r0, 0x6, 0x0) 03:03:38 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r3, 0x0, 0x1420000a77, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{0x0}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffa) 03:03:40 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x1a9, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) gettid() tkill(0x0, 0x22) 03:03:40 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0xfffffffe, &(0x7f0000000040)) 03:03:40 executing program 2: read(0xffffffffffffff9c, 0x0, 0x0) accept(0xffffffffffffffff, &(0x7f0000000000)=@un=@abs, &(0x7f0000000040)=0x8) r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000000180)=@file={0xa}, 0xa) 03:03:40 executing program 5: r0 = semget(0x3, 0x0, 0x0) semop(r0, 0x0, 0x0) 03:03:40 executing program 4: r0 = socket(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x10, 0x2}, 0x10) connect$inet(r0, &(0x7f00000000c0)={0x10, 0x2}, 0x10) 03:03:40 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r3, 0x0, 0x1420000a77, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{0x0}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffa) 03:03:40 executing program 5: select(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f00000004c0)=[{&(0x7f0000000280)=""/112, 0x70}], 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r1, &(0x7f0000000680)=[{&(0x7f0000000080)=""/209, 0xd1}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5) r2 = dup(r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0xccf3, 0x0, 0x0, 0x800e007ce) shutdown(r2, 0x0) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) writev(r4, &(0x7f0000000040)=[{&(0x7f0000001c00)="b426652889b178ebce91f988753e32ee65525659197452117a5d2e962fc3608386fdb450862af17c3dcaf2915a4dd93bd6511cbc9c8eaba240e3552a13f588442d8d86f43f6698bab04a9dd0503a28ee335547ff56d057ee9bd5377565bf8d35f5dff40081979e93c4cbbe6a0c73313e0797c044a695f619908341e1988996ddd4c642f8320484605a4a2a081a9b907cc1d63fc29d83b86a44395d7a35288ca69487fc6b50518510c94174ef5838474a0d8747a8b8f4adfcecb58315a07b4cf827011a8fe65afa7a30a2527acde3cfee5907eb37cb922de747cf6acf7a5f375e5807d1145b6a7c", 0xfec0}], 0x3) shutdown(r3, 0x0) 03:03:40 executing program 4: r0 = socket$unix(0x1, 0x2, 0x0) pwritev(r0, &(0x7f0000000300)=[{0x0}, {0x0}], 0x2, 0x0, 0x0) 03:03:40 executing program 2: accept4$inet6(0xffffffffffffff9c, &(0x7f0000000500), &(0x7f0000000540)=0x1c, 0x0) 03:03:40 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x8000000000, &(0x7f0000000040)) 03:03:40 executing program 4: sendmsg$unix(0xffffffffffffffff, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001340)=[@cred, @rights, @cred], 0xe8}, 0x0) 03:03:40 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x80000000000, &(0x7f0000000040)) 03:03:43 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x1a9, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) gettid() tkill(0x0, 0x22) 03:03:43 executing program 2: pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0x0) getsockname(r0, 0x0, &(0x7f00000006c0)) 03:03:43 executing program 4: poll(0x0, 0x0, 0x1297) select(0x0, 0x0, 0x0, 0x0, 0x0) select(0x40, &(0x7f0000000100), 0x0, &(0x7f0000000280)={0xa6c}, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) accept$unix(0xffffffffffffff9c, 0x0, 0x0) ppoll(&(0x7f0000000140)=[{0xffffffffffffffff, 0x100}, {r0, 0x40}, {}], 0x3, &(0x7f0000000180)={0x3f}, 0x0, 0x0) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xffc2, 0x0, 0x0, 0x800e00778) shutdown(r1, 0x0) ppoll(&(0x7f0000000240)=[{}], 0x1, 0x0, 0x0, 0x0) shutdown(r2, 0x0) 03:03:43 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0xedc000000000, &(0x7f0000000040)) 03:03:43 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280), 0x400, 0x0) 03:03:43 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r3, 0x0, 0x1420000a77, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffa) 03:03:43 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x1000000000000, &(0x7f0000000040)) 03:03:43 executing program 5: r0 = socket(0x2, 0x1, 0x0) r1 = socket(0x2, 0x1, 0x0) dup2(r0, r1) 03:03:43 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) fcntl$setstatus(r0, 0x4, 0x0) 03:03:43 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x1a9, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x0) 03:03:43 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x2000000000000, &(0x7f0000000040)) 03:03:43 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r3, 0x0, 0x1420000a77, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffa) 03:03:43 executing program 2: msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000540)={{}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) 03:03:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000040)=[{&(0x7f0000000080)=""/16, 0x10}], 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xccf3, 0x0, 0x0, 0x800e0050e) shutdown(0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001b40)=[{&(0x7f0000000180)=""/84, 0x54}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0x2a80, 0x0, 0x0, 0x800e00538) shutdown(r2, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom(r4, &(0x7f0000000500)=""/236, 0xec, 0x0, 0x0, 0x0) shutdown(r3, 0x0) 03:03:44 executing program 4: accept4$inet6(0xffffffffffffff9c, &(0x7f0000000500), 0x0, 0x0) 03:03:44 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x2010000000000, &(0x7f0000000040)) 03:03:44 executing program 2: r0 = socket(0x1c, 0x10000001, 0x84) sendto(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@in6={0x1c, 0x1c, 0x1}, 0x1c) sendto(r0, 0x0, 0x0, 0x100, &(0x7f0000000000)=@in6={0x1c, 0x1c, 0x1}, 0x1c) 03:03:44 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r3, 0x0, 0x1420000a77, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffa) 03:03:44 executing program 2: chown(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 03:03:44 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x4000000000000, &(0x7f0000000040)) 03:03:44 executing program 4: r0 = socket(0x1c, 0x10000001, 0x84) sendto(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@in6={0x1c, 0x1c, 0x1}, 0x1c) getsockname$unix(r0, 0x0, &(0x7f0000000200)) 03:03:46 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x1a9, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x0) 03:03:46 executing program 2: sendmsg$unix(0xffffffffffffffff, &(0x7f0000001500)={&(0x7f00000000c0)=@file={0xa}, 0xa, 0x0, 0x0, &(0x7f0000001340)=[@cred, @rights, @cred], 0xe8}, 0x0) 03:03:46 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x4020000000000, &(0x7f0000000040)) 03:03:46 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r3, 0x0, 0x1420000a77, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="390000001100090468", 0x9}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffa) 03:03:46 executing program 4: poll(0x0, 0x0, 0x1297) select(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ppoll(&(0x7f0000000140)=[{r0, 0x40}], 0x1, &(0x7f0000000180)={0x3f}, 0x0, 0x0) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xffc2, 0x0, 0x0, 0x800e00778) shutdown(r1, 0x0) ppoll(&(0x7f0000000240)=[{}], 0x1, 0x0, 0x0, 0x0) shutdown(r2, 0x0) 03:03:46 executing program 5: r0 = socket(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f00000000c0)={0x34}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r1, &(0x7f0000000200)=[{&(0x7f0000000100)=""/172, 0xac}], 0x1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r2, &(0x7f00000005c0)=[{&(0x7f0000000240)=""/220, 0xdc}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0xccf3, 0x0, 0x0, 0x800e005b5) shutdown(r2, 0x0) r4 = socket(0x2, 0x1, 0x0) connect$inet(r4, &(0x7f00000000c0)={0x34}, 0x10) shutdown(r3, 0x0) 03:03:46 executing program 2: r0 = socket(0x1c, 0x10000001, 0x84) bind(r0, &(0x7f0000000040)=@in6={0x1c, 0x1c, 0x2}, 0x1c) 03:03:46 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x7ffffffffffff, &(0x7f0000000040)) 03:03:46 executing program 2: r0 = socket(0x1c, 0x10000001, 0x84) sendto(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@in6={0x1c, 0x1c, 0x1}, 0x1c) getsockname(r0, 0x0, &(0x7f0000000040)) 03:03:46 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x8000000000000, &(0x7f0000000040)) 03:03:46 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r3, 0x0, 0x1420000a77, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="390000001100090468", 0x9}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffa) 03:03:46 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x8040000000000, &(0x7f0000000040)) [ 1121.171808][T22660] netlink: 25 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1121.261841][T22685] netlink: 25 bytes leftover after parsing attributes in process `syz-executor.0'. 03:03:49 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x1a9, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x0) 03:03:49 executing program 2: poll(0x0, 0x0, 0x1297) select(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ppoll(&(0x7f0000000140)=[{r0, 0x40}], 0x1, &(0x7f0000000180)={0x3f}, &(0x7f00000001c0), 0x8) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xffc2, 0x0, 0x0, 0x800e00778) shutdown(r1, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) shutdown(r2, 0x0) 03:03:49 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0xc000000000000, &(0x7f0000000040)) 03:03:49 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r3, 0x0, 0x1420000a77, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="390000001100090468", 0x9}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffa) 03:03:49 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000003c0)=""/129, 0x81}], 0x1}, 0x0) r1 = socket(0x1c, 0x5, 0x0) recvfrom$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r2, &(0x7f0000001700)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000240)=""/65, 0x41}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x6}, 0x40002) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0x1e51de7a2ef3af5, 0x0, 0x0, 0x800e00746) shutdown(r2, 0x0) recvmsg(r1, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) shutdown(r3, 0x0) 03:03:49 executing program 4: r0 = socket(0x2, 0x5, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r1, &(0x7f0000000300)="a9", 0x1, 0x0, &(0x7f0000000000)={0x10, 0x2}, 0x10) dup2(r0, r1) 03:03:49 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x81000000000000, &(0x7f0000000040)) 03:03:49 executing program 4: r0 = semget(0x3, 0x0, 0x0) semop(r0, &(0x7f0000000000)=[{0x2, 0x7fff}, {0x2}], 0x2) 03:03:49 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0xe0ffff00000000, &(0x7f0000000040)) 03:03:49 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r3, 0x0, 0x1420000a77, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="390000001100090468fe070000", 0xd}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffa) 03:03:49 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x100000000000000, &(0x7f0000000040)) 03:03:49 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x102000000000000, &(0x7f0000000040)) [ 1124.215587][T22708] netlink: 25 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1124.309200][T22735] netlink: 25 bytes leftover after parsing attributes in process `syz-executor.0'. 03:03:52 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r3, 0x0, 0x1420000a77, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="390000001100090468fe070000", 0xd}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffa) 03:03:52 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x200000000000000, &(0x7f0000000040)) 03:03:52 executing program 5: symlinkat(&(0x7f0000001180)='./file0\x00', 0xffffffffffffff9c, &(0x7f00000011c0)='./file0\x00') chown(&(0x7f0000001200)='./file0\x00', 0x0, 0x0) 03:03:52 executing program 4: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) copy_file_range(r0, &(0x7f0000000080), 0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) 03:03:52 executing program 2: r0 = fork() wait4(r0, 0x0, 0x80000000, &(0x7f0000000040)) 03:03:52 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000100)=""/224, 0xe0}], 0x1) 03:03:52 executing program 5: r0 = semget(0x3, 0x0, 0x0) semop(r0, &(0x7f0000000000)=[{0x2, 0x7fff, 0x1800}, {0x0, 0x9eb}], 0x2) 03:03:52 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x204000000000000, &(0x7f0000000040)) 03:03:52 executing program 4: r0 = semget(0x3, 0x0, 0x0) semop(r0, &(0x7f0000000000)=[{}], 0x1) 03:03:52 executing program 3: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0x40, &(0x7f0000000080)='cubic\x00', 0x3) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0x40, &(0x7f0000000040)='vegas\x00', 0x6) 03:03:52 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) sendto$unix(r0, 0x0, 0x0, 0x40108, &(0x7f0000000040)=@file={0xa}, 0xa) 03:03:52 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r3, 0x0, 0x1420000a77, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="390000001100090468fe070000", 0xd}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffa) 03:03:52 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000001080)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000000)='./file1\x00', r0, &(0x7f00000000c0)='./file0\x00') symlinkat(&(0x7f0000000040)='./file2\x00', r0, &(0x7f0000000100)='./file2\x00') openat(0xffffffffffffff9c, &(0x7f0000001080)='./file0\x00', 0x200, 0x0) [ 1127.249821][T22762] netlink: 25 bytes leftover after parsing attributes in process `syz-executor.0'. 03:03:52 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x300000000000000, &(0x7f0000000040)) 03:03:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/115, 0x73}], 0x1}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket(0x1c, 0x5, 0x0) recvfrom$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r2, &(0x7f0000001700)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000240)=""/65, 0x41}, {0x0}], 0x2}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0x1e51de7a2ef3af5, 0x0, 0x0, 0x800e00746) shutdown(r2, 0x0) read(r3, &(0x7f0000000140)=""/164, 0xdd) shutdown(r3, 0x0) 03:03:52 executing program 2: r0 = socket(0x1c, 0x10000001, 0x84) sendto(r0, &(0x7f0000000280)='q', 0x1, 0x0, &(0x7f0000000380)=@in6={0x1c, 0x1c, 0x1}, 0x1c) shutdown(r0, 0x1) 03:03:52 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x400000000000000, &(0x7f0000000040)) 03:03:52 executing program 5: r0 = socket(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f00000000c0)='[', 0x1, 0x0, &(0x7f0000000180)={0x10, 0x2}, 0x10) 03:03:52 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0x40, &(0x7f00000001c0)='cubic\x00', 0x4) 03:03:52 executing program 2: chown(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) chown(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 03:03:52 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r3, 0x0, 0x1420000a77, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="390000001100090468fe0700000000", 0xf}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffa) [ 1127.392026][T22798] netlink: 25 bytes leftover after parsing attributes in process `syz-executor.0'. 03:03:52 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x500000000000000, &(0x7f0000000040)) 03:03:52 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000000180)=@file={0xa}, 0xa) 03:03:52 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) 03:03:52 executing program 2: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) 03:03:52 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x502000000000000, &(0x7f0000000040)) [ 1127.519203][T22830] netlink: 25 bytes leftover after parsing attributes in process `syz-executor.0'. 03:03:53 executing program 4: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) fcntl$getflags(r0, 0x3) 03:03:53 executing program 5: poll(0x0, 0x0, 0x1297) select(0x0, 0x0, 0x0, 0x0, 0x0) select(0x40, &(0x7f0000000100), 0x0, &(0x7f0000000280)={0xa6c}, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) accept$unix(0xffffffffffffff9c, 0x0, 0x0) ppoll(&(0x7f0000000140)=[{0xffffffffffffffff, 0x100}, {r0, 0x40}, {r0}], 0x3, &(0x7f0000000180)={0x3f}, &(0x7f00000001c0), 0x8) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xffc2, 0x0, 0x0, 0x800e00778) shutdown(r1, 0x0) ppoll(&(0x7f0000000240)=[{}], 0x1, 0x0, 0x0, 0x0) shutdown(r2, 0x0) 03:03:53 executing program 3: semget(0x3, 0x3, 0x2a0) 03:03:53 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r3, 0x0, 0x1420000a77, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="390000001100090468fe0700000000", 0xf}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffa) 03:03:53 executing program 2: pipe2(&(0x7f0000000580), 0x0) 03:03:53 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x600000000000000, &(0x7f0000000040)) 03:03:53 executing program 3: socket(0x0, 0x0, 0x5) 03:03:53 executing program 2: r0 = socket(0x1c, 0x10000001, 0x84) sendto(r0, &(0x7f0000000000)='>', 0x1, 0x0, &(0x7f00000000c0)=@in6={0x1c, 0x1c, 0x1}, 0x1c) sendto(r0, &(0x7f0000000100)="d6", 0x1, 0x81, 0x0, 0x0) 03:03:53 executing program 4: sendmsg$unix(0xffffffffffffffff, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001340)=[@cred], 0x68}, 0x0) 03:03:53 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x602000000000000, &(0x7f0000000040)) 03:03:53 executing program 3: poll(0x0, 0x0, 0x1297) select(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ppoll(&(0x7f0000000140)=[{r0, 0x40}], 0x1, &(0x7f0000000180)={0x3f}, &(0x7f00000001c0), 0x8) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xffc2, 0x0, 0x0, 0x800e00778) shutdown(r1, 0x0) ppoll(&(0x7f0000000240)=[{}], 0x1, 0x0, 0x0, 0x0) shutdown(r2, 0x0) 03:03:53 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r3, 0x0, 0x1420000a77, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="390000001100090468fe0700000000", 0xf}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffa) 03:03:53 executing program 4: r0 = semget(0x3, 0x0, 0x0) semop(r0, &(0x7f0000000000)=[{}, {}, {0x4}], 0x3) [ 1128.448233][T22861] netlink: 25 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1128.557926][T22894] netlink: 25 bytes leftover after parsing attributes in process `syz-executor.0'. 03:03:54 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x604000000000000, &(0x7f0000000040)) 03:03:54 executing program 5: r0 = semget(0x3, 0x0, 0x0) semop(r0, &(0x7f0000000000)=[{0x0, 0x9eb}], 0x1) 03:03:54 executing program 2: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) 03:03:54 executing program 4: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0x40, &(0x7f0000000080)='cubic\x00', 0x3) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0x40, &(0x7f0000000000)='htcp\x00', 0x5) 03:03:54 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r3, 0x0, 0x1420000a77, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="390000001100090468fe070000000000", 0x10}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffa) 03:03:54 executing program 2: semget(0x3, 0x0, 0x2a0) 03:03:54 executing program 5: r0 = socket(0x2, 0x10000001, 0x84) sendto(r0, &(0x7f0000000280)="e0", 0x1, 0x0, &(0x7f00000000c0)=@in6={0x1c, 0x1c, 0x1}, 0x1c) 03:03:54 executing program 4: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0x40, &(0x7f0000000080)='cubic\x00', 0x3) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0x40, &(0x7f0000000100)='cubic\x00', 0x4) 03:03:54 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x700000000000000, &(0x7f0000000040)) 03:03:54 executing program 5: r0 = socket(0x1c, 0x10000001, 0x84) sendto(r0, &(0x7f0000000000)='>', 0x1, 0x0, &(0x7f00000000c0)=@in6={0x1c, 0x1c, 0x1}, 0x1c) recvmsg(r0, &(0x7f0000001640)={0x0, 0x0, 0x0}, 0x40082) 03:03:54 executing program 3: r0 = semget(0x3, 0x0, 0x0) semop(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x1800}], 0x1) 03:03:54 executing program 2: r0 = socket(0x1c, 0x10000001, 0x84) getsockopt(0xffffffffffffffff, 0x3, 0x0, 0x0, 0x0) sendto(r0, &(0x7f0000000000)='>', 0x1, 0x0, &(0x7f00000000c0)=@in6={0x1c, 0x1c, 0x1}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0x1c, 0x1c}, 0x1c) recvmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 03:03:54 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r3, 0x0, 0x1420000a77, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="390000001100090468fe070000000000", 0x10}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffa) [ 1129.371355][T22917] netlink: 25 bytes leftover after parsing attributes in process `syz-executor.0'. 03:03:54 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x702000000000000, &(0x7f0000000040)) 03:03:54 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/115, 0x73}], 0x1}, 0x0) r1 = socket(0x1c, 0x5, 0x0) recvfrom$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r2, &(0x7f0000001700)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000240)=""/65, 0x41}, {0x0}], 0x2}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0x1e51de7a2ef3af5, 0x0, 0x0, 0x800e00746) shutdown(r2, 0x0) read(r4, &(0x7f0000000300)=""/164, 0xa4) shutdown(r3, 0x0) 03:03:54 executing program 4: r0 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r0, &(0x7f0000000180)={&(0x7f0000000000)=@file={0xa}, 0xa, 0x0}, 0x20001) 03:03:54 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) setsockopt$sock_int(r0, 0xffff, 0x1015, 0x0, 0x0) 03:03:54 executing program 2: r0 = socket(0x2, 0x1, 0x84) connect$inet6(r0, &(0x7f0000000040)={0x1c, 0x1c}, 0x1c) 03:03:54 executing program 4: r0 = socket$unix(0x1, 0x2, 0x0) sendto$unix(r0, &(0x7f0000000280)="0c735b34a793e30b9531817adc11f27ed48b51a005e0049c8d9078880e54d2f657e117c7fb1eef2eac4d7b23b4ee2cea002ad288e0cfe48dfc147b57b6494802ee8825e68c0e78859be4f661b830d6d1cc20cd39d8b4b551523ed140e8", 0x5d, 0x40108, &(0x7f0000000040)=@file={0xa}, 0xa) 03:03:54 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x800000000000000, &(0x7f0000000040)) 03:03:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)=""/115, 0x73}], 0x1}, 0x0) r1 = socket(0x1c, 0x5, 0x0) recvfrom$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r2, &(0x7f0000001700)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/109, 0x6d}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0x1e51de7a2ef3af5, 0x0, 0x0, 0x800e00746) shutdown(r2, 0x0) recvmsg(r3, &(0x7f0000002b40)={0x0, 0x0, &(0x7f0000002a00)=[{&(0x7f0000000400)=""/138, 0x8a}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x7}, 0x0) shutdown(r3, 0x0) 03:03:54 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r3, 0x0, 0x1420000a77, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="390000001100090468fe070000000000", 0x10}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffa) 03:03:54 executing program 4: bind$unix(0xffffffffffffffff, &(0x7f0000002100)=@abs={0x8}, 0x8) [ 1129.525020][T22954] netlink: 25 bytes leftover after parsing attributes in process `syz-executor.0'. 03:03:54 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x900000000000000, &(0x7f0000000040)) 03:03:54 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)=[{0x0}], 0x1}, 0x0) 03:03:54 executing program 4: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0x40, &(0x7f00000000c0)='cdg\x00', 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0x40, &(0x7f0000000100)='cdg\x00', 0x4) [ 1129.659358][T22989] netlink: 25 bytes leftover after parsing attributes in process `syz-executor.0'. 03:03:55 executing program 5: r0 = socket(0x1c, 0x10000001, 0x84) sendto(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@in6={0x1c, 0x1c, 0x1}, 0x1c) bind(r0, &(0x7f0000000040)=@in6={0x1c, 0x1c, 0x2}, 0x1c) 03:03:55 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0xa00000000000000, &(0x7f0000000040)) 03:03:55 executing program 2: r0 = socket(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000000240)={0x10, 0x2}, 0x10) 03:03:55 executing program 3: r0 = socket(0x1c, 0x10000001, 0x84) sendto(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@in={0x10, 0x2}, 0x10) 03:03:55 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="390000001100090468fe07000000000007", 0x11}], 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffa) 03:03:55 executing program 4: r0 = socket(0x1c, 0x10000001, 0x84) sendto(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@in6={0x1c, 0x1c, 0x1}, 0x1c) recvmsg(r0, &(0x7f0000000040)={0x0, 0x4c, 0x0}, 0x0) recvmsg(r0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x80) 03:03:55 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/115, 0x73}], 0x1}, 0x0) r1 = socket(0x1c, 0x5, 0x0) recvfrom$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r2, &(0x7f0000001700)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000240)=""/65, 0x41}], 0x1}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0x1e51de7a2ef3af5, 0x0, 0x0, 0x800e00746) shutdown(r2, 0x0) read(r4, &(0x7f0000000300)=""/164, 0xa4) shutdown(r3, 0x0) 03:03:55 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x10, 0x0, 0x27) 03:03:55 executing program 4: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0x40, &(0x7f0000000080)='htcp\x00', 0x5) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0x40, &(0x7f0000000000)='cubic\x00', 0x3) 03:03:55 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x4, 0x0, &(0x7f0000000480)) 03:03:55 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0xb00000000000000, &(0x7f0000000040)) 03:03:55 executing program 5: r0 = socket(0x23, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000040)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x3c, r2, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_CENTER_FREQ1={0x8}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}], @chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8}], @NL80211_ATTR_DURATION={0x8, 0x57, 0x101}]}, 0x3c}}, 0x0) 03:03:55 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0xc00000000000000, &(0x7f0000000040)) 03:03:55 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000180), 0x68042) write$sndseq(r0, 0x0, 0x0) write$sndseq(r0, 0x0, 0x0) 03:03:55 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_COALESCE(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0x8}, @val={0xc, 0x99, {0x0, 0x3f}}}}}, 0x30}}, 0x0) 03:03:55 executing program 5: r0 = socket(0x1c, 0x10000001, 0x84) sendto(r0, &(0x7f0000000000)='>', 0x1, 0x0, &(0x7f00000000c0)=@in6={0x1c, 0x1c, 0x1}, 0x1c) 03:03:56 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) connect(r0, &(0x7f0000002000)=@in={0x10, 0x2}, 0x10) 03:03:56 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0xd00000000000000, &(0x7f0000000040)) 03:03:56 executing program 5: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000980), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc08c5335, &(0x7f0000000340)={0x0, 0x0, 'client1\x00', 0x0, "9f6247ba253a8a93", "cf62dd3e1059f65b3a429fe6edaba9a700000000749544fc4000"}) 03:03:56 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) io_setup(0x4, &(0x7f0000000040)=0x0) io_submit(r1, 0x1, &(0x7f0000000740)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) 03:03:56 executing program 4: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000e80)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000f00)=ANY=[@ANYBLOB="f40100001400c1042adbdf25043f50000100c0c0e66b50f54e"], 0x1f4}}, 0x0) 03:03:56 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="390000001100090468fe07000000000007", 0x11}], 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffa) 03:03:56 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000980), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc04c5349, &(0x7f0000000340)={0x0, 0x0, 'client1\x00', 0x0, "9f6247ba253a8a93", "cf62dd3e1059f65b3a429fe6edaba9a700000000749544fc4000"}) 03:03:56 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0xe00000000000000, &(0x7f0000000040)) 03:03:56 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0xf00000000000000, &(0x7f0000000040)) 03:03:56 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x8931, &(0x7f0000000100)={'ip6_vti0\x00', @ifru_settings={0x0, 0x0, @sync=0x0}}) 03:03:56 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000002980)={0x0, 0x0, &(0x7f0000002940)=[{&(0x7f00000000c0)={0x10, 0x12, 0x1}, 0x10}], 0x1}, 0x0) 03:03:56 executing program 3: r0 = socket(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x89e0, 0x0) 03:03:56 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ifreq(r0, 0x8913, &(0x7f0000000000)={'veth1_to_hsr\x00', @ifru_map}) 03:03:56 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x1000000000000000, &(0x7f0000000040)) 03:03:56 executing program 4: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000980), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc0bc5351, &(0x7f0000000340)={0x7fffffff, 0x0, 'client1\x00', 0x0, "9f6247ba253a8a93", "cf62dd3e1059f65b3a429fe6edaba9a700000000749544fc4000"}) 03:03:56 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x8912, &(0x7f0000000100)={'veth0_to_batadv\x00', @ifru_settings={0x0, 0x0, @sync=0x0}}) 03:03:56 executing program 3: r0 = socket(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x89a0, &(0x7f0000000040)={'wlan1\x00'}) 03:03:57 executing program 2: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000140)={'gre0\x00', &(0x7f0000000100)={'syztnl0\x00', 0x0, 0x0, 0x7c8, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast2, @dev}}}}) 03:03:57 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="390000001100090468fe07000000000007", 0x11}], 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffa) 03:03:57 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x1004000000000000, &(0x7f0000000040)) 03:03:57 executing program 4: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000980), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0x5452, &(0x7f0000000340)={0x7fffffff, 0x0, 'client1\x00', 0x0, "9f6247ba253a8a93", "cf62dd3e1059f65b3a429fe6edaba9a700000000749544fc4000"}) 03:03:57 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000980), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0x4058534c, &(0x7f0000000340)={0x0, 0x0, 'client1\x00', 0x0, "9f6247ba253a8a93", "cf62dd3e1059f65b3a429fe6edaba9a700000000749544fc4000"}) 03:03:57 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) io_setup(0x4, &(0x7f0000000040)=0x0) io_submit(r1, 0x1, &(0x7f0000000740)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) io_getevents(r1, 0x0, 0x1, &(0x7f0000000300)=[{}], 0x0) io_submit(r1, 0x1, &(0x7f00000017c0)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) 03:03:57 executing program 2: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000980), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc0505350, &(0x7f0000000340)={0x7fffffff, 0x0, 'client1\x00', 0x0, "9f6247ba253a8a93", "cf62dd3e1059f65b3a429fe6edaba9a700000000749544fc4000"}) 03:03:57 executing program 4: r0 = socket(0x23, 0x2, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), r0) 03:03:57 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) io_setup(0x4, &(0x7f0000000040)=0x0) io_submit(r1, 0x1, &(0x7f0000000740)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) io_getevents(r1, 0x0, 0x1, &(0x7f0000000300)=[{}], 0x0) 03:03:57 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x1100000000000000, &(0x7f0000000040)) 03:03:57 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x8983, &(0x7f0000000100)={'virt_wifi0\x00', @ifru_settings={0x0, 0x0, @sync=0x0}}) 03:03:57 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) 03:03:57 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x7) sendmsg$inet(r0, &(0x7f00000025c0)={0x0, 0x0, 0x0}, 0x40011) [ 1132.483200][T23183] loop5: detected capacity change from 0 to 4 [ 1132.497379][T23183] EXT4-fs (loop5): Can't read superblock on 2nd try 03:03:58 executing program 2: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000180), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc0bc5351, &(0x7f0000000040)={0xfffff83e, 0x0, 'client0\x00', 0x0, "907d9949e98be867", "4197964ae3c6810df2ad66e382009fd61e7dfd4fe0818ae6994efbd58940b9a6"}) 03:03:58 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x1200000000000000, &(0x7f0000000040)) 03:03:58 executing program 3: r0 = socket(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8943, &(0x7f0000000040)={'wlan1\x00'}) 03:03:58 executing program 4: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)=0x6) 03:03:58 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r3, 0x0, 0x1420000a77, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="390000001100090468fe07000000000007", 0x11}], 0x1) write$binfmt_elf64(r1, 0x0, 0xfffa) 03:03:58 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) 03:03:58 executing program 2: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000980), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc0105303, &(0x7f0000000340)={0x0, 0x0, 'client1\x00', 0x0, "9f6247ba253a8a93", "cf62dd3e1059f65b3a429fe6edaba9a700000000749544fc4000"}) 03:03:58 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x1602000000000000, &(0x7f0000000040)) 03:03:58 executing program 4: r0 = socket(0x23, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000040)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x24, r2, 0x1, 0x0, 0x0, {{0x2}, {@val={0x8, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8}]]}, 0x24}}, 0x0) 03:03:58 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000000040)) 03:03:58 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) 03:03:58 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) io_setup(0x4, &(0x7f0000000040)=0x0) io_submit(r1, 0x1, &(0x7f0000000940)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x8, 0x0, r0, &(0x7f0000000080)="18c0a6ebf1fd", 0x6}]) [ 