fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, 0x0, 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) [ 1927.626588] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1927.628539] EXT4-fs (loop0): group descriptors corrupted! 16:56:44 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r1, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000080)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00']) 16:56:44 executing program 1: r0 = syz_genetlink_get_family_id$wireguard(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x40, r0, 0x40c, 0x70bd2a, 0x25dfdbfc, {}, [@WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @b}, @WGDEVICE_A_FLAGS={0x8}]}, 0x40}}, 0x80) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x3875, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_ACCEPT={0xd, 0x0, 0x0, r4, 0x0}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r5, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2, 0x10, r1, 0x0) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) pread64(r4, &(0x7f0000000300)=""/215, 0xd7, 0x200) 16:56:44 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, 0x0, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) [ 1927.812516] EXT4-fs (loop6): inodes count not valid: 65535 vs 32 [ 1927.866006] EXT4-fs (loop5): invalid first ino: 0 [ 1928.051135] nfs4: Unknown parameter 'ext4' [ 1928.122234] nfs4: Unknown parameter 'ext4' 16:57:06 executing program 3: signalfd4(0xffffffffffffffff, &(0x7f00000002c0), 0x8, 0x0) r0 = syz_io_uring_setup(0x4, &(0x7f0000000080), &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000100)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x6}, 0x0) r3 = syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) io_uring_enter(r3, 0x2014, 0x367a, 0x4, &(0x7f0000000000)={[0x500000000000]}, 0x8) 16:57:06 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000000), 0x0) accept(r0, 0x0, &(0x7f0000000040)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup(r1) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_GET_WIPHY(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="25030000000000000000010000000800010000000000080003", @ANYRES32=r4, @ANYBLOB="00090000000000060000"], 0x30}}, 0x0) 16:57:06 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000", 0xc, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) 16:57:06 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000040), 0x1a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) preadv(r0, &(0x7f0000000240)=[{&(0x7f0000000100)=""/19, 0x13}, {&(0x7f0000000340)=""/178, 0xb2}, {&(0x7f0000000400)=""/170, 0xaa}], 0x3, 0x0, 0x5) bind$unix(r1, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) listen(r1, 0x0) openat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x131201, 0x0) r2 = perf_event_open(&(0x7f0000000600)={0x2, 0xffffffffffffff12, 0x4, 0x3f, 0x1, 0x8, 0x0, 0xfffffffffffffff8, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x3}, 0x110, 0x1ff, 0x2, 0x6, 0x8, 0x2, 0x3, 0x0, 0x2}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) r3 = socket$unix(0x1, 0x5, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000002580)={0x0, 0x0, {}, {}, {0x0, @struct, 0x0}}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f00000000c0)={r4, 0x0, 0x20}) ioctl$BTRFS_IOC_SCRUB(r2, 0xc400941b, &(0x7f0000000680)={0x0, 0x2, 0x7ff}) ioctl$BTRFS_IOC_BALANCE_V2(r3, 0xc4009420, &(0x7f0000000a80)={0x1, 0x0, {0x6, @struct={0x0, 0xffff}, r4, 0x1, 0x5, 0xc, 0xff, 0xfffffffffffffffb, 0xb5, @usage=0x1, 0x401, 0x1f, [0xd7c, 0x7, 0x8001, 0x400, 0x6, 0x3]}, {0x1, @usage=0xffffffff, r5, 0x1, 0xff, 0x6, 0x2, 0x100000000, 0x0, @struct={0x0, 0x400000}, 0xea, 0x9, [0x55, 0x3210, 0x3, 0x2, 0x4, 0x80000001]}, {0x40, @struct={0x8, 0x4}, 0x0, 0x4, 0x0, 0x3dec, 0x8, 0xb8, 0x8b, @usage=0x2, 0x8, 0x10000, [0x7fff, 0x3, 0x7ff, 0xc0c, 0x7cb1, 0x4]}, {0x4, 0x7, 0x2}}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000580)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000140)=0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x2a, 0x0, 0xe2, 0x9e, 0x0, 0x10001, 0x22d00, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000004c0)}, 0x0, 0x8fa, 0xfff, 0x0, 0xfffffffffffffffc, 0x8, 0x2a1e, 0x0, 0x80, 0x0, 0x831}, r6, 0x0, r0, 0xa) connect$unix(r3, &(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e) r7 