1133.260085][T23211] loop5: detected capacity change from 0 to 4 [ 1133.283057][T23211] EXT4-fs (loop5): Can't read superblock on 2nd try 03:03:58 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x1702000000000000, &(0x7f0000000040)) 03:03:58 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x8949, &(0x7f0000000040)={'vlan1\x00', @ifru_data=0x0}) 03:03:58 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x2000000000000000, &(0x7f0000000040)) [ 1133.399875][T23242] loop5: detected capacity change from 0 to 4 [ 1133.421758][T23242] EXT4-fs (loop5): Can't read superblock on 2nd try 03:03:59 executing program 2: socketpair(0x1c, 0x0, 0x0, 0x0) 03:03:59 executing program 4: r0 = socket(0x23, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000040)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x24, r2, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random}]]}, 0x24}}, 0x0) 03:03:59 executing program 3: r0 = socket(0x23, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000040)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x34, r2, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x1}], @chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8}], @NL80211_ATTR_DURATION={0x8, 0x57, 0x101}]}, 0x34}}, 0x0) 03:03:59 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) 03:03:59 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r3, 0x0, 0x1420000a77, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="390000001100090468fe07000000000007", 0x11}], 0x1) write$binfmt_elf64(r1, 0x0, 0xfffa) 03:03:59 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x2010000000000000, &(0x7f0000000040)) 03:03:59 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000003280)={'ip_vti0\x00', &(0x7f0000003240)={'gre0\x00', 0x0, 0x0, 0x7800, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}) 03:03:59 executing program 4: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_DEL_SEC_KEY(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)={0x110, r0, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_SEC_KEY={0x31, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0xc}]}, @NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_SEC_KEY={0xd8, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0x9c, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_IMPLICIT={0x44, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_EXTENDED={0xc}, @NL802154_DEV_ADDR_ATTR_MODE={0x8}, @NL802154_DEV_ADDR_ATTR_MODE, @NL802154_DEV_ADDR_ATTR_PAN_ID={0x6}, @NL802154_DEV_ADDR_ATTR_MODE={0x8}, @NL802154_DEV_ADDR_ATTR_PAN_ID={0x6}, @NL802154_DEV_ADDR_ATTR_SHORT={0x6}]}, @NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8}, @NL802154_KEY_ID_ATTR_MODE={0x8}, @NL802154_KEY_ID_ATTR_IMPLICIT={0x1c, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_SHORT={0x6}, @NL802154_DEV_ADDR_ATTR_SHORT={0x6}, @NL802154_DEV_ADDR_ATTR_SHORT={0x6}]}, @NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc}, @NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8}, @NL802154_KEY_ID_ATTR_IMPLICIT={0x4}]}, @NL802154_KEY_ATTR_ID={0x28, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}, @NL802154_KEY_ID_ATTR_MODE={0x8}, @NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc}, @NL802154_KEY_ID_ATTR_MODE={0x8}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}]}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x110}}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 03:03:59 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x2200000000000000, &(0x7f0000000040)) [ 1134.145677][T23268] loop5: detected capacity change from 0 to 4 [ 1134.160710][T23268] EXT4-fs (loop5): Can't read superblock on 2nd try 03:03:59 executing program 3: r0 = socket(0x23, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000040)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x2c, r2, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8}], @NL80211_ATTR_DURATION={0x8}]}, 0x2c}}, 0x0) 03:03:59 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc) getsockopt$netlink(r0, 0x10e, 0x9, &(0x7f0000000080)=""/232, &(0x7f0000000180)=0xe8) 03:03:59 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) [ 1134.310276][T23308] loop5: detected capacity change from 0 to 4 [ 1134.328405][T23308] EXT4-fs (loop5): Can't read superblock on 2nd try 03:04:00 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r3, 0x0, 0x1420000a77, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="390000001100090468fe07000000000007", 0x11}], 0x1) write$binfmt_elf64(r1, 0x0, 0xfffa) 03:04:00 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x2500000000000000, &(0x7f0000000040)) 03:04:00 executing program 2: socketpair(0x1, 0x5, 0x0, &(0x7f0000000200)) 03:04:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000200)={'tunl0\x00', 0x0}) 03:04:00 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x7) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 03:04:00 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) 03:04:00 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x2e00000000000000, &(0x7f0000000040)) 03:04:00 executing program 4: r0 = socket(0x23, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000040)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x34, r2, 0x1, 0x0, 0x0, {{0x2}, {@val={0x8, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_CHANNEL_WIDTH={0x8}, @NL80211_ATTR_CENTER_FREQ1={0x8}], @chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8}]]}, 0x34}}, 0x0) 03:04:00 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x8912, &(0x7f0000000100)={'ip6_vti0\x00', @ifru_settings={0x0, 0x0, @sync=0x0}}) 03:04:00 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000980), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc0bc5310, &(0x7f0000000340)={0x0, 0x0, 'client1\x00', 0x0, "9f6247ba253a8a93", "cf62dd3e1059f65b3a429fe6edaba9a700000000749544fc4000"}) 03:04:00 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x3f00000000000000, &(0x7f0000000040)) 03:04:00 executing program 4: socketpair(0x1d, 0x0, 0x2, &(0x7f0000000000)) 03:04:00 executing program 2: r0 = socket(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x5411, &(0x7f0000000040)={'wlan1\x00'}) [ 1135.110400][T23335] loop5: detected capacity change from 0 to 4 [ 1135.138132][T23335] EXT4-fs (loop5): Can't read superblock on 2nd try 03:04:01 executing program 4: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000001c40)={'vxcan0\x00'}) r0 = socket$inet6(0xa, 0x6, 0x0) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000000040)) 03:04:01 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x4000000000000000, &(0x7f0000000040)) 03:04:01 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000980), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc0505350, &(0x7f0000000340)={0x0, 0x0, 'client1\x00', 0x0, "9f6247ba253a8a93", "cf62dd3e1059f65b3a429fe6edaba9a700000000749544fc4000"}) 03:04:01 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) 03:04:01 executing program 2: r0 = socket(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8931, &(0x7f0000000040)={'wlan1\x00'}) 03:04:01 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) io_setup(0x4, &(0x7f0000000040)=0x0) io_submit(r1, 0x2, &(0x7f0000000740)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]) 03:04:01 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x431c000000000000, &(0x7f0000000040)) 03:04:01 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x8903, &(0x7f0000000100)={'virt_wifi0\x00', @ifru_settings={0x0, 0x0, @sync=0x0}}) 03:04:01 executing program 2: r0 = socket(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8927, &(0x7f0000000040)={'wlan1\x00'}) [ 1135.995113][T23380] loop5: detected capacity change from 0 to 4 [ 1136.014136][T23380] EXT4-fs (loop5): Can't read superblock on 2nd try 03:04:01 executing program 4: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000080)={{0xec}}) 03:04:01 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) 03:04:01 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x441c000000000000, &(0x7f0000000040)) 03:04:01 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x8931, &(0x7f0000000080)={'bridge_slave_0\x00', @ifru_data=&(0x7f0000000040)="23f909b9e4d581a29b8559a6956fb3550c3793e7feab407467e7c80c4f8a95b6"}) 03:04:01 executing program 3: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_DEL_SEC_KEY(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)={0x110, r0, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_SEC_KEY={0x31, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0xc}]}, @NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_SEC_KEY={0xd8, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0x9c, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5, 0x2, 0x1}, @NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_IMPLICIT={0x44, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_EXTENDED={0xc}, @NL802154_DEV_ADDR_ATTR_MODE={0x8}, @NL802154_DEV_ADDR_ATTR_MODE, @NL802154_DEV_ADDR_ATTR_PAN_ID={0x6}, @NL802154_DEV_ADDR_ATTR_MODE={0x8}, @NL802154_DEV_ADDR_ATTR_PAN_ID={0x6}, @NL802154_DEV_ADDR_ATTR_SHORT={0x6}]}, @NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8}, @NL802154_KEY_ID_ATTR_MODE={0x8}, @NL802154_KEY_ID_ATTR_IMPLICIT={0x1c, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_SHORT={0x6}, @NL802154_DEV_ADDR_ATTR_SHORT={0x6}, @NL802154_DEV_ADDR_ATTR_SHORT={0x6}]}, @NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc, 0x5, 0x7fffffff}, @NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8}, @NL802154_KEY_ID_ATTR_IMPLICIT={0x4}]}, @NL802154_KEY_ATTR_ID={0x28, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}, @NL802154_KEY_ID_ATTR_MODE={0x8}, @NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc}, @NL802154_KEY_ID_ATTR_MODE={0x8}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5, 0x2, 0x60}]}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x110}}, 0x0) 03:04:01 executing program 4: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000980), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0x40505331, &(0x7f0000000340)={0x7fffffff, 0x0, 'client1\x00', 0x0, "9f6247ba253a8a93", "cf62dd3e1059f65b3a429fe6edaba9a700000000749544fc4000"}) 03:04:01 executing program 2: socket(0x26, 0x805, 0x380000) 03:04:01 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x451c000000000000, &(0x7f0000000040)) 03:04:01 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x8981, 0x0) [ 1136.148870][T23415] loop5: detected capacity change from 0 to 4 [ 1136.174218][T23415] EXT4-fs (loop5): Can't read superblock on 2nd try 03:04:01 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) 03:04:01 executing program 2: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_DEL_SEC_KEY(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)={0x40, r0, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x20, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x1c, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x2}]}]}]}, 0x40}}, 0x0) 03:04:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_mreqn(r0, 0x11, 0x66, 0x0, &(0x7f00000000c0)) 03:04:01 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000980), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc08c5332, &(0x7f0000000340)={0x0, 0x0, 'client1\x00', 0x0, "9f6247ba253a8a93", "cf62dd3e1059f65b3a429fe6edaba9a700000000749544fc4000"}) 03:04:01 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000980), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0x408c5333, &(0x7f0000000340)={0x7fffffff, 0x0, 'client1\x00', 0x0, "9f6247ba253a8a93", "cf62dd3e1059f65b3a429fe6edaba9a700000000749544fc4000"}) 03:04:01 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x4800000000000000, &(0x7f0000000040)) [ 1136.301248][T23447] loop5: detected capacity change from 0 to 4 03:04:01 executing program 4: openat$null(0xffffffffffffff9c, &(0x7f0000001900), 0x0, 0x0) pselect6(0x40, &(0x7f0000000500)={0x8}, &(0x7f0000000240)={0x4}, &(0x7f0000000280)={0x6}, &(0x7f00000002c0)={0x0, 0x989680}, 0x0) 03:04:01 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x4c00000000000000, &(0x7f0000000040)) [ 1136.346975][T23447] EXT4-fs (loop5): Can't read superblock on 2nd try 03:04:01 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) io_setup(0x4, &(0x7f0000000040)=0x0) io_submit(r1, 0x2, &(0x7f0000000740)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xfefdffffffffffff}]) 03:04:01 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000980), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc0bc5310, &(0x7f0000000340)={0x7fffffff, 0x0, 'client1\x00', 0x0, "9f6247ba253a8a93", "cf62dd3e1059f65b3a429fe6edaba9a700000000749544fc4000"}) 03:04:01 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) 03:04:01 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, &(0x7f0000000040)=0x3, 0x4) 03:04:01 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) io_setup(0x4, &(0x7f0000000040)=0x0) io_submit(r1, 0x1, &(0x7f0000000740)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) 03:04:01 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x6000000000000000, &(0x7f0000000040)) 03:04:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_mreqn(r0, 0x88, 0x0, 0x0, 0x0) 03:04:01 executing program 3: r0 = socket(0x1, 0x2, 0x0) sendmsg$NL80211_CMD_GET_POWER_SAVE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x4095) 03:04:01 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x6800000000000000, &(0x7f0000000040)) 03:04:01 executing program 5: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) [ 1136.509675][T23485] loop5: detected capacity change from 0 to 4 [ 1136.533977][T23485] EXT4-fs (loop5): Can't read superblock on 2nd try 03:04:01 executing program 0: r0 = socket(0x23, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000040)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x34, r2, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}], @chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8}], @NL80211_ATTR_DURATION={0x8, 0x57, 0x101}]}, 0x34}}, 0x0) 03:04:01 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_COALESCE(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0x8}, @val={0xc}}}}, 0x30}}, 0x0) 03:04:01 executing program 2: r0 = socket(0x23, 0x5, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000003380)={0x0, 0x0, &(0x7f0000003340)={0x0, 0x324c}}, 0x0) sendmsg$NL80211_CMD_DEL_MPATH(r0, &(0x7f00000034c0)={0x0, 0x0, &(0x7f0000003480)={0x0}}, 0x0) 03:04:01 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCDELDLCI(r0, 0x8980, &(0x7f0000000000)={'sit0\x00'}) 03:04:02 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x6c00000000000000, &(0x7f0000000040)) [ 1136.631262][T23506] loop5: detected capacity change from 0 to 4 [ 1136.647190][T23506] EXT4-fs (loop5): Can't read superblock on 2nd try 03:04:02 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x8901, &(0x7f0000000100)={'virt_wifi0\x00', @ifru_settings={0x0, 0x0, @sync=0x0}}) 03:04:02 executing program 3: r0 = socket(0x23, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000040)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x2c, r2, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random}], @NL80211_ATTR_DURATION={0x8, 0x57, 0x101}]}, 0x2c}}, 0x0) 03:04:02 executing program 5: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) 03:04:02 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0xffffffffffffffff) 03:04:02 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x8992, &(0x7f0000000100)={'vlan0\x00', @ifru_settings={0x0, 0x0, @sync=0x0}}) 03:04:02 executing program 2: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000980), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc08c5334, &(0x7f0000000340)={0x0, 0x0, 'client1\x00', 0x0, "9f6247ba253a8a93", "cf62dd3e1059f65b3a429fe6edaba9a700000000749544fc4000"}) 03:04:02 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x7400000000000000, &(0x7f0000000040)) 03:04:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_mreqn(r0, 0x11, 0xa, 0x0, &(0x7f00000000c0)) 03:04:02 executing program 2: r0 = socket(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8914, &(0x7f0000000040)={'wlan1\x00'}) [ 1136.798804][T23541] loop5: detected capacity change from 0 to 4 [ 1136.819573][T23541] EXT4-fs (loop5): Can't read superblock on 2nd try 03:04:02 executing program 5: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) 03:04:02 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x7a00000000000000, &(0x7f0000000040)) 03:04:02 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89a3, &(0x7f0000000040)={'bridge0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) 03:04:02 executing program 4: r0 = socket$inet(0x2, 0x3, 0x81) getsockopt$inet_mreqn(r0, 0x0, 0x20, 0x0, &(0x7f0000001240)) 03:04:02 executing program 0: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_DEL_SEC_KEY(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000018", @ANYBLOB], 0x38}}, 0x0) 03:04:02 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x7fffffffffffffff, &(0x7f0000000040)) 03:04:02 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x2, 0x4e21, @broadcast}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_retopts={{0x18, 0x0, 0x7, {[@rr={0x7, 0x3, 0x8b}, @rr={0x7, 0x3}]}}}], 0x18}, 0x0) [ 1136.965852][T23575] loop5: detected capacity change from 0 to 4 03:04:02 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000040), 0x4) 03:04:02 executing program 3: r0 = socket(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x891e, &(0x7f0000000040)={'wlan1\x00'}) 03:04:02 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) io_setup(0x4, &(0x7f0000000040)=0x0) io_submit(r1, 0x1, &(0x7f0000000940)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x8, 0x0, r0, 0x0, 0x0, 0xfff}]) 03:04:02 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x8000000000000000, &(0x7f0000000040)) [ 1137.011998][T23575] EXT4-fs (loop5): Can't read superblock on 2nd try 03:04:02 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x8981, &(0x7f0000000100)={'ip6_vti0\x00', @ifru_settings={0x0, 0x0, @sync=0x0}}) 03:04:02 executing program 5: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) 03:04:02 executing program 4: r0 = socket(0x23, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000040)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x3c, r2, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_CHANNEL_WIDTH={0x8}, @NL80211_ATTR_CENTER_FREQ1={0x8}], @chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8}], @NL80211_ATTR_DURATION={0x8, 0x57, 0x101}]}, 0x3c}}, 0x0) 03:04:02 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x8cffffff00000000, &(0x7f0000000040)) 03:04:02 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r0, 0x10e, 0xb, 0x0, &(0x7f0000000180)) 03:04:02 executing program 3: r0 = socket(0x23, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000040)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x1c, r2, 0x1, 0x0, 0x0, {{0x2}, {@val={0x8, 0x3, r3}, @void}}}, 0x1c}}, 0x0) 03:04:02 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000980), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0x402c5342, &(0x7f0000000340)={0x0, 0x0, 'client1\x00', 0x0, "9f6247ba253a8a93", "cf62dd3e1059f65b3a429fe6edaba9a700000000749544fc4000"}) 03:04:02 executing program 2: sendto(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) [ 1137.165232][T23618] loop5: detected capacity change from 0 to 4 [ 1137.195467][T23618] EXT4-fs (loop5): Can't read superblock on 2nd try 03:04:02 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x8904, 0x0) 03:04:02 executing program 5: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) 03:04:02 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0xdaffffff00000000, &(0x7f0000000040)) 03:04:02 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000980), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0x80045301, &(0x7f0000000340)={0x0, 0x0, 'client1\x00', 0x0, "9f6247ba253a8a93", "cf62dd3e1059f65b3a429fe6edaba9a700000000749544fc4000"}) 03:04:02 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), r0) connect$netlink(r0, &(0x7f0000000000)=@proc, 0xc) 03:04:02 executing program 4: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r0, 0xc08c5336, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) 03:04:02 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0xf4ffffff00000000, &(0x7f0000000040)) 03:04:02 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000980), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc0bc5351, &(0x7f0000000000)={0x40, 0x0, 'client1\x00', 0x0, "9f6247ba253a8a93", "cf62dd3e1059f65b3a429fe6edaba9a7efffffff739544fc4000"}) 03:04:02 executing program 0: socket(0x3, 0x0, 0x4002) [ 1137.313427][T23650] loop5: detected capacity change from 0 to 4 [ 1137.346883][T23650] EXT4-fs (loop5): Can't read superblock on 2nd try 03:04:02 executing program 5: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) 03:04:02 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0xf5ffffff00000000, &(0x7f0000000040)) 03:04:02 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000200)={'tunl0\x00', &(0x7f0000000140)={'erspan0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @multicast2}}}}) 03:04:02 executing program 3: r0 = socket(0x1, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x8931, &(0x7f0000000180)={'team_slave_1\x00', @ifru_settings={0x0, 0x0, @sync=0x0}}) 03:04:02 executing program 4: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000000)) 03:04:02 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0xf6ffffff00000000, &(0x7f0000000040)) 03:04:02 executing program 0: socket(0x2c, 0x3, 0x10000) 03:04:02 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000980), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0x80045300, 0x0) 03:04:02 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0xf9fdffff00000000, &(0x7f0000000040)) 03:04:02 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000680)=ANY=[@ANYBLOB="80010000", @ANYRES16=r1, @ANYBLOB="01002dbd7000fedbdf253700000008000300", @ANYRES32, @ANYBLOB="0c009900ff0f00006c00000008009f0000000000050019010f0000000500180108000000050019010d00000008002201"], 0x180}}, 0x0) [ 1137.524163][T23680] loop5: detected capacity change from 0 to 4 [ 1137.551161][T23680] EXT4-fs (loop5): Can't read superblock on 2nd try 03:04:02 executing program 4: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000000)) 03:04:02 executing program 0: r0 = perf_event_open$cgroup(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) 03:04:02 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) 03:04:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000040)=[{&(0x7f0000000880)=""/176, 0xb0}], 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xccf3, 0x0, 0x0, 0x800e00545) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) dup2(r1, r2) recvmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)=""/151, 0x97}, {0x0}, {0x0}], 0x3}, 0x0) recvfrom$inet(r3, 0x0, 0x1e51de7a2ef3af5, 0x0, 0x0, 0x800e0072e) shutdown(r2, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0xccf8, 0x0, 0x0, 0x800e00546) r5 = socket(0x2, 0x1, 0x0) connect$inet(r5, &(0x7f0000000000)={0x10, 0x2}, 0x10) shutdown(r3, 0x0) 03:04:03 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0xfbffffff00000000, &(0x7f0000000040)) [ 1137.671947][T23715] netlink: 304 bytes leftover after parsing attributes in process `syz-executor.2'. 03:04:03 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)={'batadv0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x3, 0x6, @broadcast}, 0x10) 03:04:03 executing program 4: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000000)) 03:04:03 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) 03:04:03 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DESTROY(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x14, 0x3, 0x6, 0x101}, 0x14}}, 0x0) [ 1137.713703][T23721] netlink: 304 bytes leftover after parsing attributes in process `syz-executor.2'. 03:04:03 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000980), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0x408c5333, &(0x7f0000000340)={0x0, 0x0, 'client1\x00', 0x0, "9f6247ba253a8a93", "cf62dd3e1059f65b3a429fe6edaba9a700000000749544fc4000"}) 03:04:03 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0xfc07040000000000, &(0x7f0000000040)) 03:04:03 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) 03:04:03 executing program 2: nanosleep(&(0x7f0000005fc0)={0x0, 0x989680}, 0x0) 03:04:03 executing program 4: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000000)) 03:04:03 executing program 0: syz_mount_image$msdos(&(0x7f0000000740), &(0x7f0000000780)='./file0\x00', 0x0, 0x0, &(0x7f0000000b00), 0x1000800, &(0x7f0000000b80)={[{@fat=@tz_utc}]}) 03:04:03 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0xfdfdffff00000000, &(0x7f0000000040)) 03:04:03 executing program 3: semop(0x0, &(0x7f0000000200)=[{0x0, 0x0, 0x1800}], 0x1) 03:04:03 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) 03:04:03 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/122, 0x7a}], 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xccf3, 0x0, 0x0, 0x800e0050e) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)=""/177, 0xb1}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x42) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0xccf3, 0x0, 0x0, 0x800e00595) shutdown(r2, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write(r4, &(0x7f0000000d80)="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", 0x2c63) shutdown(r3, 0x0) 03:04:03 executing program 4: r0 = socket$inet(0x2, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0x13, &(0x7f0000000000)=0x2, 0x4) connect$inet(r0, &(0x7f0000000080)={0x10, 0x2}, 0x10) 03:04:03 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001f80)=[{{&(0x7f0000000240)={0xa, 0x4e22, 0x0, @loopback}, 0x1c, 0x0, 0x0, &(0x7f00000003c0)=[@dstopts={{0x18}}], 0x18}}, {{&(0x7f0000000400)={0xa, 0x4e23, 0x0, @loopback}, 0x1c, 0x0, 0x0, &(0x7f0000000880)=[@pktinfo={{0x24, 0x29, 0x32, {@private0}}}], 0x28}}], 0x2, 0x0) 03:04:04 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6(0xa, 0x3, 0xbdc) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000001a00)={'syztnl0\x00', &(0x7f0000000140)=ANY=[]}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f1, &(0x7f00000002c0)={'gre0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB='syztnl0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="2000200000000000000000004500001400000000002f"]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x3, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x2000873c, &(0x7f0000deaff0)={0x2, 0x3, @local}, 0x10) recvfrom(r1, &(0x7f0000000380)=""/239, 0xff4e, 0x0, 0x0, 0x2ef) r2 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_int(r2, 0x0, 0x12, &(0x7f0000000040)=0xfffffffe, 0x61) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r4, 0x0) preadv(r4, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) recvfrom$inet(r4, &(0x7f0000000080)=""/120, 0x78, 0x0, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16, @ANYBLOB, @ANYRES32=r3, @ANYBLOB="0800ec1fee4ce70008000800"/27], 0x58}}, 0x41) 03:04:04 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0xfeffffff00000000, &(0x7f0000000040)) 03:04:04 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r2, 0x5452, &(0x7f0000b28000)=0x7) write$binfmt_script(r2, &(0x7f0000000500)={'#! ', './file0'}, 0xb) fcntl$setsig(r2, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r3}], 0x1, 0xffffffffffbffff8) dup2(r2, r3) fcntl$setown(r2, 0x8, r1) tkill(r1, 0x16) [ 1138.655535][T23777] loop5: detected capacity change from 0 to 4 [ 1138.670329][T23777] EXT4-fs (loop5): Can't read superblock on 2nd try 03:04:04 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) 03:04:04 executing program 4: epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000002780)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}, 0x800, 0x0, 0x0, 0x7, 0xa9, 0x0, 0xed9, 0x0, 0xd7e4}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x4) epoll_create(0xb1) 03:04:04 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0xfeffffffffffffff, &(0x7f0000000040)) 03:04:04 executing program 0: sysfs$2(0x2, 0x4, &(0x7f0000000000)=""/97) 03:04:04 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind(r0, &(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x800}, 0x80) 03:04:04 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$SG_GET_REQUEST_TABLE(r0, 0x2286, &(0x7f0000000280)) [ 1138.805195][T23811] loop5: detected capacity change from 0 to 4 [ 1138.820280][T23811] EXT4-fs (loop5): Can't read superblock on 2nd try 03:04:04 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) 03:04:04 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r1, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r2 = socket(0x10, 0x803, 0x0) sendto(r2, &(0x7f00000005c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x45) recvmmsg(r2, &(0x7f0000000d00)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000440)=""/245, 0xbb}, {&(0x7f0000000300)=""/170, 0xd4}, {&(0x7f0000000e00)=""/96, 0x2f}, {&(0x7f0000000600)=""/204, 0x134}, {&(0x7f0000001040)=""/4096, 0x1011}], 0x5}}], 0xd74, 0x0, 0x0) 03:04:04 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0xff01010000000000, &(0x7f0000000040)) 03:04:04 executing program 0: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180), 0x101202, 0x0) write$rfkill(r0, &(0x7f00000001c0)={0x0, 0x0, 0x3}, 0x8) 03:04:04 executing program 4: r0 = fsopen(&(0x7f0000000100)='befs\x00', 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f0000000140)='/proc/capi/capi20\x00', &(0x7f0000000180)='./file0\x00', 0xffffffffffffff9c) 03:04:04 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f1, &(0x7f0000000680)={'ip6tnl0\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast1}}) 03:04:04 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r1, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r2 = socket(0x10, 0x803, 0x0) sendto(r2, &(0x7f00000005c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x45) recvmsg(r2, &(0x7f0000002500)={0x0, 0x0, 0x0}, 0x0) recvmmsg(r2, &(0x7f0000000d00)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000440)=""/245, 0xbb}, {&(0x7f0000000300)=""/170, 0xd4}, {&(0x7f0000000e00)=""/96, 0x2f}, {&(0x7f0000000600)=""/204, 0x134}, {&(0x7f0000001040)=""/4096, 0x1011}], 0x5}}], 0xd74, 0x0, 0x0) 03:04:04 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000240)={0x53, 0x0, 0x6, 0x0, @buffer={0x0, 0x0, 0x0}, &(0x7f0000000140)="2a293ac848f9", 0x0, 0x0, 0x0, 0x0, 0x0}) 03:04:04 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0xff0f000000000000, &(0x7f0000000040)) 03:04:04 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newspdinfo={0x24, 0x24, 0x101, 0x0, 0x0, 0x0, [@XFRMA_SPD_IPV6_HTHRESH={0x6}, @XFRMA_SPD_IPV4_HTHRESH={0x6}]}, 0x24}}, 0x0) 03:04:04 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)=""/115, 0x73}], 0x1}, 0x0) r1 = socket(0x1c, 0x5, 0x0) recvfrom$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f000001a700)=""/4096, 0x1000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x7}, 0x0) recvfrom$inet(r3, 0x0, 0x1e51de7a2ef3af5, 0x0, 0x0, 0x800e00746) shutdown(r2, 0x0) readv(r1, &(0x7f00000002c0)=[{&(0x7f00000000c0)=""/113, 0x71}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x7) shutdown(r3, 0x0) [ 1139.571749][T23854] loop5: detected capacity change from 0 to 4 [ 1139.592653][T23854] EXT4-fs (loop5): Can't read superblock on 2nd try 03:04:05 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) 03:04:05 executing program 3: add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)='\t', 0x1, 0xfffffffffffffffc) 03:04:05 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0xfff7ffff00000000, &(0x7f0000000040)) 03:04:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000440)=[{&(0x7f0000000280)=""/112, 0x70}], 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xccf3, 0x0, 0x0, 0x800e0050e) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f000001f000)=""/102375, 0x18fe7}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0xd}, 0x2) recvfrom$inet(r3, 0x0, 0x22b41b9a8748b1b5, 0x0, 0x0, 0x800e00510) shutdown(r2, 0x0) mprotect(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x1) r4 = socket$inet6_tcp(0x1c, 0x1, 0x0) listen(r4, 0x0) accept4(r4, &(0x7f0000000040)=ANY=[], &(0x7f0000001080), 0x0) shutdown(r3, 0x0) 03:04:05 executing program 4: fsopen(&(0x7f0000000040)='ramfs\x00', 0x0) 03:04:05 executing program 3: syz_genetlink_get_family_id$ieee802154(&(0x7f00000007c0), 0xffffffffffffffff) 03:04:05 executing program 4: r0 = fsopen(&(0x7f0000000040)='ramfs\x00', 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) fsconfig$FSCONFIG_SET_FD(r0, 0x5, &(0x7f0000000080)='}.\x1e\\\x00', 0x0, r1) 03:04:05 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0xfffbffff00000000, &(0x7f0000000040)) [ 1139.729402][T23884] loop5: detected capacity change from 0 to 4 [ 1139.758309][T23884] EXT4-fs (loop5): Can't read superblock on 2nd try 03:04:05 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) 03:04:05 executing program 4: add_key$fscrypt_provisioning(&(0x7f0000000100), 0x0, &(0x7f0000000180)={0x0, 0x0, @c}, 0x29, 0x0) 03:04:05 executing program 3: socket(0x18, 0x0, 0x17a) [ 1139.881580][T23919] loop5: detected capacity change from 0 to 4 [ 1139.906506][T23919] EXT4-fs (loop5): Can't read superblock on 2nd try 03:04:05 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x14, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f80000200040000000000000000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0x4a, 0x4000}], 0x0, &(0x7f0000000040)) 03:04:05 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0xffff030000000000, &(0x7f0000000040)) 03:04:05 executing program 3: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, 0x0) 03:04:05 executing program 4: r0 = fsopen(&(0x7f0000000040)='erofs\x00', 0x0) fsconfig$FSCONFIG_SET_BINARY(r0, 0x2, &(0x7f0000000140)='.\x00', 0x0, 0x0) 03:04:05 executing program 0: r0 = fsopen(&(0x7f0000000040)='erofs\x00', 0x0) fsconfig$FSCONFIG_SET_BINARY(r0, 0x2, &(0x7f0000000140)='.\x00', &(0x7f0000000180)="13", 0x1) 03:04:05 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) 03:04:05 executing program 3: fsopen(&(0x7f0000000100)='nfs\x00', 0x0) 03:04:05 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0xffffff7f00000000, &(0x7f0000000040)) 03:04:05 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f00000007c0), r0) 03:04:05 executing program 4: add_key$user(&(0x7f0000000000), 0x0, &(0x7f0000000080)='\t', 0x1, 0xfffffffffffffffc) 03:04:06 executing program 3: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PTP_PEROUT_REQUEST(r0, 0xc0403d08, &(0x7f0000000040)) 03:04:06 executing program 2: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) sendmsg$SOCK_DESTROY(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0}}, 0x0) 03:04:06 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0xffffffff00000000, &(0x7f0000000040)) 03:04:06 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000040)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_TDLS_CANCEL_CHANNEL_SWITCH(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={0x1c, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}}, 0x1c}}, 0x0) 03:04:06 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x401c5820, &(0x7f0000000240)={'wlan1\x00'}) [ 1140.705111][T23965] loop5: detected capacity change from 0 to 4 [ 1140.742775][T23965] EXT4-fs (loop5): Can't read superblock on 2nd try 03:04:06 executing program 2: r0 = fsopen(&(0x7f0000000040)='erofs\x00', 0x0) fsconfig$FSCONFIG_SET_BINARY(r0, 0x2, &(0x7f0000000140)='.\x00', &(0x7f0000000180), 0x0) 03:04:06 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000000c0)={'erspan0\x00', 0x0}) 03:04:06 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) 03:04:06 executing program 2: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) fcntl$setsig(r0, 0xa, 0x11) fcntl$setlease(r0, 0x400, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, 0x0, &(0x7f0000000200)) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) 03:04:06 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0xffffffffffff0700, &(0x7f0000000040)) 03:04:06 executing program 4: add_key$user(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffc) 03:04:06 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r1, 0x1, 0x0, 0x0, {{}, {}, {0x8}}}, 0x24}}, 0x0) 03:04:06 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0xffffffffffffff7f, &(0x7f0000000040)) 03:04:06 executing program 4: syz_read_part_table(0x0, 0x2, &(0x7f0000001640)=[{0x0, 0x0, 0xb9e}, {&(0x7f0000000280)="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", 0x1ea, 0x1}]) 03:04:06 executing program 3: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_START_NAN(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r0, @ANYBLOB="010300a1b2ae73564a7532"], 0x1c}}, 0x0) [ 1140.951280][T24016] loop5: detected capacity change from 0 to 4 03:04:06 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000580)={0x2c, r1, 0x1, 0x0, 0x0, {{}, {}, {0x10, 0x13, @udp='udp:syz2\x00'}}}, 0x2c}}, 0x0) 03:04:06 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0xfffffffffffffffe, &(0x7f0000000040)) 03:04:06 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) [ 1141.002569][T24016] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1141.035483][T24033] loop4: detected capacity change from 0 to 11 [ 1141.041651][T24035] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 03:04:06 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x660c0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x240801, 0x0) 03:04:06 executing program 0: r0 = socket(0x2, 0x6, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000080)) [ 1141.087366][T24047] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1141.160247][T24054] loop5: detected capacity change from 0 to 4 [ 1141.184886][T24054] EXT4-fs (loop5): Can't read superblock on 2nd try 03:04:07 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0xffffffffffffffff, &(0x7f0000000040)) 03:04:07 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) 03:04:07 executing program 3: socket(0x2, 0x0, 0x21ac) 03:04:07 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg(r0, &(0x7f0000000680)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000100)="88", 0x1}, {0x0}, {&(0x7f0000000b40)='6', 0x1}], 0x3}, 0x0) 03:04:07 executing program 2: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCSARP(r0, 0x891f, &(0x7f0000000040)={{0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x0, @local}, 0x0, {0x2, 0x0, @remote}, 'ip6erspan0\x00'}) 03:04:07 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20004011, &(0x7f0000000000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x2d}}, 0x24) sendto$inet(r0, &(0x7f00000003c0)="e8fd8f6cd5f646ca6c49b24e37da96bbce6a454ed70388", 0xfffffffffffffeb7, 0x44048, &(0x7f00000000c0)={0x2, 0x0, @private}, 0x10) 03:04:07 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000040)) 03:04:07 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="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", 0xfc) 03:04:07 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) 03:04:07 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) 03:04:07 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r3, 0x0, 0x1420000a77, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="390000001100090468", 0x9}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffa) [ 1141.787700][T24084] loop5: detected capacity change from 0 to 4 [ 1141.810478][T24084] EXT4-fs (loop5): Can't read superblock on 2nd try 03:04:07 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) 03:04:07 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) r1 = syz_open_pts(r0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) 03:04:07 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000080)=0x598) r1 = syz_open_pts(r0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) 03:04:07 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000040)={[], [], 0x2}) [ 1141.920733][T24107] loop4: detected capacity change from 0 to 4 [ 1141.947857][T24112] loop5: detected capacity change from 0 to 4 [ 1141.962424][T24107] EXT4-fs (loop4): Can't read superblock on 2nd try 03:04:07 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000080)=0x598) r1 = syz_open_pts(r0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) 03:04:07 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000080)=0x598) r1 = syz_open_pts(r0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) [ 1141.978879][T24112] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1141.992843][T24108] netlink: 25 bytes leftover after parsing attributes in process `syz-executor.2'. 03:04:07 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) r1 = syz_open_pts(r0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) 03:04:07 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) 03:04:07 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r3, 0x0, 0x1420000a77, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="390000001100090468", 0x9}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffa) 03:04:07 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000080)=0x598) r1 = syz_open_pts(r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) 03:04:07 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) 03:04:07 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000040)={[], [], 0x3}) 03:04:07 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) r1 = syz_open_pts(r0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) 03:04:07 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000080)=0x598) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) [ 1142.164259][T24143] loop4: detected capacity change from 0 to 4 [ 1142.184209][T24143] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1142.199236][T24148] loop5: detected capacity change from 0 to 4 03:04:07 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000040)={[], [], 0x4}) 03:04:07 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000080)=0x598) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) 03:04:07 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) 03:04:07 executing program 2: perf_event_open(&(0x7f000025c000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x24f4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0xaad57c81b7a27570, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x53) [ 1142.216615][T24145] netlink: 25 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1142.225935][T24148] EXT4-fs (loop5): Can't read superblock on 2nd try 03:04:07 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) 03:04:07 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) r1 = syz_open_pts(r0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) 03:04:07 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000080)=0x598) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) 03:04:07 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000040)={[], [], 0x5}) 03:04:07 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) r1 = syz_open_pts(r0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) [ 1142.340841][T24174] loop5: detected capacity change from 0 to 4 [ 1142.362314][T24174] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1142.383666][T24181] loop4: detected capacity change from 0 to 4 03:04:07 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) 03:04:07 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000080)=0x598) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) 03:04:07 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000040)={[], [], 0x6}) [ 1142.403932][T24181] EXT4-fs (loop4): Can't read superblock on 2nd try 03:04:07 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) r1 = syz_open_pts(r0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) 03:04:07 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) 03:04:07 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) [ 1142.478432][T24196] loop5: detected capacity change from 0 to 4 [ 1142.514049][T24196] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1142.571120][T24213] loop4: detected capacity change from 0 to 4 [ 1142.585436][T24213] EXT4-fs (loop4): Can't read superblock on 2nd try 03:04:08 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2000004, 0x30, r1, 0x8d3e6000) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/icmp\x00') preadv(r2, &(0x7f0000000700)=[{&(0x7f00000001c0)=""/214, 0xd6}, {&(0x7f00000002c0)=""/140, 0x8c}, {&(0x7f0000000380)=""/123, 0x7b}, {&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/89, 0x59}, {&(0x7f0000000540)=""/73, 0x49}, {&(0x7f00000005c0)=""/123, 0x7b}, {&(0x7f0000000640)=""/119, 0x77}, {&(0x7f00000006c0)=""/42, 0x2a}], 0x9, 0x3, 0x6) sendfile(r1, r2, 0x0, 0x800000080004105) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x311040, 0x0) sendmsg$NFT_MSG_GETOBJ(r3, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x13, 0xa, 0x201, 0x0, 0x0, {0x0, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x890) 03:04:08 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000040)={[], [], 0x7}) 03:04:08 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) 03:04:08 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) r1 = syz_open_pts(r0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) 03:04:08 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) 03:04:08 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) 03:04:08 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000040)={[], [], 0x8}) 03:04:08 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) r1 = syz_open_pts(r0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) 03:04:08 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) [ 1143.212588][T24232] loop5: detected capacity change from 0 to 4 [ 1143.232295][T24232] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1143.241853][T24237] loop4: detected capacity change from 0 to 4 03:04:08 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2000004, 0x30, r1, 0x8d3e6000) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/icmp\x00') preadv(r2, &(0x7f0000000700)=[{&(0x7f00000001c0)=""/214, 0xd6}, {&(0x7f00000002c0)=""/140, 0x8c}, {&(0x7f0000000380)=""/123, 0x7b}, {&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/89, 0x59}, {&(0x7f0000000540)=""/73, 0x49}, {&(0x7f00000005c0)=""/123, 0x7b}, {&(0x7f0000000640)=""/119, 0x77}, {&(0x7f00000006c0)=""/42, 0x2a}], 0x9, 0x3, 0x6) sendfile(r1, r2, 0x0, 0x800000080004105) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x311040, 0x0) sendmsg$NFT_MSG_GETOBJ(r3, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x13, 0xa, 0x201, 0x0, 0x0, {0x0, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x890) 03:04:08 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) [ 1143.256539][T24237] EXT4-fs (loop4): Can't read superblock on 2nd try 03:04:08 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000040)={[], [], 0x9}) 03:04:08 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) 03:04:08 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2000004, 0x30, r1, 0x8d3e6000) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/icmp\x00') preadv(r2, &(0x7f0000000700)=[{&(0x7f00000001c0)=""/214, 0xd6}, {&(0x7f00000002c0)=""/140, 0x8c}, {&(0x7f0000000380)=""/123, 0x7b}, {&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/89, 0x59}, {&(0x7f0000000540)=""/73, 0x49}, {&(0x7f00000005c0)=""/123, 0x7b}, {&(0x7f0000000640)=""/119, 0x77}, {&(0x7f00000006c0)=""/42, 0x2a}], 0x9, 0x3, 0x6) sendfile(r1, r2, 0x0, 0x800000080004105) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x311040, 0x0) sendmsg$NFT_MSG_GETOBJ(r3, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x13, 0xa, 0x201, 0x0, 0x0, {0x0, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x890) 03:04:08 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000080)=0x598) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) 03:04:08 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000040)={[], [], 0xa}) 03:04:08 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) r1 = syz_open_pts(r0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) [ 1143.372977][T24261] loop5: detected capacity change from 0 to 4 [ 1143.393059][T24261] EXT4-fs (loop5): Can't read superblock on 2nd try 03:04:08 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000080)=0x598) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) 03:04:08 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2000004, 0x30, r1, 0x8d3e6000) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/icmp\x00') preadv(r2, &(0x7f0000000700)=[{&(0x7f00000001c0)=""/214, 0xd6}, {&(0x7f00000002c0)=""/140, 0x8c}, {&(0x7f0000000380)=""/123, 0x7b}, {&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/89, 0x59}, {&(0x7f0000000540)=""/73, 0x49}, {&(0x7f00000005c0)=""/123, 0x7b}, {&(0x7f0000000640)=""/119, 0x77}, {&(0x7f00000006c0)=""/42, 0x2a}], 0x9, 0x3, 0x6) sendfile(r1, r2, 0x0, 0x800000080004105) openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x311040, 0x0) 03:04:08 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) r1 = syz_open_pts(r0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) 03:04:08 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000040)={[], [], 0xb}) 03:04:08 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) [ 1143.428732][T24276] loop4: detected capacity change from 0 to 4 03:04:08 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000080)=0x598) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) 03:04:08 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) 03:04:08 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2000004, 0x30, r1, 0x8d3e6000) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/icmp\x00') preadv(r2, &(0x7f0000000700)=[{&(0x7f00000001c0)=""/214, 0xd6}, {&(0x7f00000002c0)=""/140, 0x8c}, {&(0x7f0000000380)=""/123, 0x7b}, {&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/89, 0x59}, {&(0x7f0000000540)=""/73, 0x49}, {&(0x7f00000005c0)=""/123, 0x7b}, {&(0x7f0000000640)=""/119, 0x77}, {&(0x7f00000006c0)=""/42, 0x2a}], 0x9, 0x3, 0x6) sendfile(r1, r2, 0x0, 0x800000080004105) 03:04:08 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000040)={[], [], 0xc}) 03:04:08 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) r1 = syz_open_pts(r0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) 03:04:08 executing program 0: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000080)=0x598) r0 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) 03:04:08 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) [ 1143.567185][T24298] loop5: detected capacity change from 0 to 4 03:04:08 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000040)={[], [], 0xd}) 03:04:08 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2000004, 0x30, r1, 0x8d3e6000) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/icmp\x00') preadv(r2, &(0x7f0000000700)=[{&(0x7f00000001c0)=""/214, 0xd6}, {&(0x7f00000002c0)=""/140, 0x8c}, {&(0x7f0000000380)=""/123, 0x7b}, {&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/89, 0x59}, {&(0x7f0000000540)=""/73, 0x49}, {&(0x7f00000005c0)=""/123, 0x7b}, {&(0x7f0000000640)=""/119, 0x77}, {&(0x7f00000006c0)=""/42, 0x2a}], 0x9, 0x3, 0x6) 03:04:09 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) r1 = syz_open_pts(r0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) 03:04:09 executing program 0: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000080)=0x598) r0 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) 03:04:09 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000040)={[], [], 0xe}) [ 1143.655810][T24315] loop4: detected capacity change from 0 to 4 03:04:09 executing program 0: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000080)=0x598) r0 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) 03:04:09 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) 03:04:09 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2000004, 0x30, r1, 0x8d3e6000) preadv(0xffffffffffffffff, &(0x7f0000000700)=[{&(0x7f00000001c0)=""/214, 0xd6}, {&(0x7f00000002c0)=""/140, 0x8c}, {&(0x7f0000000380)=""/123, 0x7b}, {&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/89, 0x59}, {&(0x7f0000000540)=""/73, 0x49}, {&(0x7f00000005c0)=""/123, 0x7b}, {&(0x7f0000000640)=""/119, 0x77}, {&(0x7f00000006c0)=""/42, 0x2a}], 0x9, 0x3, 0x6) 03:04:09 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) 03:04:09 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) [ 1143.709657][T24330] loop5: detected capacity change from 0 to 4 03:04:09 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000040)={[], [], 0xf}) 03:04:09 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000080)=0x598) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) 03:04:09 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2000004, 0x30, r1, 0x8d3e6000) preadv(0xffffffffffffffff, &(0x7f0000000700)=[{&(0x7f00000001c0)=""/214, 0xd6}, {&(0x7f00000002c0)=""/140, 0x8c}, {&(0x7f0000000380)=""/123, 0x7b}, {&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/89, 0x59}, {&(0x7f0000000540)=""/73, 0x49}, {&(0x7f00000005c0)=""/123, 0x7b}, {&(0x7f0000000640)=""/119, 0x77}, {&(0x7f00000006c0)=""/42, 0x2a}], 0x9, 0x3, 0x6) 03:04:09 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) 03:04:09 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000040)={[], [], 0x10}) 03:04:09 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2000004, 0x30, r1, 0x8d3e6000) preadv(0xffffffffffffffff, &(0x7f0000000700)=[{&(0x7f00000001c0)=""/214, 0xd6}, {&(0x7f00000002c0)=""/140, 0x8c}, {&(0x7f0000000380)=""/123, 0x7b}, {&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/89, 0x59}, {&(0x7f0000000540)=""/73, 0x49}, {&(0x7f00000005c0)=""/123, 0x7b}, {&(0x7f0000000640)=""/119, 0x77}, {&(0x7f00000006c0)=""/42, 0x2a}], 0x9, 0x3, 0x6) 03:04:09 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000080)=0x598) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) 03:04:09 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) [ 1143.844568][T24355] loop4: detected capacity change from 0 to 4 [ 1143.855090][T24359] loop5: detected capacity change from 0 to 4 03:04:09 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) 03:04:09 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000040)={[], [], 0x11}) 03:04:09 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/icmp\x00') preadv(r1, &(0x7f0000000700)=[{&(0x7f00000001c0)=""/214, 0xd6}, {&(0x7f00000002c0)=""/140, 0x8c}, {&(0x7f0000000380)=""/123, 0x7b}, {&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/89, 0x59}, {&(0x7f0000000540)=""/73, 0x49}, {&(0x7f00000005c0)=""/123, 0x7b}, {&(0x7f0000000640)=""/119, 0x77}, {&(0x7f00000006c0)=""/42, 0x2a}], 0x9, 0x3, 0x6) 03:04:09 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000080)=0x598) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) 03:04:09 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) 03:04:09 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = syz_open_pts(r0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) 03:04:09 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000040)={[], [], 0x12}) 03:04:09 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/icmp\x00') preadv(r1, &(0x7f0000000700)=[{&(0x7f00000001c0)=""/214, 0xd6}, {&(0x7f00000002c0)=""/140, 0x8c}, {&(0x7f0000000380)=""/123, 0x7b}, {&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/89, 0x59}, {&(0x7f0000000540)=""/73, 0x49}, {&(0x7f00000005c0)=""/123, 0x7b}, {&(0x7f0000000640)=""/119, 0x77}, {&(0x7f00000006c0)=""/42, 0x2a}], 0x9, 0x3, 0x6) 03:04:09 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000080)=0x598) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) 03:04:09 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = syz_open_pts(r0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) 03:04:09 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/icmp\x00') preadv(r1, &(0x7f0000000700)=[{&(0x7f00000001c0)=""/214, 0xd6}, {&(0x7f00000002c0)=""/140, 0x8c}, {&(0x7f0000000380)=""/123, 0x7b}, {&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/89, 0x59}, {&(0x7f0000000540)=""/73, 0x49}, {&(0x7f00000005c0)=""/123, 0x7b}, {&(0x7f0000000640)=""/119, 0x77}, {&(0x7f00000006c0)=""/42, 0x2a}], 0x9, 0x3, 0x6) 03:04:09 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000040)={[], [], 0x22}) [ 1144.013234][T24393] loop5: detected capacity change from 0 to 4 [ 1144.026295][T24392] loop4: detected capacity change from 0 to 4 03:04:09 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) 03:04:09 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000080)=0x598) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) 03:04:09 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = syz_open_pts(r0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) 03:04:09 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) 03:04:09 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/icmp\x00') preadv(r1, &(0x7f0000000700)=[{&(0x7f00000001c0)=""/214, 0xd6}, {&(0x7f00000002c0)=""/140, 0x8c}, {&(0x7f0000000380)=""/123, 0x7b}, {&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/89, 0x59}, {&(0x7f0000000540)=""/73, 0x49}, {&(0x7f00000005c0)=""/123, 0x7b}, {&(0x7f0000000640)=""/119, 0x77}, {&(0x7f00000006c0)=""/42, 0x2a}], 0x9, 0x3, 0x6) 03:04:09 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000040)={[], [], 0x25}) 03:04:09 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000080)=0x598) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) 03:04:09 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/icmp\x00') preadv(r1, &(0x7f0000000700)=[{&(0x7f00000001c0)=""/214, 0xd6}, {&(0x7f00000002c0)=""/140, 0x8c}, {&(0x7f0000000380)=""/123, 0x7b}, {&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/89, 0x59}, {&(0x7f0000000540)=""/73, 0x49}, {&(0x7f00000005c0)=""/123, 0x7b}, {&(0x7f0000000640)=""/119, 0x77}, {&(0x7f00000006c0)=""/42, 0x2a}], 0x9, 0x3, 0x6) 03:04:09 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) r0 = syz_open_pts(0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) 03:04:09 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000040)={[], [], 0x2e}) [ 1144.161327][T24422] loop5: detected capacity change from 0 to 4 03:04:09 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000080)=0x598) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) 03:04:09 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) r0 = syz_open_pts(0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) [ 1144.253501][T24432] loop4: detected capacity change from 0 to 4 03:04:09 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) 03:04:09 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) 03:04:09 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000040)={[], [], 0x48}) 03:04:09 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) r0 = syz_open_pts(0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) 03:04:09 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000080)=0x598) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) 03:04:09 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/icmp\x00') preadv(r1, &(0x7f0000000700)=[{&(0x7f00000001c0)=""/214, 0xd6}, {&(0x7f00000002c0)=""/140, 0x8c}, {&(0x7f0000000380)=""/123, 0x7b}, {&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/89, 0x59}, {&(0x7f0000000540)=""/73, 0x49}, {&(0x7f00000005c0)=""/123, 0x7b}, {&(0x7f0000000640)=""/119, 0x77}, {&(0x7f00000006c0)=""/42, 0x2a}], 0x9, 0x3, 0x6) 03:04:09 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) r1 = syz_open_pts(r0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) 03:04:09 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000040)={[], [], 0x4c}) 03:04:09 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000080)=0x598) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) 03:04:09 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/icmp\x00') preadv(r1, &(0x7f0000000700)=[{&(0x7f00000001c0)=""/214, 0xd6}, {&(0x7f00000002c0)=""/140, 0x8c}, {&(0x7f0000000380)=""/123, 0x7b}, {&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/89, 0x59}, {&(0x7f0000000540)=""/73, 0x49}, {&(0x7f00000005c0)=""/123, 0x7b}, {&(0x7f0000000640)=""/119, 0x77}, {&(0x7f00000006c0)=""/42, 0x2a}], 0x9, 0x3, 0x6) 03:04:09 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000040)={[], [], 0x60}) [ 1144.353553][T24464] loop5: detected capacity change from 0 to 4 [ 1144.377203][T24469] loop4: detected capacity change from 0 to 4 03:04:09 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) r1 = syz_open_pts(r0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) 03:04:09 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) 03:04:09 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) 03:04:09 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/icmp\x00') preadv(r1, &(0x7f0000000700)=[{&(0x7f00000001c0)=""/214, 0xd6}, {&(0x7f00000002c0)=""/140, 0x8c}, {&(0x7f0000000380)=""/123, 0x7b}, {&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/89, 0x59}, {&(0x7f0000000540)=""/73, 0x49}, {&(0x7f00000005c0)=""/123, 0x7b}, {&(0x7f0000000640)=""/119, 0x77}, {&(0x7f00000006c0)=""/42, 0x2a}], 0x9, 0x3, 0x6) 03:04:09 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000080)=0x598) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) 03:04:09 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000040)={[], [], 0x68}) 03:04:09 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) r1 = syz_open_pts(r0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) 03:04:09 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000080)=0x598) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) 03:04:09 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) 03:04:09 executing program 2: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/icmp\x00') preadv(r0, &(0x7f0000000700)=[{&(0x7f00000001c0)=""/214, 0xd6}, {&(0x7f00000002c0)=""/140, 0x8c}, {&(0x7f0000000380)=""/123, 0x7b}, {&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/89, 0x59}, {&(0x7f0000000540)=""/73, 0x49}, {&(0x7f00000005c0)=""/123, 0x7b}, {&(0x7f0000000640)=""/119, 0x77}, {&(0x7f00000006c0)=""/42, 0x2a}], 0x9, 0x3, 0x6) 03:04:09 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000040)={[], [], 0x6c}) 03:04:09 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) 03:04:09 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) r1 = syz_open_pts(r0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) 03:04:09 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000080)=0x598) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) 03:04:09 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) 03:04:09 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000040)={[], [], 0x74}) 03:04:10 executing program 2: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/icmp\x00') preadv(r0, &(0x7f0000000700)=[{&(0x7f00000001c0)=""/214, 0xd6}, {&(0x7f00000002c0)=""/140, 0x8c}, {&(0x7f0000000380)=""/123, 0x7b}, {&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/89, 0x59}, {&(0x7f0000000540)=""/73, 0x49}, {&(0x7f00000005c0)=""/123, 0x7b}, {&(0x7f0000000640)=""/119, 0x77}, {&(0x7f00000006c0)=""/42, 0x2a}], 0x9, 0x3, 0x6) 03:04:10 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) r1 = syz_open_pts(r0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) 03:04:10 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) ioctl$TIOCPKT(r0, 0x5420, 0x0) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) 03:04:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) 03:04:10 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) 03:04:10 executing program 2: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/icmp\x00') preadv(r0, &(0x7f0000000700)=[{&(0x7f00000001c0)=""/214, 0xd6}, {&(0x7f00000002c0)=""/140, 0x8c}, {&(0x7f0000000380)=""/123, 0x7b}, {&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/89, 0x59}, {&(0x7f0000000540)=""/73, 0x49}, {&(0x7f00000005c0)=""/123, 0x7b}, {&(0x7f0000000640)=""/119, 0x77}, {&(0x7f00000006c0)=""/42, 0x2a}], 0x9, 0x3, 0x6) 03:04:10 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000040)={[], [], 0x7a}) 03:04:10 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) ioctl$TIOCPKT(r0, 0x5420, 0x0) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) 03:04:10 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) r1 = syz_open_pts(r0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) 03:04:10 executing program 2: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/icmp\x00') preadv(r1, &(0x7f0000000700)=[{&(0x7f00000001c0)=""/214, 0xd6}, {&(0x7f00000002c0)=""/140, 0x8c}, {&(0x7f0000000380)=""/123, 0x7b}, {&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/89, 0x59}, {&(0x7f0000000540)=""/73, 0x49}, {&(0x7f00000005c0)=""/123, 0x7b}, {&(0x7f0000000640)=""/119, 0x77}, {&(0x7f00000006c0)=""/42, 0x2a}], 0x9, 0x3, 0x6) 03:04:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) [ 1144.764936][T24551] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 03:04:10 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) ioctl$TIOCPKT(r0, 0x5420, 0x0) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) 03:04:10 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) 03:04:10 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000040)={[], [], 0xfe}) 03:04:10 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, 0x0) r1 = syz_open_pts(r0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) 03:04:10 executing program 2: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/icmp\x00') preadv(r1, &(0x7f0000000700)=[{&(0x7f00000001c0)=""/214, 0xd6}, {&(0x7f00000002c0)=""/140, 0x8c}, {&(0x7f0000000380)=""/123, 0x7b}, {&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/89, 0x59}, {&(0x7f0000000540)=""/73, 0x49}, {&(0x7f00000005c0)=""/123, 0x7b}, {&(0x7f0000000640)=""/119, 0x77}, {&(0x7f00000006c0)=""/42, 0x2a}], 0x9, 0x3, 0x6) 03:04:10 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) 03:04:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) 03:04:10 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, 0x0) r1 = syz_open_pts(r0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) 03:04:10 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000040)={[], [], 0xff}) [ 1144.890484][T24575] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1144.901807][T24578] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 03:04:10 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) 03:04:10 executing program 2: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/icmp\x00') preadv(r1, &(0x7f0000000700)=[{&(0x7f00000001c0)=""/214, 0xd6}, {&(0x7f00000002c0)=""/140, 0x8c}, {&(0x7f0000000380)=""/123, 0x7b}, {&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/89, 0x59}, {&(0x7f0000000540)=""/73, 0x49}, {&(0x7f00000005c0)=""/123, 0x7b}, {&(0x7f0000000640)=""/119, 0x77}, {&(0x7f00000006c0)=""/42, 