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendto$unix(r7, &(0x7f00000001c0)="71c8fcdec12c94cc2c956df44d0cfab1b74ae676aaf48ee784f18fa85887742923c7702a7c662659f337ab3d7a78b4ecf76f4f78d4ae2b6a52967d6401e9c68c6906297336eecfafa13e1a6858f797332f429ead621b12f7d737fa05091fd2150230446769df0f46629d692751480b4c5f", 0x71, 0x0, 0x0, 0x0) 16:57:06 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) creat(0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x10000000) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) flistxattr(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f0000000000000000010000", 0x4f, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) r0 = creat(&(0x7f0000000240)='./file0\x00', 0x8c) sendmsg$nl_generic(r0, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, 0x32, 0x10, 0x70bd2d, 0x25dfdbfe, {}, [@typed={0xc, 0x62, 0x0, 0x0, @u64=0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x400c0}, 0x2000c084) 16:57:06 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) sendmsg$nl_generic(r0, 0x0, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x0, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) 16:57:06 executing program 1: r0 = clone3(&(0x7f00000016c0)={0x60100, 0x0, 0x0, 0x0, {}, &(0x7f0000000600)=""/4096, 0x1000, 0x0, &(0x7f0000001680)=[0xffffffffffffffff], 0x1}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000002c0)={0x0, 0x0}) r2 = fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340)={0x0}, &(0x7f0000000380)=0xc) r4 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r4}, &(0x7f0000000040)) r5 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r5}, &(0x7f0000000040)) clone3(&(0x7f0000000400)={0x8000000, &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180), {0xe}, &(0x7f00000001c0)=""/245, 0xf5, &(0x7f0000001740)=""/4096, &(0x7f00000003c0)=[r0, r1, r2, r0, r3, r4, r5, r0, r0], 0x9}, 0x58) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x40450, &(0x7f0000000080)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@mmap}, {@aname={'aname', 0x3d, '-/+@-#,@${+/%!'}}], [{@audit}, {@hash}, {@dont_appraise}, {@seclabel}]}}) 16:57:06 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, 0x0, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) [ 1949.222799] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1949.224095] EXT4-fs (loop6): group descriptors corrupted! [ 1949.265936] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 1949.269095] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 1949.282190] nfs4: Unknown parameter 'ext4' 16:57:06 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x49, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x1, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(0xffffffffffffffff, r3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) r5 = signalfd4(r3, &(0x7f00000001c0), 0x8, 0x0) pwrite64(r5, &(0x7f0000000200), 0x0, 0x0) ioctl$sock_bt_hci(r0, 0x400448e4, &(0x7f00000006c0)="76a1ce71776f1325a5c4c6d368ee6c47a82cd6817d47ff0d90e7e182b2db60bf380e5b13489c69c30d3a784f77537337c7265f7639db53b56af60c67b5f44afc63fee916c7c202fec7c9184ccfd954ed8d29d20bffca50fb4d7ea2901b0f51caff43a5f52e9da290970c24b3e03ffe45c6baf6b490a7a7afbc3c6be9ac33f2e0125645c54da943b741af2da2f254b1f4167001982e967e82523b80d179ccf6ebf883f4c08ed94e4a9f6d054c6d3cf43a18497077a65833d6e33b5d042d775a32a443cc59404bb35e3e3e57c63b0c") ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r5, 0xc0189378, &(0x7f0000000080)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="011000000000000054653000"]) ioctl$AUTOFS_IOC_PROTOVER(r4, 0x80049363, &(0x7f00000000c0)) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) 16:57:06 executing program 2: lseek(0xffffffffffffffff, 0x100, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="1c0000001a0001010000000000000000e9ffffff7a"], 0x1c}}, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x800, 0x0) ioctl$BLKRESETZONE(r1, 0x40101283, &(0x7f0000000140)={0x1000, 0x2}) readv(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000000400)=""/253, 0xfd}], 0x1) syz_genetlink_get_family_id$mptcp(&(0x7f0000000040), r0) unshare(0x48020200) [ 1949.348616] EXT4-fs (loop5): invalid first ino: 0 16:57:06 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, 