0x2a}], 0x9, 0x3, 0x6) 03:04:10 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) 03:04:10 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, 0x0) r1 = syz_open_pts(r0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) 03:04:10 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/icmp\x00') preadv(r1, &(0x7f0000000700)=[{&(0x7f00000001c0)=""/214, 0xd6}, {&(0x7f00000002c0)=""/140, 0x8c}, {&(0x7f0000000380)=""/123, 0x7b}, {&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/89, 0x59}, {&(0x7f0000000540)=""/73, 0x49}, {&(0x7f00000005c0)=""/123, 0x7b}, {&(0x7f0000000640)=""/119, 0x77}, {&(0x7f00000006c0)=""/42, 0x2a}], 0x9, 0x3, 0x6) [ 1145.005906][T24598] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 03:04:10 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000280)=""/211, 0xd3}, {&(0x7f0000000140)=""/186, 0xba}, {&(0x7f0000000380)=""/152, 0x98}, {&(0x7f0000000440)=""/155, 0x9b}, {&(0x7f0000000500)=""/234, 0xea}, {&(0x7f0000000600)=""/216, 0xd8}], 0x6, 0xd9f, 0x0) preadv(r0, &(0x7f0000000a00)=[{&(0x7f0000000700)=""/88, 0x58}, {&(0x7f0000000780)=""/143, 0x8f}, {&(0x7f0000000b80)=""/4096, 0x1000}, {&(0x7f0000000840)=""/69, 0x45}, {&(0x7f00000008c0)=""/243, 0xf3}, {&(0x7f00000009c0)=""/50, 0x32}], 0x6, 0x6, 0x7f) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000040)) 03:04:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) 03:04:10 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) r1 = syz_open_pts(0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) 03:04:10 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) 03:04:10 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000080)=0x598) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) [ 1145.088217][T24620] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 03:04:10 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/icmp\x00') preadv(r1, &(0x7f0000000700)=[{&(0x7f00000001c0)=""/214, 0xd6}, {&(0x7f00000002c0)=""/140, 0x8c}, {&(0x7f0000000380)=""/123, 0x7b}, {&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/89, 0x59}, {&(0x7f0000000540)=""/73, 0x49}, {&(0x7f00000005c0)=""/123, 0x7b}, {&(0x7f0000000640)=""/119, 0x77}, {&(0x7f00000006c0)=""/42, 0x2a}], 0x9, 0x3, 0x6) 03:04:10 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x400}], 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) 03:04:10 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) r1 = syz_open_pts(0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) 03:04:10 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="02feaf0a818d6c3ca2437968357b328131f070dd83b9"]) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$inet(r1, &(0x7f0000000140)={0x2, 0x4e23, @empty}, 0x10) [ 1145.180117][T24635] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1145.193952][T24643] loop5: detected capacity change from 0 to 4 03:04:10 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000080)=0x598) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) 03:04:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x400}], 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) 03:04:10 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/icmp\x00') preadv(r1, &(0x7f0000000700)=[{&(0x7f00000001c0)=""/214, 0xd6}, {&(0x7f00000002c0)=""/140, 0x8c}, {&(0x7f0000000380)=""/123, 0x7b}, {&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/89, 0x59}, {&(0x7f0000000540)=""/73, 0x49}, {&(0x7f00000005c0)=""/123, 0x7b}, {&(0x7f0000000640)=""/119, 0x77}, {&(0x7f00000006c0)=""/42, 0x2a}], 0x9, 0x3, 0x6) 03:04:10 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x5}, {0x0, 0x0, 0x800000000004dd}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000000280)="0200000012000000228bf6425bf771c5a3905f2d59f3203f073ee972d1e19732fec4fcad22aed8aa2485d4acfe772a2ca6669252fce807d7a45f376b2e38baa2d21e6521ca12410fe7c29b3442ab79ae23d163149b98c43bb207349017738d92eb9cbb09f58d5edc2b8fff0f000000000000b03310e44c4d2f2ed3e66c2dfbaf70061f5b00a85daec0557dde6a4029aceed16c5735678ca40967033b0d4670274af768c6", 0xa4, 0x800}], 0x0, &(0x7f0000000040)) 03:04:10 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) r1 = syz_open_pts(0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) 03:04:10 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000080)=0x598) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) [ 1145.224405][T24643] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 03:04:10 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) r1 = syz_open_pts(r0, 0x0) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) 03:04:10 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x400}], 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) 03:04:10 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) ftruncate(r0, 0xfffffffffffff801) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000040)) 03:04:10 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/icmp\x00') preadv(r1, &(0x7f0000000700)=[{&(0x7f00000001c0)=""/214, 0xd6}, {&(0x7f00000002c0)=""/140, 0x8c}, {&(0x7f0000000380)=""/123, 0x7b}, {&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/89, 0x59}, {&(0x7f0000000540)=""/73, 0x49}, {&(0x7f00000005c0)=""/123, 0x7b}, {&(0x7f0000000640)=""/119, 0x77}, {&(0x7f00000006c0)=""/42, 0x2a}], 0x9, 0x3, 0x6) 03:04:10 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000080)=0x598) syz_open_pts(r0, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) 03:04:10 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) r1 = syz_open_pts(r0, 0x0) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) [ 1145.344449][T24670] loop4: detected capacity change from 0 to 4 [ 1145.379774][T24682] loop5: detected capacity change from 0 to 4 [ 1145.386062][T24670] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 03:04:10 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/icmp\x00') preadv(r1, &(0x7f0000000700)=[{&(0x7f00000001c0)=""/214, 0xd6}, {&(0x7f00000002c0)=""/140, 0x8c}, {&(0x7f0000000380)=""/123, 0x7b}, {&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/89, 0x59}, {&(0x7f0000000540)=""/73, 0x49}, {&(0x7f00000005c0)=""/123, 0x7b}, {&(0x7f0000000640)=""/119, 0x77}, {&(0x7f00000006c0)=""/42, 0x2a}], 0x9, 0x3, 0x6) 03:04:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x400}], 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) 03:04:10 executing program 1: r0 = openat2(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', &(0x7f00000000c0)={0x400000, 0x150, 0x11}, 0x18) r1 = openat(r0, &(0x7f0000000140)='./file0/../file0\x00', 0xc880, 0x57) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000040)) 03:04:10 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000080)=0x598) syz_open_pts(r0, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) [ 1145.408792][T24682] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 03:04:10 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x400}], 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) 03:04:10 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) r1 = syz_open_pts(r0, 0x0) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) 03:04:10 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/icmp\x00') preadv(r1, &(0x7f0000000700)=[{&(0x7f00000001c0)=""/214, 0xd6}, {&(0x7f00000002c0)=""/140, 0x8c}, {&(0x7f0000000380)=""/123, 0x7b}, {&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/89, 0x59}, {&(0x7f0000000540)=""/73, 0x49}, {&(0x7f00000005c0)=""/123, 0x7b}, {&(0x7f0000000640)=""/119, 0x77}, {&(0x7f00000006c0)=""/42, 0x2a}], 0x9, 0x3, 0x6) 03:04:10 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000080)=0x598) syz_open_pts(r0, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) 03:04:10 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) r1 = syz_open_pts(r0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) 03:04:10 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/icmp\x00') preadv(r1, &(0x7f0000000700)=[{&(0x7f00000001c0)=""/214, 0xd6}, {&(0x7f00000002c0)=""/140, 0x8c}, {&(0x7f0000000380)=""/123, 0x7b}, {&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/89, 0x59}, {&(0x7f0000000540)=""/73, 0x49}, {&(0x7f00000005c0)=""/123, 0x7b}, {&(0x7f0000000640)=""/119, 0x77}, {&(0x7f00000006c0)=""/42, 0x2a}], 0x9, 0x3, 0x6) [ 1145.515657][T24705] loop4: detected capacity change from 0 to 4 [ 1145.537815][T24705] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 03:04:10 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000040)) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) vmsplice(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)='`', 0x1}], 0x1, 0x0) unlinkat(r1, &(0x7f0000000080)='./file0\x00', 0x0) 03:04:10 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}], 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) [ 1145.574609][T24717] loop5: detected capacity change from 0 to 4 [ 1145.586717][T24717] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 03:04:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x400}], 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) 03:04:10 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) r1 = syz_open_pts(r0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) 03:04:10 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000080)=0x598) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, 0x0) 03:04:10 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/icmp\x00') preadv(r1, &(0x7f0000000700)=[{&(0x7f00000001c0)=""/214, 0xd6}, {&(0x7f00000002c0)=""/140, 0x8c}, {&(0x7f0000000380)=""/123, 0x7b}, {&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/89, 0x59}, {&(0x7f0000000540)=""/73, 0x49}, {&(0x7f00000005c0)=""/123, 0x7b}, {&(0x7f0000000640)=""/119, 0x77}, {&(0x7f00000006c0)=""/42, 0x2a}], 0x9, 0x3, 0x6) [ 1145.671705][T24738] loop5: detected capacity change from 0 to 4 [ 1145.704705][T24738] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 1145.714089][T24745] loop4: detected capacity change from 0 to 4 03:04:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}], 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) 03:04:11 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000080)=0x598) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, 0x0) 03:04:11 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) r1 = syz_open_pts(r0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) 03:04:11 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/icmp\x00') preadv(r1, &(0x7f0000000700)=[{&(0x7f00000001c0)=""/214, 0xd6}, {&(0x7f00000002c0)=""/140, 0x8c}, {&(0x7f0000000380)=""/123, 0x7b}, {&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/89, 0x59}, {&(0x7f0000000540)=""/73, 0x49}, {&(0x7f00000005c0)=""/123, 0x7b}, {&(0x7f0000000640)=""/119, 0x77}, {&(0x7f00000006c0)=""/42, 0x2a}], 0x9, 0x3, 0x6) [ 1145.729337][T24745] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 03:04:11 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}], 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) 03:04:11 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/icmp\x00') preadv(r1, &(0x7f0000000700)=[{&(0x7f00000001c0)=""/214, 0xd6}, {&(0x7f00000002c0)=""/140, 0x8c}, {&(0x7f0000000380)=""/123, 0x7b}, {&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/89, 0x59}, {&(0x7f0000000540)=""/73, 0x49}, {&(0x7f00000005c0)=""/123, 0x7b}, {&(0x7f0000000640)=""/119, 0x77}, {&(0x7f00000006c0)=""/42, 0x2a}], 0x9, 0x3, 0x6) [ 1145.838138][T24765] loop4: detected capacity change from 0 to 4 [ 1145.850149][T24768] loop5: detected capacity change from 0 to 4 [ 1145.861705][T24765] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1145.879269][T24768] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 03:04:11 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) r1 = syz_open_pts(r0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) 03:04:11 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000080)=0x598) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, 0x0) 03:04:11 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/icmp\x00') preadv(r1, &(0x7f0000000700)=[{&(0x7f00000001c0)=""/214, 0xd6}, {&(0x7f00000002c0)=""/140, 0x8c}, {&(0x7f0000000380)=""/123, 0x7b}, {&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/89, 0x59}, {&(0x7f0000000540)=""/73, 0x49}, {&(0x7f00000005c0)=""/123, 0x7b}, {&(0x7f0000000640)=""/119, 0x77}, {&(0x7f00000006c0)=""/42, 0x2a}], 0x9, 0x3, 0x6) 03:04:11 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}], 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) 03:04:11 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x2, 0x5) ioctl$BTRFS_IOC_DEFRAG_RANGE(r1, 0x40309410, &(0x7f00000000c0)={0x3, 0x6, 0x1, 0xffffe5e8, 0x2, [0xffffff40, 0x4, 0x0, 0x5]}) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000140)=0x3, 0x4) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000040)) 03:04:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}], 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) 03:04:11 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) r1 = syz_open_pts(r0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) 03:04:11 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000080)=0x598) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) 03:04:11 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006", 0x1d, 0x400}], 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) [ 1146.486077][T24790] loop4: detected capacity change from 0 to 4 [ 1146.502316][T24790] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1146.505385][T24794] loop5: detected capacity change from 0 to 4 [ 1146.521193][T24794] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 03:04:11 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/icmp\x00') preadv(r1, &(0x7f0000000700)=[{&(0x7f00000001c0)=""/214, 0xd6}, {&(0x7f00000002c0)=""/140, 0x8c}, {&(0x7f0000000380)=""/123, 0x7b}, {&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/89, 0x59}, {&(0x7f0000000540)=""/73, 0x49}, {&(0x7f00000005c0)=""/123, 0x7b}, {&(0x7f0000000640)=""/119, 0x77}, {&(0x7f00000006c0)=""/42, 0x2a}], 0x9, 0x3, 0x6) 03:04:11 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f0000000080)='ext4\x00', &(0x7f00000000c0)='./file1\x00', r0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) r1 = socket(0x9, 0x4, 0x3) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000040)) 03:04:11 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000080)=0x598) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) 03:04:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}], 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) 03:04:11 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) r1 = syz_open_pts(r0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) 03:04:11 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/icmp\x00') preadv(r1, &(0x7f0000000700)=[{&(0x7f00000001c0)=""/214, 0xd6}, {&(0x7f00000002c0)=""/140, 0x8c}, {&(0x7f0000000380)=""/123, 0x7b}, {&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/89, 0x59}, {&(0x7f0000000540)=""/73, 0x49}, {&(0x7f00000005c0)=""/123, 0x7b}, {&(0x7f0000000640)=""/119, 0x77}, {&(0x7f00000006c0)=""/42, 0x2a}], 0x9, 0x3, 0x6) 03:04:12 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000080)=0x598) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) 03:04:12 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) syz_mount_image$nfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x8, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000140)="cb4471b0f06b50fede89e032570aaf5fd0c3cfef30443b285a3b59c670a9cea4583d814bc7654fd36f54df9d1da2f28ef6d0eb26fb6bcccd2061a864b0468c682f5d25e53d48665c6f50cd30486d8796783909dbe01241c4ecb44c2f9a3b75e806f6d03ae6bf468df4a8", 0x6a, 0xfff}, {&(0x7f0000000280)="4bf44649eae091bc788b95b547ab9e666e3767a9dcf46f651f14079f8408c95ab42061e96c7552db5bf31c8fe79928cf1d4f5d6458e27d06501a7e8c1c103e5652d27c1cb1d94610a59cc1ad62ba25276b4c820e843120bbcddb77abc84f6c2992219c3611de78033028c9254b401770e722620106d3bf4d042f905240b45b3ec9709ab83ac5ee38077f260c0b", 0x8d, 0xdcf}, {&(0x7f0000000340)="bcad0e82e4424e2c62f6a0d17c50dbafacdad235481ffc266e9e645f2de4e421f1d4f2f793cddab9bbd318d3cb450cad93e5ce1e85b3ea54537050bd95a2391616ceca84689c9086efd0f3c1bf4a3a466ca97588c9b3a24106963bd4dcd379f761fd49808ff5cd84d6f144b5eac90cfbe363de123d22241e14529db52522", 0x7e, 0xfffffffffffffffc}, {&(0x7f00000001c0)="fad2a319b6f591acff4b1abadef7a6a0a14d35e97d986c42f6a66932c9f03a6199d0d392515773287cb1e019aefc692684d765afb3c71fee721607f0ee", 0x3d, 0x4}, {&(0x7f00000003c0)="3dc0e38219900f62f6503f5b6d24f28d26efb21f3a7c198426a482eb69238b7c13f236c783489e755793693dc6e3eab8df38c37c1d6f335420e5986950154abe177dd309728f515f5f8d3be4836f3c19db1401e4aa311ecd75197aed235e3bd68512ff266748e2ee34dfb249b80155477ce14d291555fa4adea1346be5bdc0ad02400b5c24040646bed3ee33e10236e03b44c09dd41a78c3b324e89a76713136da76fc370fd3bed2a61724e7334fd09e579389591eeb990005d1a033f20f440fbe6a824583ab82a8fd666fcd9b1fb7e1611d5100fdcd7c6328", 0xd9, 0x3}], 0x2004021, &(0x7f0000000540)={[{'ext4\x00'}, {}, {'ext4\x00'}], [{@obj_type={'obj_type', 0x3d, '\\^/%'}}, {@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@smackfshat={'smackfshat', 0x3d, 'ext4\x00'}}, {@pcr={'pcr', 0x3d, 0x31}}]}) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000040)) [ 1146.667469][T24824] loop4: detected capacity change from 0 to 4 [ 1146.673976][T24819] loop5: detected capacity change from 0 to 4 03:04:12 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/icmp\x00') preadv(r1, &(0x7f0000000700)=[{&(0x7f00000001c0)=""/214, 0xd6}, {&(0x7f00000002c0)=""/140, 0x8c}, {&(0x7f0000000380)=""/123, 0x7b}, {&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/89, 0x59}, {&(0x7f0000000540)=""/73, 0x49}, {&(0x7f00000005c0)=""/123, 0x7b}, {&(0x7f0000000640)=""/119, 0x77}, {&(0x7f00000006c0)=""/42, 0x2a}], 0x9, 0x3, 0x6) 03:04:12 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) r1 = syz_open_pts(r0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) 03:04:12 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006", 0x1d, 0x400}], 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) [ 1146.711745][T24819] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 1146.721300][T24824] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 03:04:12 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006", 0x1d, 0x400}], 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) 03:04:12 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) vmsplice(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)='`', 0x1}], 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r1, 0xc058534b, &(0x7f0000000040)={0xfffffffd, 0x287a, 0x1ff4, 0x20de6df2, 0xfffffff7, 0x7}) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000280), 0x9a4c30d7ec3b3d62, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x11, &(0x7f00000002c0)=0x6, 0x4) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="008c1c133941dada774a19448999b8f4e3af7a7c1d35bd35fce99dc32e14cf16ce48528f77809740250204292d5c2cd60a568a50ac015eb61126df5cad6246969a64ba0593"]) 03:04:12 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/icmp\x00') preadv(r1, &(0x7f0000000700)=[{&(0x7f00000001c0)=""/214, 0xd6}, {&(0x7f00000002c0)=""/140, 0x8c}, {&(0x7f0000000380)=""/123, 0x7b}, {&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/89, 0x59}, {&(0x7f0000000540)=""/73, 0x49}, {&(0x7f00000005c0)=""/123, 0x7b}, {&(0x7f0000000640)=""/119, 0x77}, {&(0x7f00000006c0)=""/42, 0x2a}], 0x9, 0x3, 0x6) 03:04:12 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) r1 = syz_open_pts(r0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) [ 1146.823892][T24848] loop4: detected capacity change from 0 to 4 [ 1146.848341][T24848] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1146.859508][T24854] loop5: detected capacity change from 0 to 4 03:04:12 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/icmp\x00') preadv(r1, &(0x7f0000000700)=[{&(0x7f00000001c0)=""/214, 0xd6}, {&(0x7f00000002c0)=""/140, 0x8c}, {&(0x7f0000000380)=""/123, 0x7b}, {&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/89, 0x59}, {&(0x7f0000000540)=""/73, 0x49}, {&(0x7f00000005c0)=""/123, 0x7b}, {&(0x7f0000000640)=""/119, 0x77}, {&(0x7f00000006c0)=""/42, 0x2a}], 0x9, 0x3, 0x6) 03:04:12 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006", 0x1d, 0x400}], 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) 03:04:12 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) r1 = syz_open_pts(r0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) [ 1146.874033][T24854] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 03:04:12 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006", 0x1d, 0x400}], 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) 03:04:12 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006", 0x1d, 0x400}], 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) 03:04:12 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/icmp\x00') preadv(r1, &(0x7f0000000700)=[{&(0x7f00000001c0)=""/214, 0xd6}, {&(0x7f00000002c0)=""/140, 0x8c}, {&(0x7f0000000380)=""/123, 0x7b}, {&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/89, 0x59}, {&(0x7f0000000540)=""/73, 0x49}, {&(0x7f00000005c0)=""/123, 0x7b}, {&(0x7f0000000640)=""/119, 0x77}, {&(0x7f00000006c0)=""/42, 0x2a}], 0x9, 0x3, 0x6) [ 1146.938325][T24871] loop4: detected capacity change from 0 to 4 [ 1146.963653][T24871] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 03:04:12 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) r1 = syz_open_pts(r0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) 03:04:12 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000", 0x2c, 0x400}], 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) 03:04:12 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/icmp\x00') preadv(r1, &(0x7f0000000700)=[{&(0x7f00000001c0)=""/214, 0xd6}, {&(0x7f00000002c0)=""/140, 0x8c}, {&(0x7f0000000380)=""/123, 0x7b}, {&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/89, 0x59}, {&(0x7f0000000540)=""/73, 0x49}, {&(0x7f00000005c0)=""/123, 0x7b}, {&(0x7f0000000640)=""/119, 0x77}, {&(0x7f00000006c0)=""/42, 0x2a}], 0x9, 0x3, 0x6) [ 1147.037856][T24888] loop5: detected capacity change from 0 to 4 [ 1147.049272][T24894] loop4: detected capacity change from 0 to 4 [ 1147.054411][T24888] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 1147.064133][T24894] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1147.145041][T24907] loop5: detected capacity change from 0 to 4 [ 1147.157893][T24907] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 03:04:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000", 0x2c, 0x400}], 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) 03:04:13 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) r1 = syz_open_pts(r0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) 03:04:13 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, 0x0) preadv(r1, &(0x7f0000000700)=[{&(0x7f00000001c0)=""/214, 0xd6}, {&(0x7f00000002c0)=""/140, 0x8c}, {&(0x7f0000000380)=""/123, 0x7b}, {&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/89, 0x59}, {&(0x7f0000000540)=""/73, 0x49}, {&(0x7f00000005c0)=""/123, 0x7b}, {&(0x7f0000000640)=""/119, 0x77}, {&(0x7f00000006c0)=""/42, 0x2a}], 0x9, 0x3, 0x6) 03:04:13 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='o']) 03:04:13 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000", 0x2c, 0x400}], 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) 03:04:13 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) r1 = syz_open_pts(r0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) 03:04:13 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, 0x0) preadv(r1, &(0x7f0000000700)=[{&(0x7f00000001c0)=""/214, 0xd6}, {&(0x7f00000002c0)=""/140, 0x8c}, {&(0x7f0000000380)=""/123, 0x7b}, {&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/89, 0x59}, {&(0x7f0000000540)=""/73, 0x49}, {&(0x7f00000005c0)=""/123, 0x7b}, {&(0x7f0000000640)=""/119, 0x77}, {&(0x7f00000006c0)=""/42, 0x2a}], 0x9, 0x3, 0x6) 03:04:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000", 0x2c, 0x400}], 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) 03:04:13 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) write(r0, &(0x7f0000000080)="d80091d29a2591a9564e3674916ee5cdfd8f7cf8a8be14754618", 0x1a) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) fcntl$setflags(r0, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="00c3061fe708e5621377e3631ff795030ca70edd272d70ff6fd3f8ada90503aa490f903b693dd276c9c32f71fc87288241396bafd43a70856208c622e8b8838bf6fe543ae85ea91d9147f0380dc2611cdb243150bcf45d9ab7930e811d7eda2acb97c01d10120a4b72a180e65fc14fe69b25cb"]) [ 1147.750251][T24921] loop4: detected capacity change from 0 to 4 [ 1147.757789][T24924] loop5: detected capacity change from 0 to 4 [ 1147.774572][T24921] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1147.784328][T24924] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 03:04:13 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, 0x0) preadv(r1, &(0x7f0000000700)=[{&(0x7f00000001c0)=""/214, 0xd6}, {&(0x7f00000002c0)=""/140, 0x8c}, {&(0x7f0000000380)=""/123, 0x7b}, {&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/89, 0x59}, {&(0x7f0000000540)=""/73, 0x49}, {&(0x7f00000005c0)=""/123, 0x7b}, {&(0x7f0000000640)=""/119, 0x77}, {&(0x7f00000006c0)=""/42, 0x2a}], 0x9, 0x3, 0x6) 03:04:13 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000", 0x2c, 0x400}], 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) 03:04:13 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) r1 = syz_open_pts(r0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, 0x0, 0x0, 0xd9f, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) 03:04:13 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xa) sendmsg$NL80211_CMD_DEL_NAN_FUNCTION(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[], 0x40}}, 0x0) r2 = socket$netlink(0x10, 0x3, 0xa) sendmsg$NL80211_CMD_DEL_NAN_FUNCTION(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[], 0x40}}, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000040), r2) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r2) syz_genetlink_get_family_id$wireguard(&(0x7f0000000040), r1) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x100010, r1, 0x0) ioctl$INCFS_IOC_FILL_BLOCKS(r0, 0x80106720, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0xe0e, 0xe3, &(0x7f0000000280)="1e55e3400f9fadd991c0875b488d2ec146c2728d90ff793e0dfaa82daf66cec128800f85dc5b61ca7f80fbabf25e7827a69055b313c458949ccf1969121fe5edbf13347422b570578e6366580dbc8094c4409dd428ac8544f17b15f444e74fcd91cabed0163d3d288d4cb251255dbab8e6063fac0d5073d63d5c73322f8060f9177d31babe9109ba8c9eefa964c897f0c03272189fb374a852faf9d94f56db16cdc70fd39ca6b04757efcf71dc689ffcd55bc93363e5f54442aa7c6a669292d43bc65b94d8b0c4c20e49530dcc4fac328edc5ecea6a65bd9b6830c569e1cfd2e4c4120", 0x1, 0x1}]}) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000040)) 03:04:13 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='net/icmp\x00') preadv(0xffffffffffffffff, &(0x7f0000000700)=[{&(0x7f00000001c0)=""/214, 0xd6}, {&(0x7f00000002c0)=""/140, 0x8c}, {&(0x7f0000000380)=""/123, 0x7b}, {&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/89, 0x59}, {&(0x7f0000000540)=""/73, 0x49}, {&(0x7f00000005c0)=""/123, 0x7b}, {&(0x7f0000000640)=""/119, 0x77}, {&(0x7f00000006c0)=""/42, 0x2a}], 0x9, 0x3, 0x6) 03:04:13 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) r1 = syz_open_pts(r0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, 0x0, 0x0, 0xd9f, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) [ 1147.909966][T24951] loop4: detected capacity change from 0 to 4 [ 1147.928522][T24954] loop5: detected capacity change from 0 to 4 [ 1147.938424][T24951] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 03:04:13 executing program 1: sendmsg$inet(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000080)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10, &(0x7f00000000c0)=[{&(0x7f0000000140)="3049e2bcc8c77cd2d0de7b303baa48e50cd9abeec6b8a4aff84dcc710f9f0a3efbfefc761c29c32d673eaab0056c1ed7bc04eb0a645882eadb1ffafa611a77673b528bcfdad31f392cbf582b371fe87f882eb855c6d650b2d8abab104194b10ce998cd2321c5750e11ddf20fbe963b202ecb91c4a5ad2d2c3b32ba571bcd95b1dc1687c1cd49ef0b", 0x88}], 0x1}, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000040)) openat(r1, &(0x7f0000000300)='./file0\x00', 0x2100, 0x30) signalfd4(r0, &(0x7f00000002c0)={[0x4]}, 0x8, 0x0) 03:04:13 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='net/icmp\x00') preadv(0xffffffffffffffff, &(0x7f0000000700)=[{&(0x7f00000001c0)=""/214, 0xd6}, {&(0x7f00000002c0)=""/140, 0x8c}, {&(0x7f0000000380)=""/123, 0x7b}, {&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/89, 0x59}, {&(0x7f0000000540)=""/73, 0x49}, {&(0x7f00000005c0)=""/123, 0x7b}, {&(0x7f0000000640)=""/119, 0x77}, {&(0x7f00000006c0)=""/42, 0x2a}], 0x9, 0x3, 0x6) [ 1147.960178][T24954] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 03:04:13 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f465", 0x33, 0x400}], 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) 03:04:13 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) r1 = syz_open_pts(r0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, 0x0, 0x0, 0xd9f, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) 03:04:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000", 0x2c, 0x400}], 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) 03:04:13 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='net/icmp\x00') preadv(0xffffffffffffffff, &(0x7f0000000700)=[{&(0x7f00000001c0)=""/214, 0xd6}, {&(0x7f00000002c0)=""/140, 0x8c}, {&(0x7f0000000380)=""/123, 0x7b}, {&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/89, 0x59}, {&(0x7f0000000540)=""/73, 0x49}, {&(0x7f00000005c0)=""/123, 0x7b}, {&(0x7f0000000640)=""/119, 0x77}, {&(0x7f00000006c0)=""/42, 0x2a}], 0x9, 0x3, 0x6) 03:04:13 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xa) sendmsg$NL80211_CMD_DEL_NAN_FUNCTION(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[], 0x40}}, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000040), r1) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000280)={0x0, 0x0, {0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_DEV_REPLACE(r0, 0xca289435, &(0x7f00000015c0)={0x2, 0x9, @start={0x0, 0x0, "721bedc13790b3130a879c32f5615b869162353c7c5f8097c03492aa90517e61ad308c460a968ccb811a7aadee29383d835b5dd5db62ddfb0be72b8f130c4c8a474a807f25661f6e865cc4550b4676969bcca8f1a80de7e0c128c71f410d03e42d3426b515f545fee98bb4498d565f499005c72c18454230367cb01062eca8289a7a3f199897bc7f1796233cd31961c59f69b8cacb5487a79feb42abf04e95597515d804c626f53443157c7cd5d700957dc87255c79680e76ce0f0efc759cb160e93739c167452e8283dd0b2375bfc31bb8c1f8baaea1a3388d30d699ff17c8b894fd863b659a02cb8878cdb03007f92faf42da2134272329c340b9dfa68a21cf69c6735ee110fc949dab0aef5bbc510fcde395120edaeb76342003e1f7d563f5f49cb2697dc6d8a3f13f8a6421453546f402224f27180b0709d967beb7b7509a43753c35e2c3dafb2393dba9c970d95c963801bb5813d8955656da7d771176bb7c983d5acd8c848fcfe48c51826dd95956e9a5afff948c340409c08f0c2b1016fd53554f41a7a0f2baed2e9735728e8483caf0d814a222bf55efc9672ac9041cff74e5c975d42aff98e03a2518fc8df95df9fecb811d77ef574b47a12103d8010892e620a0402be31d154b70d683be303056337a582d8b78addbcfe1ab934d4ec99868b9c6658c2bc24eaa48b46cb66a6fdc8e08d4e30fcec7e19cbec54af6a90ae1fb57077c00fd325777a916e6c73e3a5632fb3378bec53dc05d702670f19bb0eacbb2e0571d07eb2c34ff79514edd859e9e174e08875a2b5e03e0afb3843d0561f53e4294d79dac645b0b0adcd761e3020187bfd736e35a90ce4db9e527fb1b625b8ab69944810f298620932f7a8cdec0600352c6f897d8ea9d91797878bc522b4a4f08bc4cadebaee8a322800345cccaa11b7d21685f6573de5f6c0e17033c9bbd473a0b8a888b9b307dce9432c0d78e8f6697f3d03d7c0ad44b05474f614bc94b4e2fe0fc109aabe42d07259cd85d7b647a74d34393ae2e2b7a3b691d55e431efbce6202ef4eae1990187b7ed43da46452e0240ef8adfecfdaf2209f417b7e018f068383731168fbefa2ecea2d330304e64bf05e2defc4143ed45d847a06564279a40620b329248f3d32ff99caa5db9a57a64939f9a38b1b634173209e3db0bda03b140c40fd2e91e43f898d3238fdf93296575ce9aee5643f1953cac31285650f2a8ac7bc49e55802a0a1af4f5eeb0845a55a20f88a1131b7e0607257f199139ddca3b6ae9c7535ebed6aebf6cbe846a716703b35677436d905a731a46caf8f093df481c8bf3411d97d0455abd4b3e57156b12a0e0ef6618b78f355fbf6914d94cf31c83a012086c66a8eea0964ae1793ad2bc25002a5b3ae048273c9a2bb2cab61225c60e70ccc550ecc9ed9110d51a045f18ef74d4a448c3da8bd4ecb", "af22d40787b1a12169bbff35211a6bbaa0de0179e8c6e30dffe06cfab761650feb4eae90fe437b22a70f4088806a8de8fc7cbeab90e623a9f766d485642c6737beff0bf51d8d30a7a90dd9c79c06914bee6b10f8bf16fa7d39eef31ee157b369aa57662f0e2560f5ad85c6ae6975b51846b5771b994fbd5b6aafba6b5e0ba6364b162a9faa4d61284cf54e4ab1db7a877d651858647db43fe725aebb4dea3b2bd163ea15fcac24e687d21d4fd48dc80b07b063b671cc19ed78cf830761f96b90daebf93b00a6596bbe709c22e8fc9183c13fba45c8aaf99d5df119b02b1952071f72f5a00bf130e5d604b6cf954dcce37d77a853b725f2c216f03dd1a3cde2c441fe9916b10052217681d4cbc6b4836a7ced25abc834f55176ddb114f2b6cf4eb9b0a00a24a709b47f58adf2d16ea80d5c2088e873e1fa1ed838e59ecc9f655c4afe6b0c59aa773b24753b112ac97f475cccf7b9f4ed6822c8494f55469d9598ce72df2261ba059d69231c2721e53efe59098455f3236434523200cd04abef591f6768a03f288cf05a037a6046f9624d7f840fce2bc6b0a39c6d948bfb6f7bb69b8aa61587f561f3c87458e6b9461dd1832d4c99fa60eb3e39529630d5399cf296ce6dac9ccaceb98e281fe2f2693e11ebfbe3844d315d39cb30c78dbbfb996e2678ee57bbfe96e70849e8e59872c068785aa85c1441ca358d08a9237f255609d8ff3f6787c8ff6fc66c9b1185883e38766c0ca70c138ccb14cb7cca5d1449529c442726cc4ffb5fe060e715c2094a7d797b01a3b0d7550d36f32250adfe190a2fb88070f53f3709eb7712f7ac1d3fab4ed9f6b9579d36b4e3e1c4069e2bc52f6930d47e6a950fd1ddc87f706fb2583676cfecc8e944c8057dd61ed48886f4294d089a83996f450b4493bb80379293ebd6dd12f98662d184572e88df8dad31204c8b7a2d5b5b6d5ab1753430928cba6a22ac82652c82729be2bc92393e6cafc729e95d5abf5b5699c3000000a68b52e3a70de907fb5a25396949937eed99a08927159b8ed1ae59a92f197a7968368317d43ed152d4703d7d0db70535d0d49e91cb636fa40939285208ab587db047305eba3bb6b133a0b6783f4a73fd0af119192370a70c4d657e4a3bb0ed64c6ef970a92578af0d1c5ed5951f911132e151169ef6f1c0c94e0bd2c11edc3b89e7ae29782d70b3795e8024df92948b5c48ee281a9e7efa7baaabeac35b8ad8aba2196421c8fdc9db35fe785af8fdc71273e0011e717da106ff2f9485e2ac8f04230945149d5f10d64948e1d432932871f9defdee942ea6ba3fd9ef6f99240b3a90df58ded44446e1bc37e35a400cb7ace282489dc01cfe41f321fdcbffee3b31f7c6b09d1ad3f507d238fa9ccc3cd05ab95e4714a10ad2930884a803ce4aad97750e6200d37e3c6558251f516c3a576e8e4ec1fa1"}, [0x2, 0x8, 0x4, 0x1, 0x0, 0x9, 0x3, 0x1, 0x81, 0x10001, 0xafb3, 0x8, 0x2, 0x4, 0x6, 0x0, 0xba7e, 0xfff, 0x5, 0xfffffffffffffffc, 0x4, 0x2, 0x5, 0x4, 0x8, 0x8, 0xc524, 0x4, 0xf6, 0x8, 0x200, 0x1, 0x3, 0x3, 0x4, 0x400, 0xffffffffffff7fff, 0x7, 0x2, 0x4, 0xfffffffffffffffd, 0x4, 0x6, 0x0, 0x3, 0x7, 0xce80, 0xfa, 0x7, 0x6, 0x56, 0x2, 0xd1, 0x4, 0x8, 0x4, 0x7fff, 0x1000, 0x4, 0x2, 0xc9d, 0x80000000, 0x20, 0x3]}) ioctl$BTRFS_IOC_BALANCE_V2(r0, 0xc4009420, &(0x7f0000000680)={0x0, 0x4, {0x9, @usage=0x6, 0x0, 0x968, 0x9, 0x9, 0x8, 0x7, 0x1, @usage=0x5, 0x7, 0x4, [0x10001, 0x8, 0x200, 0x200, 0x4, 0x10001]}, {0x2, @struct={0x20, 0x9}, 0x0, 0x3, 0x316, 0x1, 0x9, 0x7, 0x2, @usage=0xfffffffffffffffe, 0x2, 0x2, [0x360, 0x6, 0x9, 0x2, 0x80000001, 0xffffffff]}, {0x2e7, @struct={0x6, 0x9}, 0x0, 0x100000000000, 0x3d, 0x9, 0xffffffffffff6ebc, 0x1, 0x40, @usage=0x6, 0x9, 0x1, [0x8, 0x7fffffff, 0x7, 0x0, 0x401, 0x6]}, {0x92, 0x9, 0x6}}) ioctl$BTRFS_IOC_BALANCE_V2(r1, 0xc4009420, &(0x7f0000002000)={0x0, 0x7, {0x1f, @struct={0x6, 0xdc07}, r2, 0x54d, 0x1, 0x0, 0x8, 0x800, 0xa0, @struct={0x0, 0x9}, 0x101, 0x2, [0x0, 0x100000001, 0x5, 0x0, 0x40, 0x80]}, {0x1, @struct={0x6, 0x7}, r3, 0x5, 0x6, 0x2, 0x31450000000000, 0x7ff, 0x0, @usage=0x9, 0xe9, 0x0, [0x0, 0x1, 0x1, 0x40, 0x9, 0x4]}, {0x1, @struct={0x40, 0x8}, r4, 0xffffffffffffff92, 0x7ff, 0x9, 0x4, 0x4, 0x402, @usage=0x4, 0xfffffe00, 0x5583, [0x3, 0x0, 0x1, 0x3, 0x5, 0x7]}, {0x61, 0x10000, 0x6}}) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x200000004, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0xffffffa0, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='\a']) 03:04:13 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) r1 = syz_open_pts(r0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0x0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) [ 1148.082468][T24983] loop4: detected capacity change from 0 to 4 [ 1148.097329][T24983] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1148.117979][T24989] loop5: detected capacity change from 0 to 4 03:04:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f465", 0x33, 0x400}], 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) 03:04:13 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/icmp\x00') preadv(r1, 0x0, 0x0, 0x3, 0x6) [ 1148.140688][T24989] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 03:04:13 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) r1 = syz_open_pts(r0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0x0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) 03:04:13 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f465", 0x33, 0x400}], 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) 03:04:13 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/icmp\x00') preadv(r1, 0x0, 0x0, 0x3, 0x6) [ 1148.208000][T25006] loop4: detected capacity change from 0 to 4 [ 1148.237402][T25006] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 03:04:13 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) r1 = syz_open_pts(r0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0x0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) 03:04:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f465", 0x33, 0x400}], 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) 03:04:13 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/icmp\x00') preadv(r1, 0x0, 0x0, 0x3, 0x6) 03:04:13 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) sendmsg$NL80211_CMD_DEL_NAN_FUNCTION(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[], 0x40}}, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000040), 0xffffffffffffffff) r1 = syz_open_pts(r0, 0x2042) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000002880), 0x840, 0x0) r3 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000028c0), 0x10200, 0x0) fstat(r0, &(0x7f0000002900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = socket$inet_icmp(0x2, 0x2, 0x1) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002980)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r7 = syz_open_dev$char_raw(&(0x7f00000029c0), 0x1, 0x220803) r8 = socket$netlink(0x10, 0x3, 0xa) sendmsg$NL80211_CMD_DEL_NAN_FUNCTION(r8, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[], 0x40}}, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000040), r8) r9 = socket$netlink(0x10, 0x3, 0xa) sendmsg$NL80211_CMD_DEL_NAN_FUNCTION(r9, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[], 0x40}}, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000040), r9) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000002b00)=[{&(0x7f0000000080)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000000380)=[{&(0x7f0000000140)="85416e07d9dcce3d8bd387d68a60f75abe26931852f34f5cd5a5639d581d3afd5d5475fa3da7aa9796c14d91b25288e2d35b920062eb78e388852e99ddcde6002f69ef592189f2e45abc0e50d3d57b54ba4f1f54437b04d0808a45b9609fe6b505edcd2561b381d7f24fdeb67dbe2cd0be226ca2061eaa646c92037b8d112064af058920657b3349d22caf262ee0768e88632b9ee4e1906f23bc2965f1bc6e6b4f5ce28d65953086b9aeb9151aa26a53d404b93ca3dd", 0xb6}, {&(0x7f0000000280)="ae669b0ecbe6560d20cfcc8ddaca8d81b1afe75bdee8cf3b0deb1f210476bacd14fe5318825ec73c2db04138eede4b6a44917b958028aff1a5d7cba9015504a1aae6f7597ecec0b5d8b412333b91c35f474139a6a6fc307c48a1963404ed69468b87826e1aa59e927c7f2b4ed9709ac9c684b9a1b21c6aa9a86c1376b79a2bd7f62c45b32afabff027c77827434d775a74cd2427495fef6b94f4bd5c3a35449075752984aaf4c5bca6ec449983deee6ec2542791b85db972f5fa92fbe11a6077e3c56cb12bb46d63b8b22e00381169ef6d", 0xd1}, {&(0x7f0000000b80)="98c5e37326afe115f5026da1f51bcbf5da2b162fb8265db58124454a666baa5518889bad656a5718f0140c30ba1ee02ebccf47001eeded1d72869f2013aac7370d64a3e6f6784474c5786ecfced77e9bf1bc78474d1720c6e733e3798d13a8a58498a1b9f89e88d6a8a7b13530759c420b4846fda568c18f7f4b4d7f7432caa42a429c8f0cb436ee275dcc635af2db369b4c71a16e315f59bbf8c8bc77737319ba88bdb2044e7e7b96cb1ebdf67a91e3e3945e9fed32036c428f97e0a458a4df8467662e8625a391f9ac14b6f322f31d21ffe530d99bce9a2b77c117184c00897b04b2ec50be3e37e9dfb493d25fac44ccb6ba0ee8ef373aa579b121c57477bf390d88c9f5b8141a791c9aef1d07f9d0e498f44c637fd06a08da5c2ab046efa0712fe6664f0d6ad9ba52a5cf8f1fcc4a3cce8d897a8bcc0a9ac8065b0e719b9e5b8c8e6a6cc1f30cc8d6f232248e38d9587214a96f16ddbfa80f4a9a7ff4065e127f44dc73ecfb01565756a0a3f3046414f0e7fd9c85041d062e6160ee468f3fad5e1d4ab6e20b9f7afd1cfce61041958b8050bc5ed84211b8b4df7e12424eba1e6b887e8d8e5264cf76c6dcbacb8bf67781c4eb6246876c59e135624e7110120b92850477b8db05c1463142c79cb222ae441c3fe39858df22bd0c5cf72dc89a19517c2dd16fd0d28794bd4c9f9abb1a2f19972f6b7c0c17a884a87a178b015f613660627afb66efd4d150a74e0a28a1baf9feb0906ddf5867f0760ebc422f4230d303884121dc0a9f4c6bd2a0daca999437ec8d5393a7edb8a8c16723b6b085a7f54182830c86ae25fa3fe9217b22c653c8f0461c9ac12c1d32c5604e278dd09e3be63a59502cd3c115b13fb64aeae08a29affd02d0a17d269ca1bc0b4e481dedaf9d4d68f39df431135e1c7fcf744c0ef45f3b37a4ff7d25191e30a7ae484ef92f664635a24c07892684ad5691de3f7697b2d595ad543a97b2ef54ef6371108f183abd8aeb1c2f140b1666d8ebb41b5b528f2b6c38485b510fc6a6749140dc654ad329f41987803def20664fd36364e68af3ea5e31c88bcb4f5135bf13b476a3edcb9c7de9f7a3e2c6419ff5a96fe4f4bfd64d957e67a87f6cb2f5fff3eaac09212784d534fed9047ba66931b05f51421504dd240fbb07826063831fa064459e47233d4c91cb91cd6c3b93c6d0fb7c3b61032972bb462c27d61b055e983a5cd4db92e5fe31b43a48b721e36847f87168938849ba29bb35ad1e3f6285a5ea5b0f718ffe0a6caa5cd0cb6b30dcd89884ec7a3918d835fe38bc386e6c8d1b6ecfd99d5fcbfc2bb1c854174b42bfdf87a0c10ed8d65d1261f417d3c103a25cf0f0beba7326c191afab91ee539347f4c885007616d6438e09235e756c05ac672a617a789d460d78d8c2586e0badb6b526cb5db5073201362a3f351c6e33a89d8d82d06e098178b1969802922c0c004b092bf768d82ee2055651841829901005bb7a777ac34d06708429efb1ae7991b11598f126600b1d2e14219610d89e97f94a78a2be42d54df5e2439c40ad031edbbb935f35768fb959a9731575e6521fc7305cb39bc47d24d9ab1bfe787e6a0f873af555d28c2253de891c2bbec6de25978a28456c1bc96b97345a8118f1e03c503e7f92fcfee292b25a620491338fe78c5d407a2dfdbc255fe42432fc2290e8b0e2c198c9e47c65be57cefa197799694caf26dba74831278ae5230ac813774d8c3d7a196db875f6630ed64733ab5fe19011b5359ec47fcae0833a36bd91ebd521b43956d9b3d5eb0df6fddc769eb25bfe0420fbc3fc3cd44e3eb465b9cac4c587dc031982449f2fcdeb2e4bf2e61c70725c98443226621aff346a5c9b7e017bc52116cd07a530864fcbd538b657230ad18e7be3c54f5424a4ae5111b7772771fb5e310396a9a0071681ae93ee756c16d2515e812ad1f478b0fc8c3a5714dcfc8fac241c8ae959fc8c822a88b06d7d5dfa3444167d57615652b78e97d228f78e84e8cc3d494a40d8269fb7bbe59c1180a095ddc6b6394a745d4427ce3f25f960e30998a27d5670786c8c0bfa4e018128220db69d2aafe2ad1af99f861bfce0e162bd18b964f1035be2bf93424a2b991d38e74deba96cc3e2a1bfdea2b36487377a15fd306eb79db4c8193f73a52a1f0643f08dd7b5a4b0009dd54a1428b85e92e39fc52ed39a5a4e3643558727bc6c20b5779bbe8da80630df787d1c9e852d1038f75d0f5a0969f1232392e0c9a12b69a6279b8f6a4eb3a85e12244344630ed9319deb30eaf7518b4fe3e36e7feb20c4ff7d2ea00d1822519dae8340bffb76b81ffe49c75959b4f9cf0280a463e725e2b70a239edfd8f0ca80b572db3729ff2f7393256b768874906a744e9f6f71bff1d9fd8b8b801e9735bb693bf768e8bbec3b34f4123d45f2a31dd1599cb59245c19040bd3466fb7b4a23888a8478b8110863186289294d02c03736255e4df922776b8a0285d52d5c9a8f3d41ac332a67e95bb87a49ea8cff753c03c370d5434b1494ba8f2b2e2bdcfc98ed4b3c963512d0e8058957bb310a6e576bcf648cc222aa420a7b6d7705c2e5345a4d1e9b9f0af85d2f910876039f693fb5c0b0c7fd67bd22ee2dfcd3d9d34a745d5a4f72b4764c1de07d74433f39c19f5bee9ae2f7bf0ddd5199af2d26cc9fc903499c3843b0a7a00297b1e5ac47f03dcbf97526db6be915b7427bedbc73b42e395f1b236563eb03ced72a44105e3f9555ee28335b34d1bdee76ebbacbad193ebc85051796e3bb4f0a0122352026adb66afc2a6dd5fe8e3e9ab51fe431bea3a0a90bb1b1918ed46db55c471ec0f708cd4e103af2f6160c3da82ee0e08ba35478c6cef7874488a76038c84ccf1506833947f8264944aa087f397f308235005db963d20396cfa32f1e2d5c0c819ea34889a4e7993e175e35dd9ea2b4069edf2467f7f2eb616ca385685ac3df5e7a60a5a4c89c974935bc43e0aa1b3a7539e540291e5873144e35e1d21f1e9cb3708e9c63b4d1ff7a91bab93daab83319f33fd696ea7016534089a3aca3806c49877502e21f8b7159a464651f3bc1255aebdd2669bae898fb54eca3e172c69d8456ad96d7c01a28bd4ece0a129e5d4178f7b8bd51ba99338c4134656fa81f60e30b57fdfd222a05f1375be2387eab0e3a5872c35b39aabc25e48e1d8c87620f78982b8da5204e6f98d77446de90533c1f0e8a77be3f2a4864f1258a9f6313a568541b0ec8c6663e68473561a4ebc4486a664bc1ed753f610f0431e63c734bbc7674d91e2e13008796db90346fdb62c308fde9c7d0132960525020c24d3f28cc01085e175a8c563fe483e40f0f6bdf980cbb15f0e2e674d0c1b11e18fb5bf405c774af2244ec8e2eb66062c99c624a4cc78f6d2689aef067358c61a3bec601736523629742664efcd976ebcbad2810f8720c6caa5c2f3e2610649dc295b0443828f9541cdb296baf9662120e910e6e9a7758a021f431108cdc339aeceb8f13a081b2b958193f557b2a4b4e11b708574d87afab210147be6249a1dffbe5d02f90bb8148af8f55afd19891cda3d5cf0250cbec4c59c7043c71d5fcc27714b5bb974c7e4d20cdac675da398c2e379154ecd71166e5aca4ecc7dd54c02856ca60efa699113012be9a0ac360d926f81f2922fee341879c83ac4b21925affee9cc238083ff05b615e14e1b57695c5d6a7b1f0857a45dd6dd2984dd846c2a4448d8b7aeae133e4e38db0cbd156cb99d517a8c763bc7d1698516f024fd5a8f80f7f86fcceb6bd8f6cb71482f7f93c13e42617b08114448c98f3551b0697dfb532671076e72d3b11172f8c7875bcca87d6db0ebba710d3a7d3b349c7ffecb44e52eb0ab220b05f504d5c6318a1e97edd797a3c22c94c18950428956a9bbb4effbb43874a1d4fcb18d408cb81806ae07ff37a6f5897b98a7b16a77eeaa258435af159c6d87a77983241ae12cf9bfa407d41572f7338f053c9eda66e0f49fd7fe318b997531d9c8146b7cf453bdb5302e3b0417b44952db546f3bd6a6c691c42b1ff6e3020bc819c1bd9916a95d898d6b8e8e3d09438e0d77c4f5402ab20c7df4fbc07d21885d73b3269d4367ed24bacecf300c202215f9d52bc3773c1cc14653f6119d3702eb14e6007c869e87008e8eff5c5abb77cad533a90af4d29b7f9f560e7e6a2e7c11705ca356e57536334d8c0bbe060a142987c494f7e6c989387ae4a3d961b6b22f21307f6ac96253e06195e04779fd72b1782c7fb2c62d6617803aac9e98172850f658ccb69086301fa67f9d23c430e7ae41a60ebd7eb3c87da3709caf7cde1e83d0b583dbd527840d3893c7bd8436e4e0489a78562b6e092c5a90f264291379e6485d55de2fe10a40eee9b639e3e6fce085e915b23b579d5f942b130b34a86fca9b8be4c4eba83e575f6701eff934cdf8157388c2d6877e5a4c04804449d456c1dc2d44705d9ecd4bce606d100f4b929fcbcd7d7469c13c3926403a753e068ab328fb01156424732a54b6d5e8a3cc2536038dae3a4138b7acb08c77cc7fda3f77d08b498b590f2905dcfdc08a9e7286216e4739ccdbc2f9a35e92d5e476b5b92767d6fc7004a4def5f218351e65d7f17a008ab5965bee60ad70e28dd9b645e8de8a6ff8f0fbf5acfad8bf7c0e19a1286c99c0e8020840f0ad1bfaa50e2b33a3ba5f53180784060f952521de4d9b36502cbe4ef0b87755264f521dc17768a641ead54c703e88b68ca01a3227962755a73a70999fdf35d89dbe2fe99deeae85bbf9921229a16a535d4b679363ba01be2308724df65cb296cec38d0e7d9d5c81db477b3a8d6aeed0472261201af33c7d645bfe7a07aa50513da54900ec078540255ab3374972c826766c686144522a875965089737d8bb2ab5375574acb9eaaf953ff8c027c5e49fc245183e1bb4d5c3694cee948189b50b1ca6f9d7be3eab26d0f9d494e47d33c9e6b4712ec2e10498cab2fd939a73ad21652449e829d35567c2066001073c34e2efee3c703fe7952e10bd11337aecc297754c50e73de73c96b299c93c17cd773f743e3a27b9ac193f5c2b7ef44bffd00d3f8a7ac9fa3f044d65715c3eb8ba1acb3588e533643a75db58ba1754ff376befcd0cdbc6d1c0ad4fa69d933c50306665f8443ecc0d621f9533fd9fa0d0a85533d101bc0443df992041f4bdf628cb8436a3065754cc02d4416123e2f391b8d8f7fda2b354854406b564adb95359378b5b912c8e0039cfed8221aa44c8e984c966860b987c6d78fa9a52f4f1ec5c2280fa81159f5763a6edb8a7aab38082fd4d62f90e4a988265892b8545793205de278357eb0667e8cd893dc59bc652094d3f70020df4aca401e88f4cf3aefea9fe97204bbada1ed1cd9f7b9ec6930f3b4975ec8e9f7bb43cbfc1d4a5e0495abfd3fceb9c51491171db59c2b721e00309f28f71e2d3d00f0b2f61d267c4017a6450a3ae0331a2b0e75f17f6c866fc12d413a97b79a56a720c1b805db9e2291045fa2d18e9a6cb57d4eb61d6bc3f5d7b3e58715613143ee4db3895c24f9251b8a854af64c9f6229a51de16e94c0042aeaea021aa86f62318cc35a8162c366f5232196e649817d4daebac99aef0d44659338f102819c1152cefe754a97bb3bd6e6a54d827b1ed9efc366f361ea2c541e7480fb84ebe0e231df4c027c8ff23e440ea71ce94855a2f648cbee2ee8783c081dd56306529a1ebf26e6e0dae9879d210c5d273b5dc6b6f38fecf8941f5548be5d664284c58a12e87d7bb7d35bb9686bad420e83732a6de966812822a", 0x1000}], 0x3, &(0x7f0000000440)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x20, 0x4000000}, {&(0x7f0000000480)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001d00), 0x0, &(0x7f0000002080)=[@rights={{0x18, 0x1, 0x1, [r0, r0]}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @rights={{0x1c, 0x1, 0x1, [r0, 0xffffffffffffffff, r0]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00}}}, @cred={{0x1c}}], 0x90, 0x4000885}, {&(0x7f0000002140)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000002200)=[{&(0x7f00000021c0)="a5b546f9beea38a0de15e8f71be4b7b903b91e20efba80a255e03f7b0e11cade47ba44b1", 0x24}], 0x1, &(0x7f0000002500)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0x0, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee01}}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}, @rights={{0x14, 0x1, 0x1, [r0]}}], 0x128, 0x4000000}, {&(0x7f0000002640)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000002840)=[{&(0x7f00000026c0)="48967502146733b66d31d8635cb0643ad736653d4ae2743c97d03935929d3ad98021429a8196eda1ff529f25293af8988e168a476572749287e899fda1aada466292a6ea4558c801bb5d26b1930620e5774377e611e63999d8307f810c2555fcfd3997de99fc", 0x66}, {&(0x7f0000002740)="bc92d34a7998dcac5d38322dc6d520bcb7f60179a5cb6da21722e4577423366f3c8dba6bca255c19d0bc5a9261357b537038b61ff8028129c67df7acb4abb84fe8f6ed8dcca65e", 0x47}, {&(0x7f00000027c0)="a47215622169b1fafc6de7828a0e205da3ef8f9531d91a8a419736364867db864fbfd2d05ff1fb928ff42d40b9e3ae866a2193c966afbc9041803e5ea1a5f69fea1aab0b5ac14f7a9fa529127d741d9235614e", 0x53}], 0x3, &(0x7f0000002a00)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, 0xffffffffffffffff, r1, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, r3, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0x0, r4}}}, @rights={{0x28, 0x1, 0x1, [r0, r0, r0, r5, r6, r0]}}, @rights={{0x28, 0x1, 0x1, [r7, r0, r8, r9, r0, r0]}}], 0xd0, 0x800}], 0x4, 0x20000000) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000040)) 03:04:13 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f465", 0x33, 0x400}], 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) [ 1148.312009][T25020] loop5: detected capacity change from 0 to 4 [ 1148.335447][T25020] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 03:04:13 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) syz_open_pts(r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) 03:04:13 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/icmp\x00') preadv(r1, &(0x7f0000000700)=[{&(0x7f00000001c0)=""/214, 0xd6}, {&(0x7f00000002c0)=""/140, 0x8c}, {&(0x7f0000000380)=""/123, 0x7b}, {&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/89, 0x59}, {&(0x7f0000000540)=""/73, 0x49}, {&(0x7f00000005c0)=""/123, 0x7b}, {&(0x7f0000000640)=""/119, 0x77}], 0x8, 0x3, 0x6) [ 1148.390793][T25034] loop4: detected capacity change from 0 to 4 [ 1148.410177][T25034] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 03:04:13 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f00003a6000/0x1000)=nil, 0x1000, 0x200000d, 0x100010, r1, 0x10000000) r2 = socket$netlink(0x10, 0x3, 0xa) sendmsg$NL80211_CMD_DEL_NAN_FUNCTION(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[], 0x40}}, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000040), r2) mmap(&(0x7f00005a0000/0x2000)=nil, 0x2000, 0x300000e, 0x10, r2, 0x7b950000) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000040)) 03:04:13 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ff", 0x37, 0x400}], 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) [ 1148.447339][T25046] loop5: detected capacity change from 0 to 4 [ 1148.460777][T25046] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 03:04:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f465", 0x33, 0x400}], 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) 03:04:13 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) syz_open_pts(r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) 03:04:13 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/icmp\x00') preadv(r1, &(0x7f0000000700)=[{&(0x7f00000001c0)=""/214, 0xd6}, {&(0x7f00000002c0)=""/140, 0x8c}, {&(0x7f0000000380)=""/123, 0x7b}, {&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/89, 0x59}, {&(0x7f0000000540)=""/73, 0x49}, {&(0x7f00000005c0)=""/123, 0x7b}], 0x7, 0x3, 0x6) [ 1148.555846][T25060] loop5: detected capacity change from 0 to 4 03:04:13 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) getresuid(&(0x7f00000000c0), &(0x7f0000000100)=0x0, &(0x7f0000000140)) setresuid(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(0x0, r3) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x40) ptrace$cont(0x1f, r4, 0xfffffffffffffffd, 0xffff) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) getresuid(&(0x7f00000000c0), &(0x7f0000000100)=0x0, &(0x7f0000000140)) setresuid(r5, 0x0, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(0x0, r7) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003580)={&(0x7f0000000840)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000000ac0)=[{&(0x7f00000008c0)="c51fd9151e783d855a20fd7c1cece595f3fdc1f91e0de74b20a3f9", 0x1b}, {&(0x7f0000000900)="babb69c318df824a5e92c4a5c76f0a489d6eccb32dae661e97c2c6b6bb91cd51e35cdb37630d9dc06fdfe0b040ecdb22f0f0c3dd1dd1ebfd1b0cc4401b73bb37f12175d5f61d45387f6f79ff710bc253f08e6d566dffdeec3d4d30044b605b196b658f3d7932e4b13c7fe001d6c3d6b02dd0b827030cb8e564a9490bfb78310c658d1d2bc8374d7fc6ddc60ba09dc2b7857e66ecb95774c4df173070e8c2fc4646a368c278b0c2b783", 0xa9}, {&(0x7f00000009c0)="994d1b25143602720a72c7b6aebf7b137714f3e6d10d8c61941721a9a9eee4902cf441d3999669d9b6b71883b0d85386c65ff3ae17584cdf685959286d", 0x3d}, {&(0x7f0000000a00)="1965fc2dc041a6a9576c121bdf93a2431f47797616326280d0e999d75001e60a89cc563f", 0x24}, {&(0x7f0000000a40)="bce02f36823afe6adb6086f92e0c40cef8d6849206a64f56ad5e7e221b5d404b1646b62541510a4a03b9ec78671525f1e41a56ac4a3fca9d244db00c2ba65e", 0x3f}, {&(0x7f0000000a80)="5de3f2285c170cc9e18c8b5bb99a5b35321ad89dbc71ac2fbef92e88c9a397a49b195962304fe0c205f6f5ee64793e6707", 0x31}, {&(0x7f0000002b80)="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", 0xff}], 0x7, &(0x7f0000003400)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="0000000034000000000000000100000001000000", @ANYRES32=r0, @ANYRES32, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYBLOB="38000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32, @ANYRES32=r0, @ANYBLOB="20000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000001000000", @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=r1, @ANYRES32=r3, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r4, @ANYRES32=r5, @ANYRES32=r7, @ANYBLOB='\x00\x00 m'], 0x180, 0x10}, 0x15) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/206}, {&(0x7f0000000b80)=""/4096}, {&(0x7f0000000080)=""/34}], 0x10000000000000ba, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="e0"]) 03:04:13 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/icmp\x00') preadv(r1, &(0x7f0000000700)=[{&(0x7f00000001c0)=""/214, 0xd6}, {&(0x7f00000002c0)=""/140, 0x8c}, {&(0x7f0000000380)=""/123, 0x7b}, {&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/89, 0x59}, {&(0x7f0000000540)=""/73, 0x49}], 0x6, 0x3, 0x6) 03:04:13 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) syz_open_pts(r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) 03:04:13 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r1, 0x40189429, &(0x7f0000000080)={0x1, 0x3, 0x20}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="be7f5d30987c26224a94a9a57bc9bdacea"]) [ 1148.597741][T25060] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 1148.607881][T25065] loop4: detected capacity change from 0 to 4 [ 1148.630342][T25065] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 03:04:14 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ff", 0x37, 0x400}], 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) 03:04:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ff", 0x37, 0x400}], 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) 03:04:14 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) r1 = syz_open_pts(r0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TCSETSF(r1, 0x5412, 0x0) 03:04:14 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/icmp\x00') preadv(r1, &(0x7f0000000700)=[{&(0x7f00000001c0)=""/214, 0xd6}, {&(0x7f00000002c0)=""/140, 0x8c}, {&(0x7f0000000380)=""/123, 0x7b}, {&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/89, 0x59}], 0x5, 0x3, 0x6) 03:04:14 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) faccessat(r0, &(0x7f0000000080)='./file0\x00', 0x68bf5d07b59fa01e) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000040)) recvmsg(r0, &(0x7f00000001c0)={&(0x7f0000000140)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000280)=""/166, 0xa6}, {&(0x7f0000000340)=""/82, 0x52}, {&(0x7f00000000c0)=""/63, 0x3f}, {&(0x7f00000003c0)=""/107, 0x6b}, {&(0x7f0000000440)=""/199, 0xc7}, {&(0x7f0000000540)=""/166, 0xa6}, {&(0x7f0000000600)=""/85, 0x55}, {&(0x7f0000000680)=""/68, 0x44}], 0x8, &(0x7f0000000780)=""/165, 0xa5}, 0x100) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r1, 0x89f7, &(0x7f00000008c0)={'syztnl1\x00', &(0x7f0000000840)={'sit0\x00', 0x0, 0x4, 0x0, 0x6, 0x0, 0x46e73298bab5b740, @empty, @private2={0xfc, 0x2, '\x00', 0x1}, 0x8000, 0x7, 0x1, 0x1}}) 03:04:14 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) r1 = syz_open_pts(r0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TCSETSF(r1, 0x5412, 0x0) 03:04:14 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/icmp\x00') preadv(r1, &(0x7f0000000700)=[{&(0x7f00000001c0)=""/214, 0xd6}, {&(0x7f00000002c0)=""/140, 0x8c}, {&(0x7f0000000380)=""/123, 0x7b}, {&(0x7f0000000400)=""/190, 0xbe}], 0x4, 0x3, 0x6) [ 1148.757686][T25092] loop5: detected capacity change from 0 to 4 [ 1148.777339][T25096] loop4: detected capacity change from 0 to 4 [ 1148.786007][T25092] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 1148.797100][T25096] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 03:04:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ff", 0x37, 0x400}], 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) 03:04:14 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ff", 0x37, 0x400}], 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) 03:04:14 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) r1 = dup(0xffffffffffffffff) preadv(r1, &(0x7f0000000080)=[{&(0x7f0000000140)=""/130, 0x82}], 0x1, 0x80000001, 0x5) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000040)) 03:04:14 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/icmp\x00') preadv(r1, &(0x7f0000000700)=[{&(0x7f00000001c0)=""/214, 0xd6}, {&(0x7f00000002c0)=""/140, 0x8c}, {&(0x7f0000000380)=""/123, 0x7b}], 0x3, 0x3, 0x6) 03:04:14 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) r1 = syz_open_pts(r0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TCSETSF(r1, 0x5412, 0x0) [ 1148.894638][T25117] loop5: detected capacity change from 0 to 4 03:04:14 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) r1 = syz_open_pts(r0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) 03:04:14 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/icmp\x00') preadv(r1, &(0x7f0000000700)=[{&(0x7f00000001c0)=""/214, 0xd6}, {&(0x7f00000002c0)=""/140, 0x8c}], 0x2, 0x3, 0x6) 03:04:14 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000280)=""/242, 0xf2}, {&(0x7f0000000140)=""/140, 0x8c}], 0x2, 0xd9d, 0x0) write$binfmt_script(r0, &(0x7f0000000380)={'#! ', './file1', [{0x20, 'ext4\x00'}, {0x20, 'ext4\x00'}, {}, {0x20, 'ext4\x00'}, {0x20, 'ext4\x00'}, {0x20, '\x9a'}], 0xa, "f1cf05a723771e7cf989b40e96d5cf7a43260330d06b695396dc3e658124dafecd3e23bdc73dfb340f9ac72fb7621f414f645de56c5ae139300c7991e6de8aaf2ffbb21455fa5cd78bff644de2407a052854d99ba0c332e82f93ff7af27055b95bf56a482ab2237f8f87b600939ed97c3a9876823fafd7d7152dddededb11dd907e56951c549d39e80203da437f6eb3e7eb6f522fb45889026b83c81803585b38da58c709cd307d35e9b568b94bb2fb0ec4abfb4021f80db11ac939d4a17a74bd775664874db1d90848f5bd7fd5deb82028e7021038989ab3e22acd70eeb48ebe2c0b9728c5abeca6ffcb18e2103a4ca855aa9af66a7a74f"}, 0x11e) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="00ca7993e6b6c31ada7fa8456892d2cdd917f23a1dfd0a6a260fce7077371f59e8f1f91e141043678a2c3c8d21af5fa597b5e400"/63]) [ 1148.935541][T25117] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 1148.961589][T25129] loop4: detected capacity change from 0 to 4 03:04:14 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53", 0x39, 0x400}], 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) 03:04:14 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/icmp\x00') preadv(r1, &(0x7f0000000700)=[{&(0x7f00000001c0)=""/214, 0xd6}], 0x1, 0x3, 0x6) [ 1148.993631][T25129] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 03:04:14 executing program 1: socketpair$unix(0x1, 0x4, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$F2FS_IOC_SET_PIN_FILE(r0, 0x4004f50d, &(0x7f0000000140)) r1 = openat(0xffffffffffffffff, &(0x7f0000000b40)='./file0\x00', 0xa4a01, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000040)) setsockopt$IP_VS_SO_SET_ZERO(r1, 0x0, 0x48f, &(0x7f0000000080)={0x87, @loopback, 0x4e20, 0x4, 'fo\x00', 0x10, 0x46, 0x7d}, 0x2c) 03:04:14 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/icmp\x00') preadv(r1, &(0x7f0000000700), 0x0, 0x3, 0x6) 03:04:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ff", 0x37, 0x400}], 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) 03:04:14 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) r1 = syz_open_pts(r0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) [ 1149.081712][T25148] loop5: detected capacity change from 0 to 4 [ 1149.118686][T25148] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 03:04:14 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/icmp\x00') preadv(r1, &(0x7f0000000700), 0x0, 0x3, 0x6) 03:04:14 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53", 0x39, 0x400}], 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) [ 1149.147957][T25164] loop4: detected capacity change from 0 to 4 03:04:14 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) r1 = syz_open_pts(r0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) 03:04:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53", 0x39, 0x400}], 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) [ 1149.192105][T25164] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 03:04:14 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/icmp\x00') preadv(r1, &(0x7f0000000700), 0x0, 0x3, 0x6) 03:04:14 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53", 0x39, 0x400}], 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) [ 1149.253382][T25179] loop5: detected capacity change from 0 to 4 [ 1149.290785][T25179] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 1149.329589][T25187] loop4: detected capacity change from 0 to 4 03:04:14 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/icmp\x00') preadv(r1, &(0x7f0000000700)=[{0x0}], 0x1, 0x3, 0x6) 03:04:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53", 0x39, 0x400}], 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) [ 1149.371232][T25187] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1149.413170][T25197] loop5: detected capacity change from 0 to 4 [ 1149.427481][T25197] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 03:04:14 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/icmp\x00') preadv(r1, &(0x7f0000000700)=[{0x0}], 0x1, 0x3, 0x6) 03:04:14 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a}], 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) [ 1149.475554][T25207] loop4: detected capacity change from 0 to 4 [ 1149.492165][T25207] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 03:04:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53", 0x39, 0x400}], 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) 03:04:14 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/icmp\x00') preadv(r1, &(0x7f0000000700)=[{0x0}], 0x1, 0x3, 0x6) [ 1149.584394][T25215] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 1149.609423][T25221] loop4: detected capacity change from 0 to 4 [ 1149.627253][T25221] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 03:04:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a}], 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) 03:04:15 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a}], 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) 03:04:15 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/icmp\x00') preadv(r1, &(0x7f0000000700)=[{&(0x7f00000001c0)=""/214, 0xd6}], 0x1, 0x0, 0x6) 03:04:15 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/icmp\x00') preadv(r1, &(0x7f0000000700)=[{&(0x7f00000001c0)=""/214, 0xd6}], 0x1, 0x0, 0x0) [ 1149.736338][T25236] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1149.744095][T25235] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 03:04:15 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a}], 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) 03:04:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a}], 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) 03:04:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a}], 0x0, &(0x7f0000000140)={[{@journal_ioprio}]}) [ 1149.903725][T25258] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1149.912673][T25257] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 03:04:15 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 03:04:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 1149.995658][T25270] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 03:04:15 executing program 1: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000680)={&(0x7f00000001c0)={0x2c, r0, 0x10, 0x70bd27, 0x25dfdbfc, {}, [@ETHTOOL_A_RINGS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8004}, 0x8801) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) r1 = open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x88101) r2 = syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), 0xffffffffffffffff) newfstatat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) fchownat(r1, &(0x7f0000000480)='./file0\x00', r3, 0xee01, 0x800) chdir(&(0x7f0000000700)='./file0\x00') sendmsg$MPTCP_PM_CMD_GET_LIMITS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB="c8000000", @ANYRES16=r2, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB='\b\x00\a\x00', @ANYRES32=0x0, @ANYBLOB="14000400fc01000000000000000000000000000124000180060001000a000000060005004e21000008000700", @ANYRES32=0x0, @ANYBLOB="060005004e22000008000300060000003c000180060001000a00000008000700", @ANYRES32=0x0, @ANYBLOB="0800060001000000060005004e2300000500020003000000060005004e20000008000700", @ANYRES32=0x0, @ANYBLOB], 0xc8}, 0x1, 0x0, 0x0, 