0x0, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) 16:57:06 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000040), 0x1a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) preadv(r0, &(0x7f0000000240)=[{&(0x7f0000000100)=""/19, 0x13}, {&(0x7f0000000340)=""/178, 0xb2}, {&(0x7f0000000400)=""/170, 0xaa}], 0x3, 0x0, 0x5) bind$unix(r1, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) listen(r1, 0x0) openat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x131201, 0x0) r2 = perf_event_open(&(0x7f0000000600)={0x2, 0xffffffffffffff12, 0x4, 0x3f, 0x1, 0x8, 0x0, 0xfffffffffffffff8, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x3}, 0x110, 0x1ff, 0x2, 0x6, 0x8, 0x2, 0x3, 0x0, 0x2}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) r3 = socket$unix(0x1, 0x5, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000002580)={0x0, 0x0, {}, {}, {0x0, @struct, 0x0}}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f00000000c0)={r4, 0x0, 0x20}) ioctl$BTRFS_IOC_SCRUB(r2, 0xc400941b, &(0x7f0000000680)={0x0, 0x2, 0x7ff}) ioctl$BTRFS_IOC_BALANCE_V2(r3, 0xc4009420, &(0x7f0000000a80)={0x1, 0x0, {0x6, @struct={0x0, 0xffff}, r4, 0x1, 0x5, 0xc, 0xff, 0xfffffffffffffffb, 0xb5, @usage=0x1, 0x401, 0x1f, [0xd7c, 0x7, 0x8001, 0x400, 0x6, 0x3]}, {0x1, @usage=0xffffffff, r5, 0x1, 0xff, 0x6, 0x2, 0x100000000, 0x0, @struct={0x0, 0x400000}, 0xea, 0x9, [0x55, 0x3210, 0x3, 0x2, 0x4, 0x80000001]}, {0x40, @struct={0x8, 0x4}, 0x0, 0x4, 0x0, 0x3dec, 0x8, 0xb8, 0x8b, @usage=0x2, 0x8, 0x10000, [0x7fff, 0x3, 0x7ff, 0xc0c, 0x7cb1, 0x4]}, {0x4, 0x7, 0x2}}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000580)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000140)=0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x2a, 0x0, 0xe2, 0x9e, 0x0, 0x10001, 0x22d00, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000004c0)}, 0x0, 0x8fa, 0xfff, 0x0, 0xfffffffffffffffc, 0x8, 0x2a1e, 0x0, 0x80, 0x0, 0x831}, r6, 0x0, r0, 0xa) connect$unix(r3, &(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e) r7 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendto$unix(r7, &(0x7f00000001c0)="71c8fcdec12c94cc2c956df44d0cfab1b74ae676aaf48ee784f18fa85887742923c7702a7c662659f337ab3d7a78b4ecf76f4f78d4ae2b6a52967d6401e9c68c6906297336eecfafa13e1a6858f797332f429ead621b12f7d737fa05091fd2150230446769df0f46629d692751480b4c5f", 0x71, 0x0, 0x0, 0x0) [ 1949.431674] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1949.433951] EXT4-fs (loop6): group descriptors corrupted! [ 1949.440779] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 16:57:06 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) sendmsg$nl_generic(r0, 0x0, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x0, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) 16:57:06 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x49, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x1, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(0xffffffffffffffff, r3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) r5 = signalfd4(r3, &(0x7f00000001c0), 0x8, 0x0) pwrite64(r5, &(0x7f0000000200), 0x0, 0x0) ioctl$sock_bt_hci(r0, 0x400448e4, &(0x7f00000006c0)="76a1ce71776f1325a5c4c6d368ee6c47a82cd6817d47ff0d90e7e182b2db60bf380e5b13489c69c30d3a784f77537337c7265f7639db53b56af60c67b5f44afc63fee916c7c202fec7c9184ccfd954ed8d29d20bffca50fb4d7ea2901b0f51caff43a5f52e9da290970c24b3e03ffe45c6baf6b490a7a7afbc3c6be9ac33f2e0125645c54da943b741af2da2f254b1f4167001982e967e82523b80d179ccf6ebf883f4c08ed94e4a9f6d054c6d3cf43a18497077a65833d6e33b5d042d775a32a443cc59404bb35e3e3e57c63b0c") ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r5, 0xc0189378, &(0x7f0000000080)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="011000000000000054653000"]) ioctl$AUTOFS_IOC_PROTOVER(r4, 0x80049363, &(0x7f00000000c0)) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) 16:57:06 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) creat(0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x10000000) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) flistxattr(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f0000000000000000010000", 0x4f, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) r0 = creat(&(0x7f0000000240)='./file0\x00', 0x8c) sendmsg$nl_generic(r0, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, 0x32, 0x10, 0x70bd2d, 0x25dfdbfe, {}, [@typed={0xc, 0x62, 0x0, 0x0, @u64=0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x400c0}, 0x2000c084) 16:57:06 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$incfs(r0, 0x0, 0x220001, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000340)=[0xffffffffffffffff, 0xffffffffffffffff], 0x2) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x7b, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000140), 0x8, 0x840) ioctl$EXT4_IOC_GET_ES_CACHE(0xffffffffffffffff, 0xc020662a, &(0x7f0000000640)={0x3, 0x4, 0x0, 0x7ff, 0x3, [{0x4b, 0x1, 0x0, '\x00', 0x400}, {0x80000000, 0x42, 0x6, '\x00', 0x180}, {0x8, 0x9, 0x80000001, '\x00', 0x1000}]}) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0), r1) sendmsg$TIPC_NL_MON_PEER_GET(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000200)={&(0x7f0000000380)={0x29c, r3, 0x200, 0x70bd29, 0x25dfdbfd, {}, [@TIPC_NLA_PUBL={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0xfffffe38}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x9}]}, @TIPC_NLA_NODE={0x10, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}]}, @TIPC_NLA_NODE={0x23c, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x31f}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3ff}, @TIPC_NLA_NODE_ID={0xf9, 0x3, "1416e68149dbf37b938f6e96af4d5a5b4f095f29e301d7ef443b53da7e5d519ec4785453805e5765ae9893f631bae5c9cf7df0c7079a6f7a0d31344ceb67a5fb73da34cf1da6e0af26c57201abe57aebcb17cabd0de03453a5d0662251ede925fad5e712e5c14ebb7f72c04dc91b3d1719d584e03cee41e143049355ee04a6453d480c0a45ebfe049434f7e96b35c4ce83667621fc3f32361a52f066ed4b6c30872eec28e76ffbf8d56c59355361f992f8fbcdfc624284d8486a0ccb61067e568016ccfe28fc7da4e66ccedab3120b867b47f32c552c30a35fb5acc54671d959552b7664fc1d58e2e7e40eb639799b5b8ed5e1b180"}, @TIPC_NLA_NODE_ID={0xaf, 0x3, "3d5defb3a08aff9ea44e053bdf1a662d04a7fbdc69a4b139fef34329a7ba270b3d291afa3b1ac1c473fd6ac1c10048208189445a4220e68ce94d99fd875564e29a7973b3d88d942b99fcf0f72a374ee5cb701bd0c6bc0363923abeb93469e81bc72c0a79c2a881d9c4bfe9bff472d98b9e194e03e58385c5e8107686bdd8410b9251e801f71a034c9af912fd875457971c01fd63c69c0db0826490f137a484e1483a12f11ff762e8d38679"}, @TIPC_NLA_NODE_ID={0x75, 0x3, "d595de0017fcba62f6a6ae6910b165d2c6ac7e37761adeafc5ee0bd40c6bb60e618a2942e338bb0d8591547b94e1a9b518879e58f7e91eedab34ce479b380333bc96af3c3fb2c71dc43ffc3ef9953044f53e2d1818f887d3cf74d351e06542113ab176741bf9b0c61cd6c9aecaef8e2a08"}]}, @TIPC_NLA_BEARER={0x28, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xd9bb}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}]}]}]}, 0x29c}, 0x1, 0x0, 0x0, 0x90}, 0x800) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x31b) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r4, &(0x7f0000000880)=""/4096, 0x1000) 16:57:06 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000", 0xc, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) [ 1949.535507] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 1949.599742] nfs4: Unknown parameter 'ext4' [ 1949.774639] EXT4-fs (loop5): invalid first ino: 0 [ 1949.784666] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 16:57:20 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, 0x0, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) 16:57:20 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/sockstat6\x00') preadv(r0, &(0x7f00000023c0)=[{&(0x7f0000000000)=""/29, 0x1d}], 0x1, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)={0x0, 0x4, 0x7, 0x3}) 16:57:20 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) creat(0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x10000000) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) flistxattr(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b", 0x55, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) r0 = creat(&(0x7f0000000240)='./file0\x00', 0x8c) sendmsg$nl_generic(r0, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, 0x32, 0x10, 0x70bd2d, 0x25dfdbfe, {}, [@typed={0xc, 0x62, 0x0, 0x0, @u64=0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x400c0}, 0x2000c084) 16:57:20 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) sendmsg$nl_generic(r0, 0x0, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x0, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) 16:57:20 