0x20000000}, 0x44040) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r1, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000580)={0xd8, r2, 0x400, 0x70bd26, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x44, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e20}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}]}, @MPTCP_PM_ATTR_ADDR={0x34, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x1f}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x1}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x6}]}, @MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e24}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @empty}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}]}, @MPTCP_PM_ATTR_ADDR={0xc, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0xc1}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0xd8}, 0x1, 0x0, 0x0, 0x890}, 0x80) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='@']) 03:04:15 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 03:04:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 1150.079090][T25275] loop5: detected capacity change from 0 to 4 [ 1150.090442][T25280] loop4: detected capacity change from 0 to 4 03:04:15 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) mknod$loop(&(0x7f0000000140)='./file0\x00', 0x1000, 0x1) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="16"]) sendto$inet(r0, &(0x7f0000000080)="b279f844c312", 0x6, 0x28040840, &(0x7f00000000c0)={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) 03:04:15 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="18"]) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x44, 0x50b183) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x38}}, 0x10) 03:04:15 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="ddc1824e0c22ac8bb0c259ec929b8b56827df4667a3c3cf58da800758f35436a521851844b3d7e197847f46045519b6f280957302c2a668402abe60dcead45fcc75a2b8ea55fc45fefefa286dd59d6a2a7979d16b5b212ab9c5ca6973f792c9e"]) 03:04:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 1150.233315][T25305] loop5: detected capacity change from 0 to 4 [ 1150.247980][T25307] loop4: detected capacity change from 0 to 4 03:04:15 executing program 1: connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20, 0x7fffffff, @private1, 0x8}, 0x1c) r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) getpeername$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x1c) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = accept4$inet6(r0, &(0x7f0000000180), &(0x7f00000001c0)=0x1c, 0x80000) setsockopt$inet6_IPV6_DSTOPTS(r1, 0x29, 0x3b, &(0x7f0000000280)={0x29, 0x6, '\x00', [@hao={0xc9, 0x10, @local}, @jumbo, @hao={0xc9, 0x10, @private0}, @ra={0x5, 0x2, 0x80}, @enc_lim={0x4, 0x1, 0x3}]}, 0x40) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) sendto$inet6(r1, &(0x7f0000000300)="0d619b69849ee962aa52f744d3c18604777188b6826c5f7538c9aa657de1e23f6dfe3215553ab085e89837f21dafc4a89e6430be2ac6ef18ac589585dd37e204651c92edc861d8a06084f90a36c97eb131c8a95ac1d442c522e44ea58299129519dae565f7587a804644cf15827358bae8940039bc17fc8a91", 0x79, 0x0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, '\x00', 0x2b}, 0x2}, 0x1c) preadv(r0, &(0x7f00000003c0)=[{&(0x7f0000000b80)=""/4096, 0x1000}], 0x1, 0x5, 0x1) r2 = socket(0x1d, 0x80000, 0x9) ioctl$sock_inet_SIOCGIFDSTADDR(r2, 0x8917, &(0x7f00000002c0)={'veth0_to_team\x00', {0x2, 0x0, @private}}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000040)) 03:04:15 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 03:04:15 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000040)) write$binfmt_aout(r0, &(0x7f0000000280)={{0xcc, 0xb, 0x2, 0x300, 0x21b, 0x5, 0x1ce, 0x100}, "648fceffb6db0826d05d2067e2224deae3b711e80aace2bdf321c2243ddfee5f46be9eae290d14606b5d7b27a05537c659e73df8aa6432bd27381841e3e450865040700b2b0712dad4010a5f4832b39270da324280ab47dbd71fb7aec3290103f80ea82f07a6341e2a7b7e2106481758760961f32295ed5c6099479fd8b41fbfd60822c2db5bf52c9ce4d25e965461bff172322f88607e24b26bb29b26db9a9f9001c1efaef7cfef7922", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x7ca) 03:04:15 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="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"]) r2 = socket$netlink(0x10, 0x3, 0xa) sendmsg$NL80211_CMD_DEL_NAN_FUNCTION(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[], 0x40}}, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000040), r2) splice(r2, &(0x7f0000000040)=0x6, r1, &(0x7f0000000080)=0x7fffffff, 0x1, 0x5) 03:04:15 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)) 03:04:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)) 03:04:15 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000040)) [ 1150.397853][T25333] loop4: detected capacity change from 0 to 4 [ 1150.411051][T25337] loop5: detected capacity change from 0 to 4 03:04:15 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x800006, 0x80010, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x3fc}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000000080)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000040)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001640)={0x0, ""/256, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000400)={{}, r2, 0x14, @inherit={0x88, &(0x7f0000001580)=ANY=[@ANYRES16]}, @devid}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r1, 0x50009417, &(0x7f0000000b80)={{r1}, r2, 0x0, @unused=[0x4, 0xfff, 0x7], @subvolid=0xa738}) 03:04:15 executing program 1: r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x40) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$setopts(0x4200, r0, 0x5, 0x1) r1 = syz_mount_image$nfs4(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x1c, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000b80)="37bb62e6167d89fc697684a78e79a62e5af81a392390da0af44ad518fe7d158fbad72ced4cb13c07be25d00f8d161a29afb4af95003c45a8e92f0b2649ad727025341dff0e2bcfba04c6cd17bde4c357fa6bc05eb4fad0e2201ac98bdaa0609622f35aca532f4a69ef838835115d4e99f6d88cd753fe2b26a5bff474f8d7f6a5a1f49c6ecc91028304d8ea62cb2ed2835105bf928b9e588a5009a1328edf32e544df24859b913d9d98ccc6f623a26140325f76f5ca20c3938db1400479a36609a980195140b4a8baf2454ad5b3faf1ae7db02e4b2e2bc283332f8dc38e9cd79d1f458f86ab20d9aa3c4d5cf301569311834e35725716ac79d03775c08aca4f8a2167702808f553f87ba2ada0d3dbb05c800661beb9849731e421c22acff6bb7fd023d54b11be348e6cf86d677a36f3bbacf835a3253bc8167855c743792bb845b8c001127f9ece58565b54c075c2ffcb3390ba937ea9a5fc0bae54f018aece13b936599f9fac82fdb21516e382d65693f3828f00bf38df3f390d2c51bb5f77df96a300d242f05450ec5d15ebe5c01cd6c63ed98c2eae4d7ec71507f6ccc4464a15959d8e01451e07616eafd9a4181bae642ef75f63075bb4602c34e8f545db6f0fe9af74f7819d2c40710f5c43cdcc0e1a1331a96e3688e21fdde3a7386d7a508b7e37cae9b91dee4c5ac399975685b905129b9a5f078bb70eb8ce50bb127e386ae0f76c9fdb253ae75e668ad71a12412fd5a40dd3d1e185d34cf66ab96ac335cd4a71e3536131a49788a4f1753fb22f950821694820daa38db4f91c03bc582cd2afe6aab9b9a6dfe73e3c6beed5c1aeecabae614b1f3b10822a9c1667b54b37879576d01008a50e738f55e269bfdc280cd36f7c2f79b77648872e14609765116b1f70dbb2fb3f9d65091cb967d68927944539010e88993e80f7845f985831420ae33ee8b7fd695144942dc4da8f1c40b6d5f45189d1273e222afa897905af3da2bef84b8eae714b37e961464543dfd1489bc1027222a843eb34e6083439726d03b682fd3b71ba8dbb0940aed60af1cb554a10c26941446df7ee8c5179c93bc9992a97372b9da52383d5aff2f31d53b198e0d5c28d636fb3ec2862e02d3d23bbc14926e4c27c8cd3ca1d21aa65ab1841e6fb96a00e16e464d4254c338e4cdcd174258ecd8922cb16f0eaa7fa7297cddb7a07213dc1663276175cfec6363d60e2155dd3b7579f17b7b22fca70f21812cb3ee8543055a839893036ba25d9243ead4ce21e803b6407236eb6eea84b5452120aa1c396167a12b8f22c4d96e4201b42e79558b99fdde0ef99d5b8fa21982465d2c476bc925cfa75ff98844672a8a3d5760f7593fd0bcfd954380d7c5fd099a3c031bfb7836dedaa59633a1da5bd237575486e04f3c77394a00020ccc8511038acdd42b0ac88ef81a2c2ff0c731c550661f3d911078849a5dca7c7306a94779ff89089fb3f8751054fb8bda438ce8d639b4754cd432a8faf25fb85a5adfa4b3ecff3f3951b4b5eabb1aec45a18dffba4bf1dc6805a2c0430be97bfe3891306e2e410bfeed414d9d9cfbf3a630cf1cf38bc7274c119e7a01ad47de6d5e1487e90b8ba6ba7893824eb03a99a84dbb54edf16b0cba791864cd112d4282f648c54d4b56e4b67a1150794d868d2f265a38025c1f04b7d4fbc5af9f62f973b6ca6ce08ed96f7a3d8daed631936eb1faf6cd0abfb489586c4386b6e04557aee054fd1b0a9e68ba40db4821761824d6e14c5e104c3300c71b3c30b52b3761da2f32ee5b8bbae497c8d8c05f38c255fb925fa931a1ceac6faae16da3416cf87da9c8f5d0bdc554462e22ec76bcfd63041351ad21a5ef0db17a9b0d289eeb1fe03e817a0d6ff5d49c7f0ec6d7be40c03b9df20684ff551f12f07d5d81ab5f15d9b650aaa51efcfe02fc19e9afc1f4ae938adc4dd9f0c7b48ea8c7a385dae7fb12e815fa3671891340125899a8c42365e1412050440d9df9f2d23150bef082554ff2ff4f635dbad51dabd75ea20f75e07b67c415dc8f9443bd5896c2bf87f7f624589327ffb2de32e0de382337156f4f5cd79cc89e465c14e4e42ef92a093e4a7dd38c2380f944f78ea2efec29ba5bf7b531344fc1e92c867c60915d8f1cd4f2b98c267d7eba586c623ebc57bfe7f010c01c20e70cd4e1468e8596e7b9fc9441f8152495f65de93a75956a98bdacc9a15fa833f65d41a51e9426eb1081ba4dd539011cebd924b1da85f85975a2ced29cfa3c00c8d161e6d613c8e64800e7b05d8cc0bef59142c37029db7f6577addb5fdd0b7ba110c44c9e0e7b70b4476a3e67b54cd2464d52f95778771de7f88156b24e9fc0fc33eae6d5f782bb539c087c7db0b0e5e43d334cd74ba7882c1bc9ecd806dde2a98b652a12dab06c2a6a9b8b64291ca822342d9b83310e96345fbb7b9e36f37596a3b6da1a448f4839d07ef3dcad615f85c419fd068d78767da95492d68829286a14fbf60f70a707bcfd470cdeedfdf6718b28cde3008dc11aab059a042903c438c98dcf10316e045bf722d163d78a791175e6445b840c346d195d6b464ceee22f55aae741a6b91c218903046881b4a54f00fbaa6f6f7f7f1c9699df14c6855f2d280c3588e5b2391ea0ea20acbc2d2a6c448c568e9eec994580c33dbbefdc69e0975fff332b1b4922b6d4a648f9a6014c5ed61892cc3167e77144dd428b06ea03ec2c60bad203844676e3a136e0c009de5c29bf8354f6499301ecc8b81ba2c77ad382425fc7b90509d77adfb68e577897c888533d0ef4aa0bec5f3a2efef56a8212fbe21a3bf8a22c0f47b68e864cfdac083cda2a3c9d28f10e03e4d52dcdb193836213efe8ced9257e3bb9e2d977689bb7cfc113ab57f5b9cc63378846a203d3011f7c7b3b97508092930bce5ccc3bc3eb97c0afee69913b6166623e4b64531767d1fb294fb3055e764797d929c90263189aa275e4969535dbd4fab9a9b5f477283d7226dff0ccfe296b9c88a0fcf2ddd78078a7b79219f8f6910ae0c8ed14273135d2d50425c45332151525c10462604e809a74c885b3f6cf7075f5f12dac6e8e03f4bcc9a741f991bf1a165397f2b338ae06e6b33b79370559709b72f198db3032ffd35c3b3e5a7ab23a4578caa858bda7027c3b472e7cb7a2cabcc209f8995c051661b88fa8e1761ac6ef6bd13ba7e51c535a9159d0aaad6609f52e57492196ff12c1acf7e0b4f98a71959613b1fed6d0395f9760fae4ff5b03b0b0bc20f3f0e1e29bc41772604547d75094fed447f09ca2ad79d1dba03c1e3132b1c252ef8ac5b2053f36a361ba65431fafaaea273154d88891b620beb3092e20025233276f1eaa231cfc43927cd8b3e8a7a0377f9ff61072a4910b7803c37fb59c7525cc6b9690aa05cbfe111bd804d27b420e8a1d759156d14892eda09d5b5214b333b80b25c2312dd4a73d09c3e907aa967cad5a3863542c38c3e88370d3e09ba2b51acf6e26ec98fc4a1a2136063cb89d5ddd6786b18ecfe570bf2da87e1a21d2bb3fb8bcda2d877469d5415dfbb452d356577f74a7d29320771a26536d41f645d527d445d7355e2590578e4e9cfab53825954b567277c7f68ae291c2329d485d8e8571192001189c7ac25fdf0192083953e97c542ef1806e235ebf7f66c645ff70e733d2b6de962bfddaf7e29cb78fbf6e6b2c64efeea25827b1659f3a60dd614e7d894544c1476aeb9eea6cebf7976afdfaf72022457b12a60005b450fa8abb83389f1c615c19f5119e0b0f81cc81c84911642c467f1397075f778e064036de59665c089ed109d69709354876852b27265c52bdaba6c7c31a8311f47d92cdaf0da4dadc5f4344f936ed54200984dd9e809c9b3805ee8ea2e530bb2c16cf29ccc49f033a5bc5b49438b2c432de4f2e9432f9c04321a2b33b7b3955c753ece1ff31e45b64216189e51a18d94069b0e9e9091dc5db2c8a60c75ca5a10eda1fec4e0355c83b39dea2f64105a4cc17bb67f0a64c3c83855b48471922751a8bc39c00c2affe82b5d771395f9979866ec2a781a76603972d583876c69b30f1d7cb0ec8d1055a3f369cd6930d213be734d0748f50154dc294dc22425fdaf9ee1dacb3c86eeeecd9bbf66cfd72eb57dd04f5e96f0383c541b9eb2de5a54dac4c42339ed4a7c3e7162175a5c6f8b1c4ca9da5eb20f58acb348130973a855a12537878d75e4e856afce0b8931b65976bc5dd2542f51ead9afb5f03d440613aa0c3d595fa036aec233be21baa7cb3f118bffe92012856d204a4912d1e4781e9502f84e2f2525c4e2f82845f876a7874fd3edf0e836e9c9c1cceb85daa4dcdad89bd2105639f03c87bfcc7c576bae17ddba74b82ad4a2b7aec89c9f9b423b56ebe12e6399e13206ef916a11cdfa22c6a8060deee96e2583224966558f7e85375fce6d855187cb98babdacc8b7dc8ce54e9ddec9cf3346e2c5bdca6fe836185aee37e748d2df314d12e7dc3bd68ad04bfa9fb8025d607a1db430bcb4c64905c326acea34af56a4637668c2050171bc09d3048f3d1f2fd3fc438c704d3cddd786e50ff2b7b1729ae8ec00ff5d8ab82d97fb70e4b0fe3c55935a59d426bdb492b6b4bbcc067e0c62dbdba0c476908e5ee6c4a3280675e3324cf0879aaf5a2b1dc3b8f1ef035606a9ea2daa375ab03a550b731c6b4b00a18aeaf0bcb394c2291ed9a697ad19cad911377687c01fd46e13b11cd8331fe93e43baf0081db46786bfb9c99f266655f71d93eb5385f7e9dfcd689918c5214ddd10cf0a22ab964584aeb7221d45dc0ddd8c6b3965607ef4e01f12cb65697b24e118a7f56d8653d52ca7e7f63b3edd8eb068a366785ab59f4c4673a7afb39dc7dd43f5154b3d90bf481df79ca35cf1c3698a7a06e08e33c75b439d5b8d9914acc9cc059de93d458d6ddb7019f181402aac4029a036f53eb76dafeb44585cfa00a673eec4164ec281afb5dc36dd4aafed842b4361f6193bf594e24734840a2a9c6e459f30f73f7655ebe338aa88c661f3bf6070be539ef50bcab7390f61cc4eb6665f559e76be41cd598ff630aaa3f8c1e589e19abfc73dc678829595046a01491cc3ebe62b78fd64da81bebe5a3192c01fec06edae29d85b33c6d044c9894778da643edd346656dc61fe636b9266f54772a2f2c73268a30cec0bfe8b100e2d12f7a64e3724ea3a22d0baf8ad9e75c0b5141ea067c1e9debf834485a16af469b13167166b0218f6f8daa23154d5134c7ffae33386805d0a8be20ec5feaa92465fe9ecacc46c351db24c92a26bc813ea9c786187c24ab1f5221953290df7bb5073708f05e66ba5de74cfc79e232ba02fd932f486d6a152244c52fab07ceee0a70f68a2df741daadf84fa5808f41fb9ba8141d2bb08f2fd40e812f5b73d3ac5e691c7bca3fc2ea0dbd2e3509c4902197dc1504e4c569dd448f9fbf08b67155ba1351679e33b6ee584f1582f3650610ae80eabf79f8caaa2088cc2c14661e660a776f26cdc8d875e840379f67ec234cde04e22c592e9158e1691316d717fd6dd6796d15d93af7bc72acc2bc5b2953829d806242f1dd5f844bea83682d7d0e0be5efff8ce0ea9847650657e3d0e25c8d04960cfc5526af1f902d6c6423c491af7602a8fc9ee563117a28f3a9931e34387a023ec54261124ea2afed15f5e07d54437ccb42057f4499d8622c90049654cd44900dc13f57d4121442abb426e4dd6c9680c1d270ad21332126d6a4a9754d8dfa3109ae2a8c00251713bc798b3958d3366834d466fa446378aaec4820ea8be7aef92d1f05ddaf2", 0x1000, 0x6}], 0x1002000, &(0x7f0000000140)=ANY=[@ANYBLOB="65787434002c2f5b5e26293a5d2c2c2c252a29d72b6a282c2c40255b292c65787434002c65787434002c726f6f74636f55746578743d00000000000000002c00"]) r2 = openat(r1, &(0x7f0000000b40)='/proc/self/exe\x00', 0x10b000, 0x50) r3 = gettid() ptrace$cont(0x20, r3, 0x0, 0x0) ptrace$setregs(0xf, r3, 0x0, &(0x7f00000004c0)="4b75c8d0d865516573c0488b7a985e9ee59be77c00b87a9e2f2a23be29f21d82f8d13f70a17be32d27cba137ebc7043e5e71a1c962b835aeaef2b6fb5dc5466dd13d0a7b5c767279233e1eda7fc9a42962e42a0430de8759f0ec8bf00f7317e0f980709f424f11c2e7dc54c82d6a877f0b152c7c14d5e5cf402200cb6b2453252a11b03e76b0d6765b0207e9b436556531bba01f") mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="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"]) 03:04:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)) 03:04:15 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="ebc2af04"]) 03:04:15 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)) [ 1150.558868][T25358] loop4: detected capacity change from 0 to 4 [ 1150.571307][T25359] loop5: detected capacity change from 0 to 4 [ 1150.577786][T25358] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1150.587480][T25359] EXT4-fs (loop5): Can't read superblock on 2nd try 03:04:16 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x11) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000280)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r2, 0xd000943d, &(0x7f0000042dc0)={0x7, [{0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {0x0, r5}], 0x9, "effdfbfac8aecb"}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000080)={{r4, 0x40, 0xee0, 0x3, 0x8, 0x1, 0x20, 0x6e, 0x40, 0x7, 0xd38b, 0xc5, 0xe97d, 0x8001, 0xfffffffffffffffa}, 0x10, [0x0, 0x0]}) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000040)) [ 1150.661950][T25377] loop4: detected capacity change from 0 to 4 [ 1150.684483][T25377] EXT4-fs (loop4): Can't read superblock on 2nd try [ 1150.695367][T25381] loop5: detected capacity change from 0 to 4 03:04:16 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)) 03:04:16 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0, 0xb8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000b80)=""/4096, 0x1000}, {&(0x7f0000000040)=""/16, 0x10}], 0x2, 0x2, 0x200000) mmap(&(0x7f00000af000/0x1000)=nil, 0x1000, 0x5, 0x80010, r0, 0xef1a5000) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="ba6ca216afbefb6186e70c180019a24c773e2da95c09e24d0c38"]) [ 1150.710414][T25381] EXT4-fs (loop5): Can't read superblock on 2nd try 03:04:16 executing program 1: signalfd(0xffffffffffffffff, &(0x7f00000000c0)={[0x2]}, 0x8) r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) dup(r0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000080)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000040)) 03:04:16 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)) 03:04:16 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) r1 = accept4(r0, &(0x7f0000000080)=@isdn, &(0x7f0000000140)=0x80, 0x0) r2 = socket$netlink(0x10, 0x3, 0xa) sendmsg$NL80211_CMD_DEL_NAN_FUNCTION(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[], 0x40}}, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000040), r2) ioctl$BTRFS_IOC_SEND(r1, 0x40489426, &(0x7f0000000280)={{r2}, 0x1, &(0x7f0000000180)=[0xffffffff], 0xffff, 0x0, [0x2, 0x5, 0x800, 0x8]}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000040)) [ 1150.782444][T25397] loop5: detected capacity change from 0 to 4 [ 1150.800961][T25397] EXT4-fs (loop5): Can't read superblock on 2nd try [ 1150.813492][T25406] loop4: detected capacity change from 0 to 4 [ 1150.825617][T25406] EXT4-fs (loop4): Can't read superblock on 2nd try 03:04:16 executing program 1: ptrace$getregs(0xe, 0x0, 0x10000, &(0x7f0000000140)=""/190) r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="380000008000ff7f00000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="7e08c2f3bad6fefd4a669183eb06e6e00a3f487a65c21bf686e3fcbbcb93d16717df29b49aa157745799320d109246b7d9c755b35307e6195b847006f6909f54e2b5d6bb33ed81f825911be1890d96e86a2a75049bd7ea5a89ba501c8fd248c64a7304c3d5af4e708f2459e8eaa8b34dda1c57c63fed9a296eb2ab81598c7478d39dc2d1303c7e4760d2"]) 03:04:16 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x187480, 0x1bf) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000040)) r1 = openat(r0, &(0x7f00000000c0)='./file0\x00', 0xc4903, 0x1) readv(r1, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/65, 0x41}, {&(0x7f0000000280)=""/191, 0xbf}, {&(0x7f0000000340)=""/217, 0xd9}, {&(0x7f0000000440)=""/195, 0xc3}, {&(0x7f0000000540)=""/96, 0x60}, {&(0x7f00000001c0)=""/62, 0x3e}, {&(0x7f00000005c0)=""/69, 0x45}, {&(0x7f0000000640)=""/82, 0x52}], 0x8) 03:04:16 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_io_uring_setup(0x15b4, &(0x7f0000000340), &(0x7f0000ee8000/0x4000)=nil, &(0x7f0000eea000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}, 0x0) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000000080)=@IORING_OP_SEND={0x1a, 0x0, 0x0, r0, 0x0, &(0x7f0000000280)="5b7585c334c3d69668b1745d6db63f5dc721415136fa5caedfdb3cebf9864a7b42937468556b9f54968a6dfdc54641db9bd80b653edc031d47e6706c997a67e02f9340daa542e9efc01a410ff33e30c37d7827c46c62c2312542311788835d975d0d0801a9d588896478bb71f273898410564e9d4a2a3d72bd2ca8135855ed042b35e18ba062a4d468a64ccf79588dfd19da1cd28ea5308e0d5876f628a6c186ade78ae6b439c310fe224688d48416e5fc103ee7757dd2482f9866545081c3021fbe2d4f4384c7e1d77da3e7e2dc42f4687887d1e81f277cd9d50405bdad28c066c46444ee2bdf1594800f60aff0ae71", 0xf0, 0x20000040, 0x1, {0x0, r3}}, 0x4) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000040)) 03:04:16 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x9) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="06"]) 03:04:16 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) chown(&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0xee01) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r0, 0x4008941a, &(0x7f0000000140)=0x2) r1 = syz_open_dev$tty1(0xc, 0x4, 0x3) ioctl$PIO_CMAP(r1, 0x4b71, &(0x7f00000000c0)={0x101, 0x8, 0xfaa, 0x6aa612e0, 0x100000000, 0x7}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='S']) 03:04:16 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000040)) ioctl$BTRFS_IOC_FS_INFO(r0, 0x8400941f, &(0x7f0000000280)) 03:04:16 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = accept4(r0, &(0x7f0000000140)=@xdp, &(0x7f00000000c0)=0x80, 0x80800) preadv(r1, &(0x7f0000000280), 0x0, 0xd9f, 0xfff) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000040)) mkdir(&(0x7f0000000080)='./file0\x00', 0x84) 03:04:16 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000080)="95b37be4c330d115b765766a869b3ffd7c9c266cb6b50ffa62e99975fa856a0b8c06a92021eba06ba0e85e10db8ad24afbfad4595520347a43447668c0d39a949f692719c8b0f271a4837731f1d5ae8c9b30c59ff9b07274a12f4193", 0x5c}, {&(0x7f0000000140)="5d77d44f7864fbc8d297d6136ab438f1607adc04cc7df6b5a696dac909b5d76da750ed0f19d1e656376696c6027169316255d297bc2aabd17f744dc392145148a5e7b0573c06d8a55f7ba3deb97597077ca8ee33d645198fdbe72cf640707315e0bef9a482ddaad2def800d63e98f0110e1aca718da8a0cd46921733f6e6ab566828", 0x82}, {&(0x7f0000000280)="174971a473427650daf9f71617e7744978dd0b60b2e399f7f6d300fe59da919ca518aac84f907ae1fa401bba660e33f68d638443", 0x34}, {&(0x7f00000002c0)="d911bed729eae395b2bbcf4fcf29fc4adcb5e2e12deda9837e7ac1be954737cdf4fca84925588eff8130a8d827ff97f86d8cb0cfd3a7a3fdc4aa03c215fe1e49f82fdf5e0c82436901882fa6f94ae50384ccbb0e04a800982d10cef2dba81d4e25818d4178ac4f21cfb25aefcfe08cdd70fb351d81e2658a8a2ab7ea770ac41ff4642e8a0999f7b26d11ccbe5b8f7907759e7ba07533d9676b7af3bb42afd559f4654d3d5e6a8f70194d043bedd2a8b23547c474822cd5", 0xb7}], 0x4, 0x8) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) mmap(&(0x7f00005ba000/0x3000)=nil, 0x3000, 0x4, 0x80010, r0, 0xd87d8000) mmap(&(0x7f0000514000/0x3000)=nil, 0x3000, 0x200000b, 0x8010, 0xffffffffffffffff, 0x24ab1000) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="de"]) 03:04:16 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000140)=""/147, 0x93}, {&(0x7f0000000280)=""/193, 0xc1}], 0x2, 0x7fffffff, 0xfffffffe) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000040)) 03:04:16 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) r1 = signalfd4(r0, &(0x7f0000000080)={[0x8]}, 0x8, 0x0) fsetxattr(r1, &(0x7f00000000c0)=@random={'osx.', '^,!:!@/\x00'}, &(0x7f0000000140)='ext4\x00', 0x5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="01bbc60b7860d971ee2d5480c816a855604c3a208ab5448bfb32b537771a4242e749c8e7f6c22248145572ccbea9fb9f061162cef68709f34b200c65862387c1f57c197a7b7588cf946fdddba8a8b020b7982909e3e45bfd0a36c79b0a5121ba18b03993c4072e29b054d83c76efe6d4321356f59e4495cabcea0a7e533b1d288efb82f611ca12bb26395f97ab1e8441608ad00cce8020d8174a8351cb6643c55319c3400e2c57adb83b6f5bed0f03abd2c89bb1684cb46cc5703cee7cb202fc337aa21c0d2afe75b8dafa9eb650a9"]) creat(&(0x7f0000000040)='./file0\x00', 0xc4) 03:04:16 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) r1 = socket$netlink(0x10, 0x3, 0xa) sendmsg$NL80211_CMD_DEL_NAN_FUNCTION(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[], 0x40}}, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000040), r1) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f00000022c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_REKEY_OFFLOAD(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYBLOB="20005b00e6220000", @ANYRES16=r3, @ANYBLOB="453a00009900ff7f00"/26], 0x20}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_JOIN_MESH(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)={0x16c, r3, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@val={0x8, 0x3, r4}, @val={0xc, 0x99, {0x3, 0xf}}}}, [@chandef_params=[@NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x1c}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x2}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0xf}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xc}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x6}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x2ff}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x3}], @NL80211_ATTR_CONTROL_PORT_OVER_NL80211={0x4}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_MESH_CONFIG={0x2c, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HWMP_MAX_PREQ_RETRIES={0x5, 0x8, 0x5}, @NL80211_MESHCONF_HWMP_PREQ_MIN_INTERVAL={0x6, 0xc, 0x2}, @NL80211_MESHCONF_HWMP_ACTIVE_PATH_TIMEOUT={0x8, 0xb, 0x4}, @NL80211_MESHCONF_HOLDING_TIMEOUT={0x6, 0x3, 0x6c}, @NL80211_MESHCONF_HWMP_ROOT_INTERVAL={0x6, 0x18, 0x3ff}]}, @NL80211_ATTR_TX_RATES={0xc8, 0x5a, 0x0, 0x1, [@NL80211_BAND_2GHZ={0xc4, 0x0, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x1a, 0x1, [0x48, 0xc, 0x12, 0x60, 0x4, 0x1b, 0x30, 0x24, 0x6, 0x36, 0xc, 0x5, 0xb, 0x48, 0x9, 0x60, 0x5, 0x1d, 0x48, 0x5, 0x4, 0x36]}, @NL80211_TXRATE_GI={0x5, 0x4, 0x2}, @NL80211_TXRATE_LEGACY={0x21, 0x1, [0xc, 0x2, 0x24, 0x4c, 0x1b, 0xb, 0xc, 0x2, 0x60, 0x3, 0x48, 0x1b, 0x5, 0x12, 0x18, 0x5, 0x6c, 0x6, 0x9, 0x60, 0x3, 0x2, 0x60, 0x16, 0x1, 0x2, 0x29bf04705c3bed6e, 0x18, 0x48]}, @NL80211_TXRATE_HT={0x39, 0x2, [{0x2, 0x8}, {0x0, 0x6}, {0x5, 0xa}, {0x5, 0x9}, {0x1, 0x5}, {0x2, 0x4}, {0x5, 0x4}, {0x0, 0x6}, {0x1, 0x4}, {0x1, 0x2}, {0x3, 0x9}, {0x5, 0x6}, {0x7, 0x1}, {0x6, 0x1}, {0x0, 0x7}, {0x1, 0x8}, {0x5, 0xa}, {0x1}, {0x0, 0x7}, {0x1, 0x5}, {0x2, 0x6}, {0x2, 0x5}, {0x1, 0x5}, {0x5, 0x9}, {0x4, 0xa}, {0x0, 0x3}, {0x4, 0x6}, {0x0, 0x3}, {0x0, 0x2}, {0x0, 0x7}, {0x3, 0x3}, {0x2, 0x4}, {0x1, 0x9}, {0x2, 0x6}, {0x2, 0x3}, {0x0, 0x3}, {0x6, 0xa}, {0x0, 0x9}, {0x1, 0x3}, {0x1, 0x5}, {0x5, 0x5}, {0x3}, {0x5, 0x1}, {0x0, 0x1}, {0x3, 0x3}, {}, {0x1, 0x9}, {0x0, 0x8}, {0x6, 0x5}, {0x4, 0x6}, {0x3, 0x4}, {0x2, 0x1}, {0x6, 0x2}]}, @NL80211_TXRATE_LEGACY={0x20, 0x1, [0xc, 0x12, 0x18, 0x30, 0x36, 0x5, 0x16, 0x30, 0x1, 0x24, 0xb, 0x1b, 0x6, 0x9, 0x48, 0x60, 0xc, 0x6, 0x30, 0x9, 0x2f, 0x1b, 0x60, 0x6, 0x16, 0x6, 0x60, 0x1b]}, @NL80211_TXRATE_LEGACY={0x9, 0x1, [0x18, 0x5, 0x48, 0xc, 0x48]}, @NL80211_TXRATE_LEGACY={0xf, 0x1, [0x30, 0x24, 0x6, 0xc, 0x6, 0x30, 0x24, 0x4, 0x0, 0x1, 0x2]}]}]}, @NL80211_ATTR_HANDLE_DFS={0x4}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_BEACON_INTERVAL={0x8}]}, 0x16c}, 0x1, 0x0, 0x0, 0x80}, 0x80) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000040)) 03:04:16 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f000089d000/0x4000)=nil, 0x4000, 0x8, 0x8010, r0, 0x74ddb000) mknodat(r0, &(0x7f0000000140)='./file0\x00', 0x80, 0x1f) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) symlinkat(&(0x7f0000000080)='./file0\x00', r1, &(0x7f00000000c0)='./file0\x00') mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000080)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r2, 0x6, 0x15, &(0x7f0000000180)=0x7, 0x4) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10"]) 03:04:16 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000040)) getgroups(0x4, &(0x7f00000001c0)=[r2, r2, r2, r2]) chown(&(0x7f00000000c0)='./file0\x00', r1, r3) 03:04:16 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) socketpair(0x15, 0x1, 0x3, &(0x7f0000000080)={0xffffffffffffffff}) r2 = gettid() ptrace$cont(0x20, r2, 0x0, 0x0) fcntl$setown(r1, 0x8, r2) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000040)) 03:04:16 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xa) sendmsg$NL80211_CMD_DEL_NAN_FUNCTION(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[], 0x40}}, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000040), r1) close_range(r1, r0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000040)) 03:04:16 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) io_setup(0x7, &(0x7f0000000080)=0x0) io_submit(r1, 0x0, &(0x7f00000000c0)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000040)) 03:04:16 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r1, 0x4018f50b, &(0x7f0000000080)={0x0, 0x1, 0x200000}) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2000000, 0x0, &(0x7f0000000200), 0x20840, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"]) io_setup(0x3, &(0x7f00000000c0)=0x0) r4 = socket$netlink(0x10, 0x3, 0xa) sendmsg$NL80211_CMD_DEL_NAN_FUNCTION(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[], 0x40}, 0x1, 0x0, 0x0, 0x240400c0}, 0x0) mmap(&(0x7f0000218000/0x1000)=nil, 0x1000, 0x0, 0x1010, r4, 0x75e42000) bind$netlink(0xffffffffffffffff, &(0x7f0000000280)={0x10, 0x0, 0x25dfdbfb, 0x80000}, 0xc) r5 = socket$netlink(0x10, 0x3, 0xa) sendmsg$NL80211_CMD_DEL_NAN_FUNCTION(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[], 0x40}}, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000040), r5) setsockopt$SO_TIMESTAMP(r5, 0x1, 0x23, &(0x7f0000000940)=0xfffffffd, 0x4) syz_genetlink_get_family_id$wireguard(&(0x7f0000000040), r4) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000980)=ANY=[@ANYRESHEX=r5], 0xfffffecc) io_submit(r3, 0x3, &(0x7f0000001c00)=[&(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x3, r2, &(0x7f00000002c0)="0e34eb257259457a300a0d8a211c909db640009e8e369855abfc83ee4cf01e70b720582c843d46bc580a25c4e3734cb00904a17453a85d3f02ff7a64f29031c561eb8879ad114d32c3f4e62f790f25b703dbad51df6efa3e97be2694c224d1e7ef4b139da9731a788f97117977b6f7bb0c681880472cc4f20c41b7274eea2dc01200bde6974dc6f1a981b3382dca319fa598391c725d5e7e37e594c8", 0x9c, 0xffffffff, 0x0, 0x2, r0}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x6, 0x7ff, 0xffffffffffffffff, &(0x7f0000000b80)="9d6faecf65bdf4df9bd800fcfea12cd4fd46c9c6806e277fd88987c73609e5ee9a6e3232c7287a974d91d3599ff9a284432962f3d2c4f04591da295dc4d2771e6a16a0075df47944c26e6dc380c8e81a944a45c1c0f3d90a4f0b9ad58c700497dd871fa2e2d9de9f382785160b1ad3e2fe02f8ce2cdd315f1c612b8ff8aedfc53067364fdf69210c3782f36fe60f766585a4d2e97d4582d8b8b5bcc589f7e0de184ed59a4d3982bfa2fcce4438981d72f2ec2d77362dfa5dce1994bdc09f2b8a438f4f9d56eaf2b7d5918b282a701acf45edde114480b2c21c2977639163b1bceeecef014f409f54e33c5c7542ef3d39090575461dfadb11778a857e9346de335317d14504e34118e84eee3042863da1927e52d2057b93f6e35739dea7ac9966f9d79560e8d41ce878c0252cb96335f904693190168f33abf31ac825fa9332a91cafab4b431b61a798a962c564ecdbd5bebc439e9e8833862157550194ab6d522c1dcc6dbcc6c79c62601113a3dda5ad333e35a96d1c12d9e05181cfbcec8c8543aba9f159a1ef80b920d0ac42d2cf7bd365525cc238ae9c3c41907d9103a0141cc5a57178b4ddd884b438ab117a15519639a6011f8b803e18ac229328abe4ce7cf68ea2cbdf8a3960cd93f9b051d1f0eb2e17c84b6837257ac977bba23995d2d3219b2ff0b37bf15ada500c25b53599ac39008caac25a18e47a4dd5edf8e6f945721ef68e49bfcd1eb941adcc7d749e4554d4b7dc52a932c26a01275e0db7dc462bb86e4463d9122dc8eb02f93a904db5d46f442ae492427a760aece86f7c75024412f310ea0ccbc27d18203df5ceea060446f0aff382e76962cbcd20f67c78456d8ca95b9368ce5f225454a2c1806b98f5e34ddce4459f26ea28471c89cb3f1b6671fdd2e8b45f6bb3aa20c95e71d0aea69e7bb549e6805be37d947eb9f13991736caf503b7d700aa90410467a1e345e6287656451be2de31e89c51b1511f3d8b5dc88dafd2ab8669ec32daefb8de2d174c4bb7ffd3ea79b8b5d8ca88f160258227df7316d746ea76e395ecb189e1b76a50a1974738b33a616a0da0306934ee781d34ec62c82fd14b3bf866d0a6ad9e672ea552388a78de7b277024df808b82e95f12ba1cf097ec34e922b9779ddfdca253cfceff726f63ba42c7c65abf77e3aa4d5be85c938757ed6eb4ddb26a8867b788b2feeebfc845548fbab661b282101d84a4bd4f00c6b3558920e535e980ff6973f9125ef894b269801fc013b2879422e56cc22f8ccbe604b16e1ab5282d0a84df7888c0593a77a33d8a5b4fc088e805af2e19616f07f2abda8e280598faff6d5110a3884c29fc860ab99bcb4cc4a522bd0432b2bee218ef4322da2c0c245320e5f49a5ecd70a0ae76d7f1a3a81d08d7a651d5c6e7df8c76c379f5f770ae967ab7f4030e009b1b038eccb616b2cbbe11b1682cd524b10e8dec1b15419582a878d82f3d9476b9baa3746e73151d8e6cf7414b535adc2075a7aab27531fe9f4e6465d3d94d9f484483b0934642d4bb01e65542caf6be880d08cb052329b44a3b83a307f81e0e11defccacd945c21feef8996f1978adb91a3e97f5c829dbb96e75d68f279d7d23ced5377ff11c0b3adf3bae0684f5ff01b614119bfa379289dd4db17280b0b43a47356a38ff5027c78515ba40077299d056259253159a82e60e93c64ba1d519fe5ae1f68ac9d8fdd2d51c827e6d9ea15321c21db54d5b3c2065403678ac2871cb140bb63b4eb76e00deaca30b3131594c42bdb50836de8c0b30772cf51b6643efd8db4401b65950b09b5dd45ad07bad51135bb54932457fa08a1d68807ad48c802e2e71a4ddc6660c30e063165cf00400d1396d64f4e2be34aa5b932f94b374555e92b70753b669214117643d8faa08489cf28299d54d0348c155297ec99f3b9e8e977066b458c6e92b248c89f7ac04ddf6d0af5219e3b09b0561e3ef93a1203ba0cdb59a43c03193e803670231f6a7fce61c6862176af908040477abf57b1bf53d5b408e01a62e11c3812270f84ae929b81e21b81425f9ae42fea0ea2ef26f1e269e203dba31c3a4e7e7dd122092e18533b27405de27700cc86c5c14a45d27ec79bac319b68883b6629397029aa4f5302b602297e6a0393fa82ba32b9836c501c676965abc33e61a8b8b690d8c3257c21a968326820fe900a6706fdf93543d4c1a74064e05e711caf2b5edacaca6c2ad0e23619f469e89ac3e3f3fadbc49c70f0ab8a7ed7f2f648fc124c1b18c03306c1ccaca5766cbc05389ec96a46d70b3baf8d4de4dfb407abf29dd6bac4c1ceb4b866d5922bbcdb1f070b9a67f623f179f882d1796836abc976b7a769925416427961b79dded62aa267a2e61a4960bea2b4422259dc744b5a9276a58a45b61639cc6c90c92c19cead1c9feb2a2f1d82b061984cafafdd745e7a6dc6eb963dcab895cbd94e96796eb311abe7605b09db5af5a6a326521e9614f487773e009a35fde008b55be5048126003140618b34fde3d65969821e80e68bf54636caa9e32071b2658caacf53f19f5ad51d70ae3a630b1a410214dff7fe1be1c29efdd7d34a85f0f372953aa4107770b292e9ad51e71d7b9c45fb056b59e6858e24b70df15950acdbfc1decc0b3a9406ee1adc17d0f3094861cc80b0b77b5cb05e4766201ac1c715ad1d11927ae005dc925ee680d99c197af81136e821dae1d0d4cf036f673fe8d9f5920b79429f66f3ffaa0a4c9996c2b94d22cd945783eb3ddf6bf14e9f53871ec7bbfbebcb8d77ff51e822449700f2343730c1eb878515f55587a94ef5b521d7c8d7e3ddae724a488acb015b83174b571257d7aa982ad33581c0a8fb579a9cccc3cd4acf1af26654bf23695c25989c3a411a56647e59d6e22684fe629c78975b874ead47e1bcaabdf44d9a9d0d502dba479684ddb8e301dc8a64f79cc42b64641915ff74708caa2b793e933aa521221ad251e0dc2df76a0ba32bc93eca4f9d38db5c46508ff44693fb0de4a7a4175c80631a7d11b325c51f70fca70f6f930d9fcc884e909ab722cd203edbbb5e67db3b1bfc22f8a445d3bbca3e0b8c4387aa3ddb9758d572cd182110818b4c37764aa180e3113addd2618ab4b0360e7c06b38d84a5899854ab0dd7d384d86102594b5bfd14b63b658ab7546bfd353e2fe3875f8d59eb8f9d78f6ce9cd4eae866953d4eee5e5b4e9a45dec5bf23f042bfaaad66d0ef453954bea501962656b3e682dfbef260958f85c419d0ac647ecabfc25e6646d4dcf34e5023d594c976d68ea3921c25814c848cc863862caeb0764997adeb4e30fd1bc9eafebf53901495527486ce967f37e8d5c0d4229e594737998321ae7090a229ef8efb7e11bbde181d07b534d0fc4454b94f49aaffa6ac16afc03db54a0f10bd2ba9d317f67adf4d3f20371ec11987ce7258d44cbcfdbc0f64bd7713656ea664001c51fce9641329fe1b406f9c8bed0d73da26fb6c8161a1e241430a625eaf1d7571d84fa591c80601864e145904564014b15b6b1f39a4f323c96ef9790ea7311c6a6749b3517d0eda495d7f71c4410d697e49ca9e9f4451284e6e33e1fad79ded0038dd6fc96f8ad98264fb899d839dbd40fc846d8875f5066da1a67aed4c601cfcc46ab9cea816cab2f6959708c064786446785d3e186c8caf7a5af4095efaf7d711ed522d0a338d95eec04325db96459c1f7f80fb8b6b2fef40499ce14f52da3c14944507b56dcf36bd62c9c7f52182c5712203101e7b91b5633c827e432511630c3ef79a43ba67dd7a854bcfedc9a02c865e7bee17a379a3845133c08df75a1d844d8a5037613186d84965454bd45c6a27f428b3a3de799b531bcce2dc7d02ba6d2109502806b93ec1a724e06f62433a91484b4ca0379a0f261b9ca795f0f8377e7ba9faf5035bfe0489f59b074b77f0253188bfddc19585863917c999b3db829f594c2aec7bc872f0ee16f235b56f4e8bed8ea5d8ec908c0fe8a01336d848ca18cf0945e9774e52c99eba3128b1ead4512f68ee0cd7f9511284ee83975ddc6e33e24d47277e01cafe69b94f58f840d59cd0104370c9dd3bfcbfaf885f3055eb9eb6a6d6af72ee0eae32aa3170d416f40dc0f8c4d275302e9d0437a5ba4371a69a05eb79e7ad1e24d188bdcf02d0ee75ea39eca7108d5215c8c8b649ebb6b39eecd9ee90836a18ff721bd06ba863b72f3f22a6d287d1e4523548da076f3a6358e839b007ccc0e52ecf2418103795cc4b646dc8b566d8c6f7f40cb6359d9a0c165188c32a9ae058d12de73523760849cc833b79660a59c0d2126af89c000767c8ed0f969ce9dcdcd5f522c505d70d8e017d0cdaadcccebd0c7d524dc610aa26489e307e56acda72dfa069edf6544a8aa4363709ae390c40bd4b42ac6163451c511e0580e6fde72057d18348309000db2539d282929950cd6ffddf6491ec45f978b30b9a80cd494c4136865d33251c7051700b3e1cccb5e08fb4281ff6918dd1da5fc78fa0db9c2727c4350cf70932a8b71ef74403e5735d997fc5921cc9f9a7ff623c66f6db9e2240d50bee91e03152d21e6cd57afbb25959490efc1fbd83a0cbc3852a5c405708a2b5fe0fcf28f200d47aec49ce825e75496a52a25c3648f9d98a5b080b6fceb5407c40dca4fe3ec79274cc76dbce1384dc2361a7c21bd025cd190d8bb0c73bdf991c77b044705d728ebc16c3397a62782ff1c105a283d9c7fc23865c03b4850d7eb3a233bd2853e4b891e97d1f8e46e998fa3c1182e74c810820e031feb1950b454641deb4adda364183a6c45ea7926da790e84de2e46b827b7e85fc6e0e62c2bd5e14d299465c94846541b0726c5ed65b2ad799930c6ee78820795128931a07a92d6f5a48a87c61220ac7b59c78d4ee3aabb3b8a354e5a0db9a6c3f6c82e63d5b023814ea150acf43cf7380d6c0b8da1e0084944dc2351cf189c54385eceac1078bf4406cf4d377ad8cbc4afcd17085a5a6eca3c91399989ad96665317ca18247d12822a42c24bde31276031999c1e37d093289c85ab1ddb46c625df945e612f6f8f3cc5026d30064efc0e01282ac8e15e1f67e1f7ed4b55ac86d1d90fa6090485309d23c384f252c69eb3cc3db7a7c018b6ad7d158356a354055131700e618167f2f60878a3018044399463b5772681eaf3fdddebb14a323511942ad3a846862ca56ed24ef726d00875833c83dcb6e4010abdae3436da532b5e4975d4cde3d76c517ceeddd96121dc02a288b35d4d753ebdad1bd8ec4cd7f278aadb284982bbfbdf3e448a4300bdaad1cffd9bc4f563b3b66ca01300e82824e6af44d200dfa10a45db8ba6a32878cfcc8e10f3acc797630abebd1f9c5aed6741c5c2598f9974adab3e4adfcbb51b7921e6a4ba4d93a010d6444eb9ed423201f796ddeb7bb02b989f7c46af9ad84fc2042dc58ac9f3f5c05f41389d3c79fc3ea191c206a8a4e4313f1c6a7117ea82f47113ba0ee6fa9fa9af56608853129af8771f7ab9190bbf841680ed50f1fc7df02b730e22a84c23b7827f27c58b0fd3212cf4a0d77370b849660834e3b2da360391553bc0fb3b35a24cff870feb66e9086e45ce74d4b4a21e2436803372826361b320425a4367637b3d69ab5395f9e32fef128d920411a1e94ca8e7e98c5065125ece95545f13fbca80ad5c9b426ac8a5faa8b0d3b7f0db44f0e00105ec493e8c3ffdc60abf76825e83ef1c42851bba8064df0752a4276a6e58bf4934d5be8b89e2ab9d4f9863342fd935638939d97ec23d28aec32e2353d3a224e59f66d18f3949f", 0x1000, 0x3, 0x0, 0x3}, &(0x7f0000001bc0)={0x0, 0x0, 0x0, 0x6, 0x1, r0, &(0x7f0000001b80)="ee90ef30f530b7bad941a9198295ac43b84171b77b", 0x15, 0x5, 0x0, 0x3}]) openat$null(0xffffffffffffff9c, &(0x7f0000000600), 0x202, 0x0) io_submit(r3, 0x6, &(0x7f0000000900)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x2, 0x80, r5, &(0x7f0000000140)="c89244a3587bb3e1e246feca7854e0529e1918c86e042ba5286aefd79f5e2c731793ad3398a21eb3dbf28c0f2dec9de5681fdb5238425d0a77528ff74f26fdf65a33e8f243ce5e5215aeb690cff0423048fdf14d288905f8d73ea4eae36bf93201b2728564ae4bff62daf95a395d41df722e0e1dd51008d34760de373cbd071a7373b996d0599fccbfccd1380ff2476191b0da61ead1ce", 0x97, 0x200, 0x0, 0x3}, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x2, 0x3, 0xffffffffffffffff, &(0x7f0000000400)="7552c96bf7455d5683e451173a6f784a5b3ccf98b4c057018bcd999f0edc3b2e031d15d27f5c110bb05f7e132cddc1cdb011e5a63f55ca976930bf6de748ef6c9b0393b3014f65637f2d1390c6d52ee2bed0b1e0c02c89c0a619a759a6a8b5c3e4fb0024c92c621ffaff833a997d846ff4769295b630370c10159aeadc78f8afde535d71b8f896afd1e3cfa4cf976b7e4da5122ab5ffcb8b442e6b44efc6af8f78853be59fc6be36c8695ee6f09c9e7a5c876b0a199e667c013d5749", 0xbc, 0x3f, 0x0, 0x3, r0}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x2, 0x7, 0xffffffffffffffff, &(0x7f0000000500)="a661c2d9c98ac3e2b2a4402b1fda2d012fae696ae937d6789633a6ad2740075cdfb5128cf8c9c7ebed4e125bbb0a6199583060d22d1760656b780a37cc5ab3d2c7945b6d65baef3fd7b1d648981ffb4ee9a59cf702fae9f498ac9d98a61048eb7c178a337e3a5613fd1c5c1b699eb0b7f7e84c308d0dded56ba95bb534316abe1e726a6c40a885efa938e12db58ed032015b6039efff70f95d9fc28b089981bed0dc19ac33f516cc19396499e736c3b64e4e460c95bcca3f19ccffc9ea3f89729aa118c4b6000dda83d62b0df892e02fe56a49d4254320d0048fd601aac1764effce6e0096b146827c", 0xe9, 0x80000000000000, 0x0, 0x2}, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x3, 0x2, r1, &(0x7f0000000680)="0f15f66b7c26f681287cb2efc3ddcd1d7520822159e7347e7d1270371da3b171334ddbe12f00774bb70844cfbbe97901dad38de5a3533cde1721539099cbeeaa60c958c1cfdebb87537a468c5e273588ddfd90fedec99ad8def07a22ef2daa86", 0x60, 0x6, 0x0, 0x2, r0}, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x4, 0x7ff, r1, &(0x7f0000000740)="67641031e4439c25d63a01815405823956694f9dab7015eadecfdfa22daba90f3a525bcda1855d19b5342a7ee0d1dc8de03daf97acf41f43a30b9e0c5a719e3709e4b6ffa60ca7c7e06c5941405bc9ef0f8c17b35125c0ef24032c3fa93a58f1ecff64ae89969f8a74dead8f07390808259f40b1d9247627079c07779baf5621b664c6f43e39614c6c407053d87ddf5ad7851f19a0c51f0a7f08966a25206460e99527408ef94f853486", 0xaa, 0x7, 0x0, 0x3, r0}, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x6, 0x6, r1, &(0x7f0000000840)="c8eade113984a5397748aa83c25ac1e6765da8f6dde52eb36234ceb241987d5d0b4cd16501ad3b5707958ca178ba6b2f94f79caa222294a0a3277eee43b01e99af23f2971ceaf2b63a313fb6802ab84e", 0x50, 0xc92d, 0x0, 0x7}]) 03:04:16 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="ff"]) 03:04:16 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000663000/0x4000)=nil, 0x4000, 0x1800003, 0x40010, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f46509000000ff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="a571e3218903f82f40ff"]) r1 = socket$netlink(0x10, 0x3, 0xa) sendmsg$NL80211_CMD_DEL_NAN_FUNCTION(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[], 0x40}}, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000040), r1) mmap(&(0x7f0000145000/0x2000)=nil, 0x2000, 0x800005, 0x11, r1, 0x7fd14000) 03:04:16 executing program 1: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="00acaeeea6e24845a65d2424d0125c7cfc8f91245a2d1da9ba0688d1856ffb486a4d21f4c61dfbce481b536cd76957d1d2e4a94cdb6a5bc7fabcc590e1ba16656e7ddabeabf398cb159dc40fdf047b9aa36ba9"]) 03:04:16 executing program 1: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_STOP_P2P_DEVICE(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r0, 0x300, 0x70bd2a, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r1}, @void}}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x240c4814}, 0x40801) r2 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="d00beffc7827926afd461858a929d033a9ff797e8a50c34d8baa"]) 03:04:16 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) r1 = accept$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) r2 = socket$netlink(0x10, 0x3, 0xa) sendmsg$NL80211_CMD_DEL_NAN_FUNCTION(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[], 0x40}}, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000040), r2) recvmmsg(r2, &(0x7f000000ee00)=[{{&(0x7f0000009980)=@isdn, 0x80, &(0x7f0000009c40)=[{&(0x7f0000009a00)=""/229, 0xe5}, {&(0x7f0000001a40)=""/45, 0x2d}, {&(0x7f0000005c40)=""/23, 0x17}, {&(0x7f0000009700)=""/56, 0x38}, {&(0x7f0000009b00)=""/53, 0x35}, {&(0x7f0000009b40)=""/230, 0xe6}], 0x6, &(0x7f0000009cc0)=""/4096, 0x1000}, 0x9}, {{&(0x7f000000acc0)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x80, &(0x7f000000bd40)=[{&(0x7f000000ad40)=""/4096, 0x1000}], 0x1, &(0x7f000000bd80)}, 0xc741}, {{&(0x7f000000bdc0)=@ieee802154, 0x80, &(0x7f000000e200)=[{&(0x7f000000be40)=""/4096, 0x1000}, {&(0x7f000000ce40)=""/4096, 0x1000}, {&(0x7f000000de40)=""/219, 0xdb}, {&(0x7f000000df40)=""/73, 0x49}, {&(0x7f000000dfc0)=""/98, 0x62}, {&(0x7f000000e040)=""/31, 0x1f}, {&(0x7f000000e080)=""/74, 0x4a}, {&(0x7f000000e100)=""/232, 0xe8}], 0x8}, 0x6}, {{&(0x7f000000e280)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f000000e480)=[{&(0x7f000000e300)=""/199, 0xc7}, {&(0x7f000000e400)=""/91, 0x5b}], 0x2, &(0x7f000000e4c0)=""/235, 0xeb}, 0x9}, {{0x0, 0x0, &(0x7f000000e840)=[{&(0x7f000000e5c0)=""/180, 0xb4}, {&(0x7f000000e680)=""/142, 0x8e}, {&(0x7f000000e740)=""/213, 0xd5}], 0x3, &(0x7f000000e880)=""/198, 0xc6}, 0x8}, {{&(0x7f000000e980)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, 0x80, &(0x7f000000ea40)=[{&(0x7f000000ea00)=""/34, 0x22}], 0x1, &(0x7f000000ea80)=""/110, 0x6e}, 0x3}, {{&(0x7f000000eb00)=@nfc, 0x80, &(0x7f000000ecc0)=[{&(0x7f000000eb80)=""/221, 0xdd}, {&(0x7f000000ec80)=""/29, 0x1d}], 0x2, &(0x7f000000ed00)=""/251, 0xfb}, 0x7}], 0x7, 0x0, &(0x7f000000efc0)={0x0, 0x989680}) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x89f7, &(0x7f00000001c0)={'sit0\x00', &(0x7f0000000540)={'syztnl1\x00', 0x0, 0x29, 0x14, 0x5, 0x7, 0x55, @empty, @private0, 0x7, 0x1, 0x1, 0x4}}) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) r6 = socket(0x11, 0x800000003, 0x0) bind(r6, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r6, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) sendmsg$ETHTOOL_MSG_FEATURES_SET(r4, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000040)={0x28, r5, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_WANTED={0x8, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x4, 0x2}]}, @ETHTOOL_A_FEATURES_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}]}]}, 0x28}}, 0x0) sendmmsg$inet(r1, &(0x7f00000018c0)=[{{&(0x7f0000000140)={0x2, 0x4e22, @multicast1}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)="27ac2a71e81ef1cf85d75aafcc8d812b0c5036dae85bc2df239ba98842ecf82eaeabdaa6717f0a90f41d61f0304a715d5c972606f46d213a5540e6bc7a5817343206c98f1d6da96d0fc2d2e601b2c4bdd1c170d2f839cdc289254bd4807a91a2662edbcdfea351d163707bf1654d0a52ff98413a0e2c4a4e1a6e6d9c2547d48e6afdf385a3b3248f39574e6999627ffbf29e17f58a44883b47a963944210a16217c09d906e92270c8f05ac29baf3d9d78ff3aa5dd6d61d186be8410ffb1ba689c7608cdb68a98d0fa4227527a810615b90c3efeee501928b9f39298ce1fdd9006a4e0ce93d", 0xe5}, {&(0x7f0000000380)="2aab8947284a8d2b773fded0ed2460e531d4bb105e1109246c33d3197fb6f845997c8b92b18e769174b9d0859e05c8abd60da9df1fc7d6ec792d44fdf7e42a0afa760781f299becb1258f8b611cc46044cb9ae43aa47afdfdb3755d1fa8d3836d8194fc5c1f5f3bb9fdbd1b6226461392225c693dabadc5572f3168d0167895b63047c4e2a508601f7fdd1f88c3d1f6a2a0c994b0b31a6b1ad2f626483d0d644422ff87bd933b77bddd329698684c5151cd04ea06fb3bb1408cf502b29a1391a60", 0xc1}, {&(0x7f0000000480)="687c431be1a11061ddfa132035fba9878c0e4571808e437587270a28c02acbeb438bce644db3d1ea460d2344c325763789fbd587fde8e82029ba6318b9300ee6f21b621fd3e36aa8aedcdd9d8c07246a3e89b8e14f40dc9c252c5ec0da73f90c4cf2477f307a134d35eacfbe7cfd1a21a9f4dacc56a7a147dbbe42b5861ccc6e3af9198a94afda37", 0x88}], 0x3, &(0x7f00000005c0)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x6}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @loopback, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @dev={0xac, 0x14, 0x14, 0x27}, @initdev={0xac, 0x1e, 0x6, 0x0}}}}, @ip_retopts={{0xc0, 0x0, 0x7, {[@timestamp={0x44, 0x2c, 0x78, 0x0, 0x2, [0x20, 0x7, 0x100, 0x1, 0x6, 0x0, 0x6ae, 0x12f18ba6, 0x1f, 0x6]}, @rr={0x7, 0x7, 0x4, [@dev={0xac, 0x14, 0x14, 0x38}]}, @timestamp_prespec={0x44, 0x24, 0x27, 0x3, 0x0, [{@empty, 0x1}, {@local, 0x800}, {@multicast1}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x6}]}, @timestamp_prespec={0x44, 0xc, 0x87, 0x3, 0xa, [{@broadcast, 0x3}]}, @timestamp_prespec={0x44, 0x4c, 0x7a, 0x3, 0x8, [{@loopback, 0x9}, {@multicast2, 0x9}, {@dev={0xac, 0x14, 0x14, 0x27}, 0xa3a}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0xffffffff}, {@empty, 0x613}, {@broadcast, 0x8}, {@empty, 0x6}, {@loopback}, {@local, 0x6cc6}]}]}}}, @ip_retopts={{0x74, 0x0, 0x7, {[@generic={0x89, 0x9, "ac07c5535c85aa"}, @lsrr={0x83, 0x13, 0xa1, [@remote, @broadcast, @remote, @local]}, @end, @timestamp_addr={0x44, 0x44, 0xed, 0x1, 0x0, [{@multicast2, 0x400}, {@remote, 0x6}, {@dev={0xac, 0x14, 0x14, 0x38}, 0x933e68c}, {@dev={0xac, 0x14, 0x14, 0x12}}, {@local, 0x20}, {@multicast1, 0x4}, {@rand_addr=0x64010101, 0x400}, {@private=0xa010102, 0x4b}]}, @noop]}}}, @ip_retopts={{0x2c, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x1c, 0xf1, 0x3, 0x0, [{@broadcast, 0x1}, {@dev={0xac, 0x14, 0x14, 0x24}, 0x81}, {@private=0xa010101, 0x2}]}]}}}], 0x1c0}}, {{&(0x7f0000000780)={0x2, 0x4e20, @empty}, 0x10, &(0x7f00000008c0)=[{&(0x7f00000007c0)="64b87d4afd602de7de141af559c481a50eef7ae59d3d493b5a5f264ad55feb023df675802aa801524527c12896ee7382dd0ff021be6351d57177b3270e68595abe98d25050d3800bc816415eeb60197921b70e6128c9ad9b777dfe56ae0443e213d2110d3199df1f7a90d031a3edf0172e8b4eeaef67f89b48d5547a340033bda9e94a5e2c921b38208281f49274ce7f91e1a9c4f9f12da39be141027e908cd5149e70d180f0ea3859a7e438053233e2f37839c0a6fd78610c023a09a828ebe3f91b8affd7809ec687cf565a96544fe792a4a06a10f74ea30232ba643add9a2fb90afb2445082678a3cf2867c2b7b5", 0xef}], 0x1, &(0x7f0000000900)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x6f}}, @ip_retopts={{0x4c, 0x0, 0x7, {[@timestamp={0x44, 0xc, 0x6c, 0x0, 0x1, [0x0, 0xd31]}, @lsrr={0x83, 0xb, 0xf4, [@remote, @local]}, @timestamp_addr={0x44, 0x24, 0x2e, 0x1, 0x5, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x7f}, {@private=0xa010102, 0x8001}, {@multicast2, 0x9}, {@multicast1, 0x4}]}, @end]}}}], 0x68}}, {{&(0x7f0000000980)={0x2, 0x4e24, @remote}, 0x10, &(0x7f0000000ac0)=[{&(0x7f00000009c0)="a5a70fa7a0a96967e4ec92b64c21fcccce58e91334ecc48b9b364f2e193113cd033639be4663d2d22cefc5494f72ff6eea2d350755512806d8d138ba2f85d9a904cc11e870d0ef6a453c949a68fbf67cb95afe34f829764234bc1662df7edd71954f4028c9fc16bd3224028a14d0864dfc19944ab1cc4f9a139c5d5bffcbed8c880d06f892dc5a892670913d44b4ba1da989dfa68c82272a17d4b56730a337ff693d8ee0eec6061ac6e0a66403122defd515fd572ae68f5f985c854bdbcd7b093babaaeb02025e9014a50a533573e37ff768f555747533a78474fb", 0xdb}, {&(0x7f0000000b80)="4b3f771ff6f63d8b6b3863deb75f9fc9f1fd4399af8dd534afafc70be38a7ab56e674b5eb73647a67cd81bb64c7e5b9fbc9f24e1016fcdea7fc853e72a892ccc4ba5ce219e11d55d82b3ff1e135f1e3af0771fd9a7b1726e723b2b87ad5d1c9fc2d3eff6f54c49b43d892052f2f0c891aea2569f438ee6c67ef3ae285066ac752d8f5bd8d48f0429cd64334beba1b1c96e44693098157c433017f1efcdebd573fd1868343916cba65ec469922d3f04c3c4dfba2ba8e83a945aea15fb8430ad1535aa07e2e2878bc5875a5ef9c72da1f0493578ca4a901af86f2e06aad9c2ef03e9ad8e9b9cccad857de4", 0xea}, {&(0x7f0000000c80)="29eb45de7258deaddda6663d3b2a435e154e5ab9eba56f0cc57edb37ea5d542d5ddbf7b5bc77cf6716ce8a179b80acf1f63bbb4f0fdb3178d45f472983523bce42e0aa73ae0c42eeb2ce56c4c918ac3b18c4517c1dd6e0fe4ef5b6676076aa7aad152996e498b16294e044f12c9cf779920826fe4e3a0b1c44a5de098ebafd8419cf23be39ab1022a76f5c4e4ec7af32ac0f2a6c544a6646e437502e62df41de9d88a942fbe845ec087bc9b5699a837a04d3c497717aa3efdf794f165d06b6391d5dd4e2e8459e3c8f68f4ad3795a14c5dc5de6cc8abcb1319b829ffa027aa96ec2ba391ee040516dab10208bb1674", 0xef}], 0x3, &(0x7f0000000d80)=[@ip_retopts={{0x7c, 0x0, 0x7, {[@ra={0x94, 0x4, 0x1}, @timestamp={0x44, 0x18, 0x99, 0x0, 0xb, [0x1, 0x8, 0x0, 0x3, 0x2]}, @timestamp_prespec={0x44, 0xc, 0xe6, 0x3, 0x5, [{@local, 0x7fffffff}]}, @rr={0x7, 0x27, 0x9c, [@initdev={0xac, 0x1e, 0x1, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1, @private=0xa010102, @remote, @broadcast, @rand_addr=0x64010101, @multicast1, @empty]}, @timestamp_addr={0x44, 0x14, 0xc5, 0x1, 0x8, [{@multicast2}, {@multicast1, 0x4}]}, @end, @noop, @ra={0x94, 0x4}]}}}], 0x80}}, {{&(0x7f0000000b00)={0x2, 0x4e20, @multicast1}, 0x10, &(0x7f0000000f40)=[{&(0x7f0000000e00)="466a4eeb356904142e8d4cccca91364cd613cfb718814909ca0b69d34f111d8756c166fd7cb487aee2983ec43cb64a2154624deb8b42e5b41456bd20a8d1de3bea8544a67dce89879115ef7381c368ef59fadf361dadc8771142625833edc6d9941a", 0x62}, {&(0x7f0000000e80)="3b0702160d7019c2cb0f1dce6f57be48a79120f30a61918eb91a0139b1f4f8c18922ae4be0b2b8b88c91294711d413ea055f30ec2eb8ffb47e45570ca25ece006447863f5c4e49486fe84496ca4e4b03ab8855ea00f9f21638c0c1a5362838d35442d00072ef", 0x66}, {&(0x7f0000000f00)="8e0794d457f268111ccc384e", 0xc}], 0x3}}, {{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000000f80)="b44efa13ba4003cf307d4d1ddfdd6ba5762a37e7fe01fc4a91d4ac09ff7260bef739a2d8e00c68e067a842ec974c861414c112b44e163f2cf2dfc8eaa072349acbc937188f2bc4b7e03400b8e7c27f1b3705582a19ab0141eabf3d1276c26766fa415679463f6acde3797b5a53e101e259e292f4457dbc34a1405bc8cb2aaed3914a0d99fdefa71499eca5541c32b3e210", 0x91}, {&(0x7f0000001040)="01bf8106ead2078b3d6efffc47bf6d1c4f5eca3e51df4479d4575691a2a5a12f572b6f0c10be1f816358a542ff3bd3b311b0f51d17d24aeeb9845b31bda4668a17d9a42debdbaf28cd28db5723fb04ed55b3bd437e764ad8de5ba60e3e3347c853601dbff54cc1544f6b65474ed5475614cd9d6f025742a808fbfa2bd85a5449d2ccfc60cf43756b17e58cc2824acf16622513f253fa7fd12ed7fb0279e7e064b9b89212f0c45cf2454e7b77c941a8eb237115b0b89aaf3c716da8a75df42723ed01804a4f419c0ebc766a1e3b8383ad356d021a9de4e37ef95f5a59df4fcf2613e4c7689d210386", 0xe8}, {&(0x7f0000001140)="6b314417fcf959ab4a806d0aedfe1701c2a248638fe307b9b27e6d3bb671a38874480d606d6fb0a2", 0x28}], 0x3}}, {{&(0x7f00000011c0)={0x2, 0x4e20, @empty}, 0x10, &(0x7f00000016c0)=[{&(0x7f0000001200)="fb728716580f41dcd548236fb9dfbc85fb843fe3ea52b19f223658817c89c2387f", 0x21}, {&(0x7f0000001240)="b5921976363c0aa29219efb19e059e7b38eaf64aaee144ac7e76a7c7a50f0403f2df95580336f5d1eb02abfd72ae044ee679b3771b61bf", 0x37}, {&(0x7f0000001280)="bacc27020bc1ed5f079c8aa75bb991590c58ae198ce4535b7b5710ce4d7a9eb70f13eb4610b892ef7c312ab2ba34a689b80502de9369804de350cfbca9b908f0aa647bfe2e", 0x45}, {&(0x7f0000001300)="fe5df658", 0x4}, {&(0x7f0000001340)="f0d0b0c89c5e7ceb271ce048736a81af31b893ef49ede2f15a1e52938128b0337cc42f11e00d9ad279ca3d2d43f9651238869e294957ab5f33b1cc8cd960f3baa7bf9ae67f252379f0bec07aa038791970f18dd982c084803dc5bda3a0ac90f06bd2569a", 0x64}, {&(0x7f00000013c0)="f759f29abe673c68ed75135ec5574c0b0d992643ea2fd05570239e5b2425c4216968752a5aef250c61131fda83a690dbe937e73e091cfd940a49b4f9a7e988d85a497037fea4664cfc5b0ebbbc912f68a68cbbb2b2ef15d1feab62d29e71f0c5464991c540f03273923587f7345e415a0d2eb29f5315bba32e5cfb8d89361eef1339feba65727a0e94c448ae51c433e3d5e59431251712be87a560acbbbda636211b2fd7b84ba1daae6051a0f43d08766178e99e2b1889cda6c2240c8e6e1b1bbaec5c983973e5e168c68fb4f36ed253e94ef0947ed52f1dd727", 0xda}, {&(0x7f00000014c0)="d985c81807db0fc1b3fc4ef53bf20edb838ee19ae40ffa43fe4e6de71b8b8e71bd00bae4db97a40c72c7c074b7d46f779efdbf9020c523dfd5", 0x39}, {&(0x7f0000001500)="99c093cbd0444b220f5bc88c4ebfb35c2ad61cc95fdb36c4f2ddbd38bb5d94bc042d64889164673aac99307154cdff987c6aaf6b2effe1e89c25468021141f2bb9e0093ffc751abb582cdde90a71915bc0e3e242a3a9a55760c0c7024b93c48c82e625fcd2d979440479618097c13919d524a09d8e3911cea99101f15a44661040c1ba5c56131a5c885cb093e565c803427187aec77f949629b7b97f14043234bab900b981225cd1ddd0fa6d79932885b6d60f529f26ad0b361e874af4a88c6a21cb", 0xc2}, {&(0x7f0000001600)="d752a0cd9ec050288f370d818c643d68ffa6cc1665d267c994613ec5ecbbab3a007a09b6c4586dad7ffd9f9faf7ad85fa0f214022d2b263522fa3c39e6e54f8439d0385b5df367d93b756e4838e9dc237ba37ed4dbe7a1ec417a5b1bc4bc9cee82542783b2585e70357705ad9107e74816e5a5006a3dd11de5be6b6bd304273808f73bdb37e3ad", 0x87}], 0x9, &(0x7f0000001780)=[@ip_retopts={{0xb0, 0x0, 0x7, {[@timestamp_addr={0x44, 0x54, 0xbc, 0x1, 0x2, [{@empty, 0xa2}, {@local, 0x6}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x3ff}, {@loopback, 0x3}, {@dev={0xac, 0x14, 0x14, 0xc}, 0x1000}, {@local}, {@local, 0x1}, {@loopback, 0x800}, {@rand_addr=0x64010101, 0x8}, {@rand_addr=0x64010100, 0x4}]}, @generic={0x86, 0xe, "446045708e3ae609f183fac4"}, @timestamp={0x44, 0x8, 0xb4, 0x0, 0x2, [0x62]}, @lsrr={0x83, 0xb, 0xf5, [@loopback, @dev={0xac, 0x14, 0x14, 0x26}]}, @rr={0x7, 0xf, 0x11, [@dev={0xac, 0x14, 0x14, 0x40}, @empty, @initdev={0xac, 0x1e, 0x81, 0x0}]}, @rr={0x7, 0x7, 0xc, [@multicast2]}, @generic={0x1, 0x12, "9a9e3b36b54e2a9f402ad01d38367df6"}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r7, @remote, @remote}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x80000000}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x3f}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x9}}], 0x118}}], 0x6, 0x60010) recvmmsg(0xffffffffffffffff, &(0x7f0000009740)=[{{0x0, 0x0, &(0x7f0000001a40)}, 0x7}, {{&(0x7f0000001a80)=@alg, 0x80, &(0x7f0000003040)=[{&(0x7f0000001b00)=""/127, 0x7f}, {&(0x7f0000001b80)=""/4096, 0x1000}, {&(0x7f0000002b80)=""/108, 0x6c}, {&(0x7f0000002c00)=""/231, 0xe7}, {&(0x7f0000002d00)=""/208, 0xd0}, {&(0x7f0000002e00)=""/251, 0xfb}, {&(0x7f0000002f00)=""/161, 0xa1}, {&(0x7f0000002fc0)=""/118, 0x76}], 0x8, &(0x7f00000030c0)=""/140, 0x8c}, 0x4}, {{&(0x7f0000003180)=@x25={0x9, @remote}, 0x80, &(0x7f00000043c0)=[{&(0x7f0000003200)=""/176, 0xb0}, {&(0x7f00000032c0)=""/76, 0x4c}, {&(0x7f0000003340)=""/115, 0x73}, {&(0x7f00000033c0)=""/4096, 0x1000}], 0x4, &(0x7f0000004400)=""/4096, 0x1000}, 0x200}, {{&(0x7f0000005400)=@x25, 0x80, &(0x7f0000005640)=[{&(0x7f0000005480)=""/200, 0xc8}, {&(0x7f0000005580)=""/164, 0xa4}], 0x2, &(0x7f0000005680)=""/202, 0xca}, 0x3}, {{&(0x7f0000005780)=@l2tp6={0xa, 0x0, 0x0, @private1}, 0x80, &(0x7f00000058c0)=[{&(0x7f0000005800)=""/139, 0x8b}], 0x1, &(0x7f0000005900)=""/179, 0xb3}, 0x5}, {{&(0x7f00000059c0)=@l2tp6={0xa, 0x0, 0x0, @private2}, 0x80, &(0x7f0000005e40)=[{&(0x7f0000005a40)=""/191, 0xbf}, {&(0x7f0000005b00)=""/148, 0x94}, {&(0x7f0000005bc0)=""/88, 0x58}, {&(0x7f0000005c40)}, {&(0x7f0000005c80)=""/233, 0xe9}, {&(0x7f0000005d80)=""/54, 0x36}, {&(0x7f0000005dc0)=""/86, 0x56}], 0x7, &(0x7f0000005ec0)=""/4096, 0x1000}, 0x200}, {{&(0x7f0000006ec0)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @empty}}, 0x80, &(0x7f0000007280)=[{&(0x7f0000006f40)=""/82, 0x52}, {&(0x7f0000006fc0)=""/55, 0x37}, {&(0x7f0000007000)=""/213, 0xd5}, {&(0x7f0000007100)=""/37, 0x25}, {&(0x7f0000007140)=""/59, 0x3b}, {&(0x7f0000007180)=""/255, 0xff}], 0x6}, 0x18000}, {{&(0x7f0000007300)=@pptp={0x18, 0x2, {0x0, @loopback}}, 0x80, &(0x7f0000009680)=[{&(0x7f0000007380)=""/77, 0x4d}, {&(0x7f0000007400)=""/4096, 0x1000}, {&(0x7f0000008400)=""/52, 0x34}, {&(0x7f0000008440)=""/109, 0x6d}, {&(0x7f00000084c0)=""/85, 0x55}, {&(0x7f0000008540)=""/252, 0xfc}, {&(0x7f0000008640)=""/4096, 0x1000}, {&(0x7f0000009640)=""/20, 0x14}], 0x8, &(0x7f0000009700)}, 0x1}], 0x8, 0x0, &(0x7f0000009940)={0x77359400}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000040)) [ 1151.486298][T25490] netlink: 'syz-executor.1': attribute type 2 has an invalid length. 03:04:17 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000040)) setxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000140)=@v1={0x2, "dabc039efe9d556a53d3c04df557aef6d17951"}, 0x14, 0x2) 03:04:17 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) [ 1152.269164][T25492] netlink: 'syz-executor.1': attribute type 2 has an invalid length. 03:04:17 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xa) sendmsg$NL80211_CMD_DEL_NAN_FUNCTION(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[], 0x40}}, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000040), r1) preadv(r1, &(0x7f00000000c0)=[{&(0x7f0000000080)=""/53, 0x35}, {&(0x7f0000000280)=""/225, 0xe1}, {&(0x7f0000000380)=""/232, 0xe8}], 0x3, 0x70, 0x7) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000040)) 03:04:17 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x2, &(0x7f0000000380)=[{&(0x7f0000000280)="18c1efc9ea3bfe4d8b44a4f4ee04ddff4156c5fba0298e7bb520e05a6dfa6088b63bdb884306f41fb69a4eba58be07bfd3ef55b11ac5e3abcf580b7d60541ba27a102ef163f7177b662c1172d50cee8790460d0c1d5c1a2ea9a6c6c8777ccba6578f2ae01a7bb5d237834c4d75738e856637ac00177230cd930cc0809a14cac6f7fcb9fefc283a14c6ae3dcf85196dfdf44b15d0b0473e7232d1f19c173ff117990987e7269e1dac17664ca1f7faef8b27465793b554159e7687d76841c19f210d92829ca4d7d0fa152e4e6701592cc71db09d2b4730ba8ae497db9a1e323eba62", 0xe1, 0xd6}, {&(0x7f0000000140)="babf48df4071a781de9e5d79caf8981a5e1726e12286baeb4c0836db00678cb610630a1562896fb647ff6ae575d1024c08050887c5514c7f33132f9b3f907abecb6256ba0d5d12f41147fa908c70dc7dc3973cb99e5df0cb00b79e99ebb5aac38c2508281e97e8664560e8419f89212a6fdd302be76a4794f6462fc215b15074bd0dcea23612d6bac6c88560b162bc95918a8d6482df2d1c", 0x98, 0x80000001}], 0x2000, &(0x7f00000003c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xb4f}}, {@acl}], [{@smackfsroot}]}) r1 = openat(r0, &(0x7f0000000b40)='/proc/self/exe\x00', 0x8000, 0x10) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000040)) 03:04:17 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x150) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x20010, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="dd2c7408d82cf9184efdd3cac5c9ec13b5e5f036c09c5e3d3fa469d4e335da2fb08fdff156f8ab965b0419333a9d363877c3e8f7b06072ed50974cca328ae8b01a7753187cfcf5a79396093759d82f309be68f2bcec51e5de20e2a29c00c8f9670be3ecbd231cf2a072f2aed4eb1420acf797f67fd0a4fe949952455cf82ceab1b0aca058b9b04affbf74df485a1238a673958ad07021ab10b1c8541d61558f92b4f2a977fc195a661f3069e9c4fd1f130920231ed7fb3e0ada3a0"]) mmap(&(0x7f00007c2000/0x3000)=nil, 0x3000, 0x8, 0x2010, r0, 0xd535f000) 03:04:17 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) getresuid(&(0x7f00000000c0), &(0x7f0000000100)=0x0, &(0x7f0000000140)) setresuid(r1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)='\x00\x00\x00/?\x00', 0x6, 0x10000}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x72, &(0x7f0000000040)={[{@nouid32}, {@user_xattr}], [{@obj_type={'obj_type', 0x3d, 'O)'}}, {@fowner_lt={'fowner<', r1}}]}) 03:04:17 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) vmsplice(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)='`', 0x1}], 0x1, 0x0) r2 = accept$packet(r0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) mmap(&(0x7f000040a000/0x1000)=nil, 0x1000, 0x9, 0x12, r2, 0x4269000) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000040)) r3 = syz_open_dev$vcsa(&(0x7f0000000280), 0xc9, 0x1ab1c0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r4, &(0x7f0000000000)=ANY=[], 0xfffffecc) vmsplice(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)='`', 0x1}], 0x1, 0x0) ioctl$TIOCSRS485(r4, 0x542f, &(0x7f0000000080)={0xc7, 0x5, 0x2}) ioctl$PTP_PIN_GETFUNC2(r3, 0xc0603d0f, &(0x7f00000002c0)={'\x00', 0x1000, 0x2, 0xfffffffe}) 03:04:18 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000040)) chroot(&(0x7f0000000080)='./file0\x00') 03:04:18 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f00000000c0)='/proc/self/exe\x00', 0x0, 0x8) syz_io_uring_setup(0x20c0, &(0x7f0000000140)={0x0, 0x2162, 0x26, 0x2, 0x1a5, 0x0, r0}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f00007f6000/0x3000)=nil, &(0x7f0000000040), &(0x7f00000001c0)) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x3, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="f8b574c72d9cc70e71d3d38200"]) 03:04:18 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0xc8142, 0x512f14eceb94f98d) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) r1 = socket$netlink(0x10, 0x3, 0xa) sendmsg$NL80211_CMD_DEL_NAN_FUNCTION(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[], 0x40}}, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000040), r1) preadv(r1, &(0x7f0000000680)=[{&(0x7f0000000280)=""/193, 0xc1}, {&(0x7f0000000040)=""/23, 0x17}, {&(0x7f0000000140)=""/99, 0x63}, {&(0x7f0000000b80)=""/4096, 0x1000}, {&(0x7f0000000380)=""/80, 0x50}, {&(0x7f0000000400)=""/74, 0x4a}, {&(0x7f0000000480)=""/222, 0xde}, {&(0x7f0000000580)=""/203, 0xcb}, {&(0x7f00000000c0)}, {&(0x7f00000001c0)=""/21, 0x15}], 0xa, 0x0, 0x3) sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000800)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000010}, 0xc, &(0x7f00000007c0)={&(0x7f0000000740)={0x5c, 0x0, 0x200, 0x70bd26, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x7d5}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x9}, @IPVS_DEST_ATTR_TUN_TYPE={0x5}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x40}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xf5}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8ecb}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4004}, 0x4000000) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="a054eda1017b4bd68ad0852d0fdb4edd6de962f63be8d8"]) 03:04:18 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000140), 0x400100, 0x0) bind$inet6(r1, &(0x7f0000000180)={0xa, 0x4e21, 0x4, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x2}, 0x1c) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000040)) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000080)={&(0x7f000076e000/0x3000)=nil, 0x3000}, &(0x7f00000000c0)=0x10) 03:04:18 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) r1 = openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000080), 0x2, 0x0) mmap(&(0x7f00005ac000/0x4000)=nil, 0x4000, 0x2000000, 0x80010, r1, 0xb200a000) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53efcf9ac5a8988b6ba7ff8276443a920aea75c0aa53a987a73d3391866ee4c970ce13b212a7fbb482392d6708fa3f269d5eb2492851d7f13a6328f0c5b792dcb89e1bdb196849340f488b", 0x83, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="f7fd03e20008c2ec33c914adb0d69daa9fb936bdca4d550a7a7655fbb174ecd085140b44bf2d7f879da3aca095bd067ab1dd3cbd0206a00683ba5f7e529cf010ddb8e6bf53e7e3ed2d20b8646906000000dd18d8e5627005747e7b44629248000000000000"]) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000540), 0xffffffffffffffff) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000600)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000580)={0x40, r2, 0x100, 0x70bd28, 0x25dfdbfe, {}, [@BATADV_ATTR_MULTICAST_FANOUT={0x8}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x4}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000040}, 0x4040) sendmsg$MPTCP_PM_CMD_GET_ADDR(r0, &(0x7f0000000740)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000700)={&(0x7f00000006c0)={0x30, 0x0, 0x800, 0x70bd29, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x3}, @MPTCP_PM_ATTR_ADDR={0xc, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x20}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000000}, 0x14) 03:04:18 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x11, 0xd9f, 0x0) open_tree(r1, &(0x7f0000000080)='./file0\x00', 0x9001) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000040)) 03:04:18 executing program 1: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x80002, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_REGISTER_BEACONS(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, 0x0, 0x1, 0x70bd2a, 0x25dfdbfe, {{}, {@void, @val={0x8, 0x3, r1}, @void}}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x4000040) r2 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000040)) 03:04:18 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) mount_setattr(r0, &(0x7f0000000180)='./file0\x00', 0x0, &(0x7f00000001c0)={0x8c, 0x100000, 0x80000}, 0x20) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) futimesat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)={{}, {r1, r2/1000+10000}}) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(0xffffffffffffffff, 0x8040942d, &(0x7f0000000280)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f0000000000000001002bb28746000000400000004001002000ef00fcffffffffff0000000000000000", 0x3a, 0x6}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x10814, &(0x7f0000000040)) 03:04:18 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000080)='./file0/file0\x00', 0x5, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000040)) getxattr(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000100)=@random={'btrfs.', 'ext4\x00'}, &(0x7f0000000b80)=""/4096, 0x1000) recvmmsg(r0, &(0x7f0000000140), 0x0, 0x2, 0x0) 03:04:18 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000040)) chdir(&(0x7f0000000080)='./file0\x00') 03:04:18 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) mmap(&(0x7f0000085000/0x4000)=nil, 0x4000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000040)) 03:04:18 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) pipe(&(0x7f0000000080)) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000040)) 03:04:19 executing program 1: creat(&(0x7f0000000040)='./file0\x00', 0x100) r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000140)="200000008000000006000000600000000f00000000000000010000000100000000400000004000001f000000d2f4655fd2f4655f0100ffff53ef21e663af4b90eead24e9605d124c3623038671d8b5e5e10671e0dd04415cce65bb1ad8a6bd6d06f6", 0xffffffffffffff14, 0x43d}, {0x0, 0x0, 0x7fffffff}, {&(0x7f0000010200)='U?\x00', 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000080)={[], [{@subj_role={'subj_role', 0x3d, '*(\x8b\''}}]}) 03:04:19 executing program 1: r0 = accept4(0xffffffffffffffff, &(0x7f0000000080)=@ieee802154, &(0x7f0000000140)=0x80, 0x400) sendto$inet6(r0, &(0x7f0000000180)="86b9552ece71efd418fdec10843c69eb3f7b4a383abdde2004eab36550178e54ca6797917897ea7e51aa85d4b1c7e6af7ebd916976fbee1915f094bb06039c48c115bf", 0x43, 0xc9625a641d9432c, &(0x7f0000000280)={0xa, 0x4e21, 0x274b, @local, 0x8}, 0x1c) r1 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB]) 03:04:19 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) r1 = socket$netlink(0x10, 0x3, 0xa) sendmsg$NL80211_CMD_DEL_NAN_FUNCTION(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[], 0x40}}, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000040), r1) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000080), &(0x7f00000000c0)='./file0/file0\x00', 0xe, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000040)) 03:04:19 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000040)) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x43, 0x10000) write$binfmt_misc(r1, &(0x7f0000000140)={'syz1', "40ef67450394b5c2188f5b832aa0d4e974558ae514d8d6d6aa0b735597e1ad9560ca4a1ff1eb975a8e61e5fbd47cb3bb3bb60504dd67b26864b8902e073c02eca8ab9ce8f5d4f9264193895568b3ae494ea2399b100b930d70a03a9c2042f88f2fdae1cd78189159d8b74ff8974db6f81bd2e7ff962659f38ae74bb1860c6b9627c4c0342200cba9c4c57de3ad1ab4"}, 0x93) 03:04:19 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00']) 03:04:19 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000000080)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000040)) 03:04:19 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="00710a8d51e38999d9ddf0cb5907003113cf0fe6659a54c6c389faa91be0267d3bc2cdee759e865d9bdbf8e58c7f6947f1f86af95db681255979c9ddd624e04e772b01263204dd97124337a723c76478ad58940e09de7f8f6cb137b7ab"]) 03:04:19 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) r1 = socket$netlink(0x10, 0x3, 0xa) sendmsg$NL80211_CMD_DEL_NAN_FUNCTION(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[], 0x40}}, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000040), r1) dup2(r0, r1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000040)) 03:04:19 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x0, &(0x7f0000000040), 0x10, &(0x7f0000000040)=ANY=[@ANYBLOB]) 03:04:19 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000040)) r1 = dup3(r0, r0, 0x0) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000080)) 03:04:19 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) mmap(&(0x7f0000660000/0x4000)=nil, 0x4000, 0x1000000, 0x13, r0, 0xa780f000) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000040)) 03:04:19 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) mmap(&(0x7f00001b6000/0x4000)=nil, 0x4000, 0x200000a, 0x12, r0, 0x3ab7b000) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="00bae65ce39f861e9bead01219ca0d7735101f5447d597167025f1617200df7ea1bccc2cfd03a097b04b0eed8b86c6e639574fc0a71ccf4c4d8407aaca9ea156d91bf932c8458257587dafb8269d83696258fb0d19b7806cbef6995774bc624349a7797cbccc17bd7da200c8fd279865b9b8d6ca5ea64444465281610c017e09f928b45b6db392cdc7e41cde83db7f0f678d93cadfea04c19e9e47"]) 03:04:19 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0xebda5000) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) r1 = socket$netlink(0x10, 0x3, 0xa) sendmsg$NL80211_CMD_DEL_NAN_FUNCTION(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[], 0x40}}, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000040), r1) splice(r1, &(0x7f0000000140)=0xffffffff7fffffff, r0, &(0x7f0000000180)=0x7, 0x401, 0xa) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000380)="200000008004000000000000601e00000f0007000000000001000000010000000040000000400000205f0100ff37321e826e31f6ed35c92285a5ff55c81c74a4c3ccae9f6ecfb0901a5df436aeea695eb17f2d9fe58cb7754d6ec0a807b619fe408c794787564377dace658af14e19ee41f1dda2e787c6dc2748f801022ce1ffffffffffffff76ae9ccda37fc87bd8ac5f3318763ef7f851d2165a000000000000000000000000000000fae86039f6dbcbf60790f0", 0xb5, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000280)=ANY=[@ANYRES32=r1]) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000300)={&(0x7f00000001c0)=ANY=[@ANYBLOB="141400001b59a2d09ec713a081823d66f672650381839ef7b595f4", @ANYRES16, @ANYBLOB="442a63bf5010b00fdf2501000000"], 0x14}, 0x1, 0x0, 0x0, 0x1}, 0xd0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000800), 0xc, &(0x7f0000000880)={&(0x7f0000000840)={0x1c, 0x0, 0x204, 0x70bd26, 0x25dfdbfd, {}, [@GTPA_PEER_ADDRESS={0x8, 0x4, @rand_addr=0x64010101}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x24014001) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x0, 0x300, 0x70bd2b, 0x25dfdbfc, {}, [@GTPA_I_TEI={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x800) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x18800802}, 0xc, &(0x7f0000000100)={&(0x7f0000000580)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16, @ANYBLOB="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"], 0x6c}, 0x1, 0x0, 0x0, 0x40}, 0x888d0) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x4c, 0x0, 0x20, 0x70bd2a, 0x25dfdbfb, {}, [@GTPA_VERSION={0x8, 0x2, 0x1}, @GTPA_LINK={0x8}, @GTPA_PEER_ADDRESS={0x8, 0x4, @loopback}, @GTPA_NET_NS_FD={0x8}, @GTPA_FLOW={0x6, 0x6, 0x3}, @GTPA_MS_ADDRESS={0x8, 0x5, @loopback}, @GTPA_FLOW={0x6, 0x6, 0x4}]}, 0x4c}, 0x1, 0x0, 0x0, 0x1}, 0x9e744df16b9ceebc) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="f08ee02a1fc3344c", @ANYRES16, @ANYBLOB="00042dbd7000ffdbdf25000000000c0003000200000000000000"], 0x20}, 0x1, 0x0, 0x0, 0x28004}, 0x20008040) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x100, 0x70bd26, 0x3ff, {}, [@GTPA_FLOW={0x6, 0x6, 0x2}, @GTPA_FLOW={0x6, 0x6, 0x3}]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) sendmsg$GTP_CMD_NEWPDP(r1, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000340)={&(0x7f0000000440)={0x6c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfe, {}, [@GTPA_VERSION={0x8}, @GTPA_I_TEI={0x8}, @GTPA_VERSION={0x8, 0x2, 0x1}, @GTPA_O_TEI={0x8, 0x9, 0x1}, @GTPA_TID={0xc, 0x3, 0x2}, @GTPA_MS_ADDRESS={0x8, 0x5, @remote}, @GTPA_PEER_ADDRESS={0x8, 0x4, @local}, @GTPA_O_TEI={0x8, 0x9, 0x4}, @GTPA_TID={0xc}, @GTPA_LINK={0x8, 0x1, r3}]}, 0x6c}}, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) openat(r2, &(0x7f0000000080)='./file0\x00', 0x40000, 0x8) chown(&(0x7f00000000c0)='./file0/file0\x00', 0xee01, 0xffffffffffffffff) 03:04:19 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40080, 0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x2, 0x800}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00']) r1 = openat$cgroup(r0, &(0x7f0000000080)='syz0\x00', 0x200002, 0x0) preadv(r1, &(0x7f0000000140)=[{&(0x7f00000000c0)=""/9, 0x9}, {&(0x7f0000000280)=""/234, 0xea}], 0x2, 0x3f, 0x3) 03:04:19 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="00b12e57fbb5ce3f32bd5a330e986bb4e42eefbae99f98e037449d5cfaf70d7bdff16d5985b827e5a2daf9bdf3ac08e6380a944582d4f0a16009b6703cb457e2b7d738423573633e04754a52c4810db3b26300f74df1352a2c44d91ad80942d3a3664d24494a38833018b800d223fa3ab500"]) 03:04:19 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) write$binfmt_elf64(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x9, 0x1, 0x6, 0xfffffffffffffffa, 0x2, 0x3, 0x4, 0x35f, 0x40, 0x2da, 0x10000, 0x8000, 0x38, 0x1, 0x7, 0x7f, 0x5}, [{0x5, 0x7, 0xb04f, 0xffffffff, 0x81, 0x1ff, 0x5, 0x1}, {0x0, 0x3, 0x4, 0x9, 0x4, 0x1f, 0x5, 0xef}], "7940b4eeb29204d5fe383ca1b8437a9004186f3852e42595ade74d8aa9732c71b91a42fdda108355ebb499ed11d041e22d4fc7fef6875e75032100c576935a0ebebd5e3efd5e6eefa0a5aea08b16d9a891dba77614f077fd2ea06b25c83e269a8c034ae2bf05ef7bf667f1e8ea855bb258397de5fac5ccbda1fdb6e18171dbb16d76572722c8927b7b299f3bc22c5e87deb1db14939098", ['\x00', '\x00']}, 0x347) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000040)) 03:04:19 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) pwritev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="b22911f568fb95b9c19fbf86242653c72578daa4e76ee1877e9d0dec7e5e5a61b7ee7a0e14ef4a63fcb48ee49bfaff4a046e8426448b814a668de0a3747f15749046cdaf37af7f", 0x47}, {&(0x7f0000000140)="4c882c8d9121670a9c71db02948410a016701a205ac90ce8a7e46f501c74256303d8e64d3c5b0db2bd31c23dc09f10c8be0be1efbb5b691fd0c77dc0b73bef339e3b193ac628", 0x46}], 0x2, 0x9, 0x33) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000040)) 03:04:19 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) openat(r0, &(0x7f0000000280)='./file1\x00', 0x400000, 0xc8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000080)=""/5, 0x5}], 0x1, 0xd9f, 0x0) mmap(&(0x7f0000373000/0x3000)=nil, 0x3000, 0x2000000, 0x10, r0, 0xf2890000) r1 = eventfd(0x2) preadv(r1, &(0x7f00000001c0)=[{&(0x7f0000000040)=""/26, 0x1a}], 0x1, 0x0, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="00d7b211addb3680e5a02a635356d1f8abb64f1b6ef8ec2bf7d9c080765d61374a2385c423d896d1ae3983d34a5a97136c0da0956789ff0a75902db23fb6b7a51d995d1f6a687c49467ac4b50cd728c7f118b51f7b56"]) 03:04:19 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = accept$inet(r0, &(0x7f0000000080)={0x2, 0x0, @broadcast}, &(0x7f00000000c0)=0x10) mmap(&(0x7f000047d000/0x4000)=nil, 0x4000, 0xe, 0x80010, r1, 0xd84ac000) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000040)) 03:04:19 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000b40)='./file0\x00', 0x0, 0x64) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x4}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x80000a, &(0x7f0000000040)) 03:04:19 executing program 1: r0 = syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x8, 0x1, &(0x7f0000000380)=[{&(0x7f0000000280)="acbcf4cdd25d68d578a06c502e0487275085765fc6a2cfafdf2ef09d9bf49a0d22b4a21ba4f21f8246ff21ac6a7c947599bf56512b015b829674a2d2a21a4970ae6a9e5605fc3af0a9dc41a1d9ce406011a22dcbbe598cbd5bc5b22ae6ca5c5d2ccf2e4ec11fc85f20bb584b153849ca8eb8bebc75ed5db07258f275de7f13791db74fe6ead618b78e84a7dedd074fbb555c5d9100b4d9c65c34ee763168cacff18946a15ce07ebcd620d60ec23166d31e3784a333b78f73f0d8fb23bc7efab25bedc067592847d79a7d6088b08829d067309ca462d530dd4e5ed9cf3bfc147cf3bc4ee4ee2f201a0fd99bbecd33", 0xee, 0xe5}], 0x10200e0, &(0x7f00000003c0)={[{@nocompress}, {@dmode={'dmode', 0x3d, 0x100000000}}, {@gid={'gid', 0x3d, 0xffffffffffffffff}}, {@iocharset={'iocharset', 0x3d, 'iso8859-9'}}], [{@uid_lt={'uid<', 0xee01}}, {@fsuuid={'fsuuid', 0x3d, {[0x64, 0x5e, 0x63, 0x34, 0x37, 0x30, 0x36, 0x37], 0x2d, [0x61, 0x30, 0x38, 0xcc], 0x2d, [0x39, 0x64, 0x31, 0x38], 0x2d, [0x0, 0x55, 0x66, 0x64], 0x2d, [0x63, 0x34, 0x32, 0x6e, 0x0, 0x37, 0x62, 0x31]}}}, {@subj_user}, {@obj_role}, {@fowner_lt}]}) r1 = openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x20010, r1, 0x50588000) preadv(r1, &(0x7f0000000280), 0x11, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x800000000004e0}, {&(0x7f0000010200)="01000d000010", 0x6, 0x561}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000000040)) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f00000004c0)='./file0\x00', 0x84) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xfffffecc) vmsplice(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)='`', 0x1}], 0x1, 0x0) ioctl$LOOP_SET_FD(r2, 0x4c00, r1) 03:04:20 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) [ 1155.061380][T25623] PM: suspend entry (deep) [ 1155.074177][T25623] Filesystems sync: 0.008 seconds [ 1155.080517][T25623] Freezing user space processes ... (elapsed 0.002 seconds) done. [ 1155.090869][T25623] OOM killer disabled. [ 1155.094975][T25623] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 1155.105547][T25623] printk: Suspending console(s) (use no_console_suspend to debug) 03:04:21 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) [ 1155.150134][ T6109] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 1155.693323][T25623] ACPI: Preparing to enter system sleep state S3 [ 1155.693469][T25623] PM: Saving platform NVS memory [ 1155.693478][T25623] Disabling non-boot CPUs ... [ 1155.696499][T25623] smpboot: CPU 1 is now offline [ 1155.714694][T25623] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 1155.714755][T25623] ACPI: Low-level resume complete [ 1155.714880][T25623] PM: Restoring platform NVS memory [ 1155.714890][T25623] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 1155.725266][T25623] Enabling non-boot CPUs ... [ 1155.725894][T25623] x86: Booting SMP configuration: [ 1155.725914][T25623] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 1155.726286][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 1155.727450][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 1155.729071][T25623] CPU1 is up [ 1155.729259][T25623] ACPI: Waking up from system sleep state S3 [ 1155.821212][T25623] OOM killer enabled. [ 1155.822035][T25623] Restarting tasks ... done. [ 1155.824632][T25623] PM: suspend exit [ 1155.870760][T25629] PM: suspend entry (deep) [ 1155.876061][T25629] Filesystems sync: 0.004 seconds [ 1155.877553][T25629] Freezing user space processes ... (elapsed 0.001 seconds) done. [ 1155.881047][T25629] OOM killer disabled. [ 1155.881854][T25629] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 1155.885793][T25629] printk: Suspending console(s) (use no_console_suspend to debug) 03:04:22 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) [ 1156.252021][ T4113] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 1156.791165][T25629] ACPI: Preparing to enter system sleep state S3 [ 1156.791317][T25629] PM: Saving platform NVS memory [ 1156.791327][T25629] Disabling non-boot CPUs ... [ 1156.794613][T25629] smpboot: CPU 1 is now offline [ 1156.798194][T25629] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 1156.798250][T25629] ACPI: Low-level resume complete [ 1156.798323][T25629] PM: Restoring platform NVS memory [ 1156.798332][T25629] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 1156.808276][T25629] Enabling non-boot CPUs ... [ 1156.808857][T25629] x86: Booting SMP configuration: [ 1156.808911][T25629] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 1156.809114][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 1156.810358][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 1156.811877][T25629] CPU1 is up [ 1156.812085][T25629] ACPI: Waking up from system sleep state S3 [ 1156.903723][T25629] OOM killer enabled. [ 1156.904919][T25629] Restarting tasks ... done. [ 1156.917881][T25629] PM: suspend exit [ 1156.953742][T25635] PM: suspend entry (deep) [ 1156.957407][T25635] Filesystems sync: 0.002 seconds [ 1156.959139][T25635] Freezing user space processes ... (elapsed 0.001 seconds) done. [ 1156.962604][T25635] OOM killer disabled. [ 1156.963335][T25635] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 1156.966260][T25635] printk: Suspending console(s) (use no_console_suspend to debug) [ 1157.103612][ T6552] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 1157.643191][T25635] ACPI: Preparing to enter system sleep state S3 [ 1157.643567][T25635] PM: Saving platform NVS memory [ 1157.643583][T25635] Disabling non-boot CPUs ... [ 1157.646230][T25635] smpboot: CPU 1 is now offline [ 1157.649430][T25635] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 1157.649504][T25635] ACPI: Low-level resume complete [ 1157.649577][T25635] PM: Restoring platform NVS memory [ 1157.649586][T25635] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 1157.660187][T25635] Enabling non-boot CPUs ... [ 1157.661167][T25635] x86: Booting SMP configuration: [ 1157.661186][T25635] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 1157.661553][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 1157.662759][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 1157.664383][T25635] CPU1 is up [ 1157.664540][T25635] ACPI: Waking up from system sleep state S3 [ 1157.756488][T25635] OOM killer enabled. [ 1157.757458][T25635] Restarting tasks ... done. [ 1157.760382][T25635] PM: suspend exit 03:04:23 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) [ 1157.802709][T25641] PM: suspend entry (deep) [ 1157.807626][T25641] Filesystems sync: 0.003 seconds [ 1157.809718][T25641] Freezing user space processes ... (elapsed 0.003 seconds) done. [ 1157.814405][T25641] OOM killer disabled. [ 1157.815199][T25641] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 1157.819186][T25641] printk: Suspending console(s) (use no_console_suspend to debug) 03:04:24 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) [ 1157.965873][ T6109] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 1158.503420][T25641] ACPI: Preparing to enter system sleep state S3 [ 1158.503864][T25641] PM: Saving platform NVS memory [ 1158.503880][T25641] Disabling non-boot CPUs ... [ 1158.506961][T25641] smpboot: CPU 1 is now offline [ 1158.510122][T25641] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 1158.510226][T25641] ACPI: Low-level resume complete [ 1158.510350][T25641] PM: Restoring platform NVS memory [ 1158.510360][T25641] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 1158.520089][T25641] Enabling non-boot CPUs ... [ 1158.521143][T25641] x86: Booting SMP configuration: [ 1158.521154][T25641] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 1158.521430][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 1158.522580][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 1158.524363][T25641] CPU1 is up [ 1158.524613][T25641] ACPI: Waking up from system sleep state S3 [ 1158.726991][T25641] OOM killer enabled. [ 1158.727761][T25641] Restarting tasks ... done. [ 1158.732622][T25641] PM: suspend exit [ 1158.773237][T25647] PM: suspend entry (deep) [ 1158.777108][T25647] Filesystems sync: 0.002 seconds [ 1158.779393][T25647] Freezing user space processes ... (elapsed 0.002 seconds) done. [ 1158.784230][T25647] OOM killer disabled. [ 1158.785141][T25647] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 1158.789037][T25647] printk: Suspending console(s) (use no_console_suspend to debug) 03:04:25 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) [ 1159.027622][ T6307] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 1159.573742][T25647] ACPI: Preparing to enter system sleep state S3 [ 1159.574244][T25647] PM: Saving platform NVS memory [ 1159.574254][T25647] Disabling non-boot CPUs ... [ 1159.576984][T25647] smpboot: CPU 1 is now offline [ 1159.580156][T25647] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 1159.580216][T25647] ACPI: Low-level resume complete [ 1159.580359][T25647] PM: Restoring platform NVS memory [ 1159.580368][T25647] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 1159.590543][T25647] Enabling non-boot CPUs ... [ 1159.591491][T25647] x86: Booting SMP configuration: [ 1159.591503][T25647] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 1159.591865][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 1159.593264][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 1159.594867][T25647] CPU1 is up [ 1159.595162][T25647] ACPI: Waking up from system sleep state S3 [ 1159.636238][T25648] hwrng: no data available [ 1159.684333][T25647] OOM killer enabled. [ 1159.685142][T25647] Restarting tasks ... done. [ 1159.688651][T25647] PM: suspend exit [ 1159.734984][T25653] PM: suspend entry (deep) [ 1159.738210][T25653] Filesystems sync: 0.002 seconds [ 1159.740369][T25653] Freezing user space processes ... (elapsed 0.001 seconds) done. [ 1159.744171][T25653] OOM killer disabled. [ 1159.745078][T25653] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 1159.748449][T25653] printk: Suspending console(s) (use no_console_suspend to debug) 03:04:35 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) [ 1159.879811][ T6552] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 1170.114663][T25653] ACPI: Preparing to enter system sleep state S3 [ 1170.114834][T25653] PM: Saving platform NVS memory [ 1170.114845][T25653] Disabling non-boot CPUs ... [ 1170.117938][T25653] smpboot: CPU 1 is now offline [ 1170.120192][T25653] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 1170.120248][T25653] ACPI: Low-level resume complete [ 1170.120322][T25653] PM: Restoring platform NVS memory [ 1170.120332][T25653] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 1170.130277][T25653] Enabling non-boot CPUs ... [ 1170.130574][T25653] x86: Booting SMP configuration: [ 1170.130578][T25653] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 1170.130767][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 1170.131729][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 1170.133547][T25653] CPU1 is up [ 1170.133684][T25653] ACPI: Waking up from system sleep state S3 [ 1170.225494][T25653] OOM killer enabled. [ 1170.226134][T25653] Restarting tasks ... done. [ 1170.237812][T25653] PM: suspend exit [ 1170.275880][T25659] PM: suspend entry (deep) [ 1170.279468][T25659] Filesystems sync: 0.002 seconds [ 1170.280922][T25659] Freezing user space processes ... (elapsed 0.001 seconds) done. [ 1170.284238][T25659] OOM killer disabled. [ 1170.284936][T25659] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 1170.287770][T25659] printk: Suspending console(s) (use no_console_suspend to debug) 03:04:36 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) [ 1170.445452][ T6109] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 1170.994996][T25659] ACPI: Preparing to enter system sleep state S3 [ 1170.995099][T25659] PM: Saving platform NVS memory [ 1170.995109][T25659] Disabling non-boot CPUs ... [ 1170.997860][T25659] smpboot: CPU 1 is now offline [ 1171.000941][T25659] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 1171.001029][T25659] ACPI: Low-level resume complete [ 1171.001116][T25659] PM: Restoring platform NVS memory [ 1171.001127][T25659] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 1171.011260][T25659] Enabling non-boot CPUs ... [ 1171.011509][T25659] x86: Booting SMP configuration: [ 1171.011513][T25659] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 1171.011717][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 1171.012735][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 1171.014479][T25659] CPU1 is up [ 1171.014745][T25659] ACPI: Waking up from system sleep state S3 [ 1171.215981][T25659] OOM killer enabled. [ 1171.216664][T25659] Restarting tasks ... done. [ 1171.227737][T25659] PM: suspend exit [ 1171.266569][T25665] PM: suspend entry (deep) [ 1171.270452][T25665] Filesystems sync: 0.002 seconds [ 1171.272024][T25665] Freezing user space processes ... (elapsed 0.001 seconds) done. [ 1171.275661][T25665] OOM killer disabled. [ 1171.276431][T25665] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 1171.279461][T25665] printk: Suspending console(s) (use no_console_suspend to debug) 03:04:37 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) [ 1171.447502][ T6895] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 1172.002388][T25665] ACPI: Preparing to enter system sleep state S3 [ 1172.002494][T25665] PM: Saving platform NVS memory [ 1172.002524][T25665] Disabling non-boot CPUs ... [ 1172.005501][T25665] smpboot: CPU 1 is now offline [ 1172.008283][T25665] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 1172.008340][T25665] ACPI: Low-level resume complete [ 1172.008417][T25665] PM: Restoring platform NVS memory [ 1172.008427][T25665] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 1172.018209][T25665] Enabling non-boot CPUs ... [ 1172.018479][T25665] x86: Booting SMP configuration: [ 1172.018494][T25665] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 1172.018688][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 1172.019684][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 1172.021409][T25665] CPU1 is up [ 1172.021628][T25665] ACPI: Waking up from system sleep state S3 [ 1172.111412][T25665] OOM killer enabled. [ 1172.112376][T25665] Restarting tasks ... done. [ 1172.122122][T25665] PM: suspend exit [ 1172.161578][T25672] PM: suspend entry (deep) [ 1172.165620][T25672] Filesystems sync: 0.002 seconds [ 1172.167813][T25672] Freezing user space processes ... (elapsed 0.001 seconds) done. [ 1172.170738][T25672] OOM killer disabled. [ 1172.171557][T25672] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 1172.175281][T25672] printk: Suspending console(s) (use no_console_suspend to debug) 03:04:38 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) [ 1172.349201][ T6552] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 1172.898541][T25672] ACPI: Preparing to enter system sleep state S3 [ 1172.898923][T25672] PM: Saving platform NVS memory [ 1172.898944][T25672] Disabling non-boot CPUs ... [ 1172.901860][T25672] smpboot: CPU 1 is now offline [ 1172.905321][T25672] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 1172.905454][T25672] ACPI: Low-level resume complete [ 1172.905544][T25672] PM: Restoring platform NVS memory [ 1172.905554][T25672] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 1172.915731][T25672] Enabling non-boot CPUs ... [ 1172.917051][T25672] x86: Booting SMP configuration: [ 1172.917074][T25672] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 1172.917339][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 1172.918293][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 1172.919968][T25672] CPU1 is up [ 1172.920405][T25672] ACPI: Waking up from system sleep state S3 [ 1173.130481][T25672] OOM killer enabled. [ 1173.131199][T25672] Restarting tasks ... done. [ 1173.142563][T25672] PM: suspend exit [ 1173.179944][T25678] PM: suspend entry (deep) [ 1173.183597][T25678] Filesystems sync: 0.002 seconds [ 1173.185866][T25678] Freezing user space processes ... (elapsed 0.001 seconds) done. [ 1173.189636][T25678] OOM killer disabled. [ 1173.190333][T25678] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 1173.193758][T25678] printk: Suspending console(s) (use no_console_suspend to debug) 03:04:39 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0), 0x4) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) [ 1173.361064][ T6444] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 1173.906515][T25678] ACPI: Preparing to enter system sleep state S3 [ 1173.906815][T25678] PM: Saving platform NVS memory [ 1173.906835][T25678] Disabling non-boot CPUs ... [ 1173.910164][T25678] smpboot: CPU 1 is now offline [ 1173.914008][T25678] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 1173.914065][T25678] ACPI: Low-level resume complete [ 1173.914213][T25678] PM: Restoring platform NVS memory [ 1173.914222][T25678] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 1173.924235][T25678] Enabling non-boot CPUs ... [ 1173.925298][T25678] x86: Booting SMP configuration: [ 1173.925318][T25678] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 1173.925661][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 1173.926725][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 1173.928348][T25678] CPU1 is up [ 1173.928729][T25678] ACPI: Waking up from system sleep state S3 [ 1174.284843][T25678] OOM killer enabled. [ 1174.285813][T25678] Restarting tasks ... done. [ 1174.290707][T25678] PM: suspend exit [ 1174.335073][T25684] PM: suspend entry (deep) [ 1174.338443][T25684] Filesystems sync: 0.002 seconds [ 1174.340186][T25684] Freezing user space processes ... (elapsed 0.002 seconds) done. [ 1174.344533][T25684] OOM killer disabled. [ 1174.345664][T25684] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 1174.349258][T25684] printk: Suspending console(s) (use no_console_suspend to debug) 03:04:40 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0), 0x4) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) [ 1174.513017][ T6520] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 1175.068760][T25684] ACPI: Preparing to enter system sleep state S3 [ 1175.069168][T25684] PM: Saving platform NVS memory [ 1175.069180][T25684] Disabling non-boot CPUs ... [ 1175.072195][T25684] smpboot: CPU 1 is now offline [ 1175.075450][T25684] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 1175.075508][T25684] ACPI: Low-level resume complete [ 1175.075646][T25684] PM: Restoring platform NVS memory [ 1175.075655][T25684] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 1175.085673][T25684] Enabling non-boot CPUs ... [ 1175.086318][T25684] x86: Booting SMP configuration: [ 1175.086366][T25684] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 1175.086659][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 1175.087611][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 1175.089219][T25684] CPU1 is up [ 1175.089414][T25684] ACPI: Waking up from system sleep state S3 [ 1175.181586][T25684] OOM killer enabled. [ 1175.182385][T25684] Restarting tasks ... done. [ 1175.195313][T25684] PM: suspend exit [ 1175.233183][T25690] PM: suspend entry (deep) [ 1175.237448][T25690] Filesystems sync: 0.003 seconds [ 1175.239319][T25690] Freezing user space processes ... (elapsed 0.001 seconds) done. [ 1175.242644][T25690] OOM killer disabled. [ 1175.243544][T25690] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 1175.246533][T25690] printk: Suspending console(s) (use no_console_suspend to debug) [ 1175.384700][ T6520] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 1175.936107][T25690] ACPI: Preparing to enter system sleep state S3 [ 1175.936284][T25690] PM: Saving platform NVS memory [ 1175.936293][T25690] Disabling non-boot CPUs ... [ 1175.939206][T25690] smpboot: CPU 1 is now offline [ 1175.942009][T25690] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 1175.942068][T25690] ACPI: Low-level resume complete [ 1175.942148][T25690] PM: Restoring platform NVS memory [ 1175.942159][T25690] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 1175.952750][T25690] Enabling non-boot CPUs ... [ 1175.952987][T25690] x86: Booting SMP configuration: [ 1175.952991][T25690] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 1175.953244][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 1175.954391][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 1175.956215][T25690] CPU1 is up [ 1175.956469][T25690] ACPI: Waking up from system sleep state S3 [ 1175.956967][T25690] ================================================================== [ 1175.956999][T25690] BUG: KCSAN: data-race in device_resume_noirq / dpm_noirq_resume_devices [ 1175.957044][T25690] [ 1175.957049][T25690] write to 0xffff888100bc8cdc of 2 bytes by task 6520 on cpu 0: [ 1175.957065][T25690] device_resume_noirq+0x883/0xa00 [ 1175.957090][T25690] async_resume_noirq+0x2b/0x130 [ 1175.957112][T25690] async_run_entry_fn+0x4a/0x170 [ 1175.957130][T25690] process_one_work+0x3e9/0x8f0 [ 1175.957154][T25690] worker_thread+0x636/0xae0 [ 1175.957175][T25690] kthread+0x1d0/0x1f0 [ 1175.957195][T25690] ret_from_fork+0x1f/0x30 [ 1175.957213][T25690] [ 1175.957218][T25690] read to 0xffff888100bc8cdc of 2 bytes by task 25690 on cpu 1: [ 1175.957233][T25690] dpm_noirq_resume_devices+0x2ad/0x7c0 [ 1175.957255][T25690] dpm_resume_noirq+0xf/0x20 [ 1175.957276][T25690] suspend_enter+0x594/0x8f0 [ 1175.957295][T25690] suspend_devices_and_enter+0x1cb/0x500 [ 1175.957315][T25690] enter_state+0x274/0x530 [ 1175.957335][T25690] pm_suspend+0x4b/0x130 [ 1175.957352][T25690] state_store+0x1f2/0x210 [ 1175.957369][T25690] kobj_attr_store+0x40/0x60 [ 1175.957392][T25690] sysfs_kf_write+0xa6/0xc0 [ 1175.957415][T25690] kernfs_fop_write_iter+0x1d3/0x2d0 [ 1175.957437][T25690] do_iter_readv_writev+0x2cb/0x360 [ 1175.957456][T25690] do_iter_write+0x112/0x4c0 [ 1175.957471][T25690] vfs_iter_write+0x4c/0x70 [ 1175.957487][T25690] iter_file_splice_write+0x40a/0x750 [ 1175.957507][T25690] direct_splice_actor+0x80/0xa0 [ 1175.957527][T25690] splice_direct_to_actor+0x345/0x650 [ 1175.957548][T25690] do_splice_direct+0xf5/0x170 [ 1175.957568][T25690] do_sendfile+0x773/0xda0 [ 1175.957600][T25690] __x64_sys_sendfile64+0xa9/0x130 [ 1175.957618][T25690] do_syscall_64+0x4a/0x90 [ 1175.957636][T25690] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1175.957655][T25690] [ 1175.957658][T25690] value changed: 0x017e -> 0x015e [ 1175.957667][T25690] 03:04:41 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0), 0x4) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) [ 1175.957670][T25690] Reported by Kernel Concurrency Sanitizer on: [ 1175.957675][T25690] CPU: 1 PID: 25690 Comm: syz-executor.1 Not tainted 5.13.0-rc4-syzkaller #0 [ 1175.957695][T25690] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1175.957705][T25690] ================================================================== [ 1175.997678][T25691] hwrng: no data available [ 1176.084757][T25690] OOM killer enabled. [ 1176.085435][T25690] Restarting tasks ... done. [ 1176.087938][T25690] PM: suspend exit [ 1176.138485][T25696] PM: suspend entry (deep) [ 1176.141704][T25696] Filesystems sync: 0.002 seconds [ 1176.143147][T25696] Freezing user space processes ... (elapsed 0.001 seconds) done. [ 1176.146359][T25696] OOM killer disabled. [ 1176.147078][T25696] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 1176.149934][T25696] printk: Suspending console(s) (use no_console_suspend to debug)