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000040), 0x1a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) preadv(r0, &(0x7f0000000240)=[{&(0x7f0000000100)=""/19, 0x13}, {&(0x7f0000000340)=""/178, 0xb2}, {&(0x7f0000000400)=""/170, 0xaa}], 0x3, 0x0, 0x5) bind$unix(r1, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) listen(r1, 0x0) openat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x131201, 0x0) r2 = perf_event_open(&(0x7f0000000600)={0x2, 0xffffffffffffff12, 0x4, 0x3f, 0x1, 0x8, 0x0, 0xfffffffffffffff8, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x3}, 0x110, 0x1ff, 0x2, 0x6, 0x8, 0x2, 0x3, 0x0, 0x2}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) r3 = socket$unix(0x1, 0x5, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000002580)={0x0, 0x0, {}, {}, {0x0, @struct, 0x0}}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f00000000c0)={r4, 0x0, 0x20}) ioctl$BTRFS_IOC_SCRUB(r2, 0xc400941b, &(0x7f0000000680)={0x0, 0x2, 0x7ff}) ioctl$BTRFS_IOC_BALANCE_V2(r3, 0xc4009420, &(0x7f0000000a80)={0x1, 0x0, {0x6, @struct={0x0, 0xffff}, r4, 0x1, 0x5, 0xc, 0xff, 0xfffffffffffffffb, 0xb5, @usage=0x1, 0x401, 0x1f, [0xd7c, 0x7, 0x8001, 0x400, 0x6, 0x3]}, {0x1, @usage=0xffffffff, r5, 0x1, 0xff, 0x6, 0x2, 0x100000000, 0x0, @struct={0x0, 0x400000}, 0xea, 0x9, [0x55, 0x3210, 0x3, 0x2, 0x4, 0x80000001]}, {0x40, @struct={0x8, 0x4}, 0x0, 0x4, 0x0, 0x3dec, 0x8, 0xb8, 0x8b, @usage=0x2, 0x8, 0x10000, [0x7fff, 0x3, 0x7ff, 0xc0c, 0x7cb1, 0x4]}, {0x4, 0x7, 0x2}}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000580)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000140)=0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x2a, 0x0, 0xe2, 0x9e, 0x0, 0x10001, 0x22d00, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000004c0)}, 0x0, 0x8fa, 0xfff, 0x0, 0xfffffffffffffffc, 0x8, 0x2a1e, 0x0, 0x80, 0x0, 0x831}, r6, 0x0, r0, 0xa) connect$unix(r3, &(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e) openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000e80), 0x40, 0x0) 16:57:20 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) stat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_xfrm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000540)=@acquire={0x244, 0x17, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x2, '\x00', 0x1}}, @in=@local, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {{@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, r1}}, 0x0, 0x4}, [@algo_auth_trunc={0x119, 0x14, {{'sha384-ce\x00'}, 0x668, 0x180, "faa42a328de8bc9f415f5e16d11e92054ce16a6aea030a5ddc73b7519f28785bfb163b28a4880b6ed653a013d829055ed5c5bfab26806ad11722e12faee442b267607600e0ef56b3ec0f5c7c813be3f21674c2e5dcf80108a83e9d32df18d9e05f1eea953a85eb125ce27f42abae17b7ff7e75e7191e33f6a94ea7e4768c7312888a70db952b934349856e2571d3e458dcefe9eee31ae1d2a4e27f3850469b214ea46cebb32c19f3b794434e65dc8ed77f2521b8d3a2c01a6d1ed554a8497396ebd7dbac9d296536fbf65bf053"}}]}, 0x244}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x98a) creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000080)={0x14, 0x22, 0x69844ea0a6ddcd11}, 0x14}}, 0x0) ioctl$FS_IOC_GETFSMAP(r2, 0xc0c0583b, &(0x7f0000000080)=ANY=[@ANYRESOCT]) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000180)) unshare(0x48020200) unshare(0x10000000) r3 = openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r5 = perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x2, 0xff, 0x9, 0x6, 0x0, 0xef, 0x10020, 0x4, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x2, @perf_config_ext={0x7, 0x71}, 0x12, 0x8000, 0x3, 0x1, 0x0, 0x8, 0x2, 0x0, 0xa2b80000, 0x0, 0x7}, 0xffffffffffffffff, 0x9, r3, 0x9) setsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000040)={0x0, @loopback, @loopback}, 0xc) openat$sr(0xffffffffffffff9c, &(0x7f0000000200), 0x200080, 0x0) dup2(r5, r3) syz_open_dev$vcsu(&(0x7f0000000000), 0x4673, 0x41000) fcntl$dupfd(r3, 0x0, r4) 16:57:20 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000", 0xc, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) 16:57:20 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x49, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x1, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(0xffffffffffffffff, r3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000004c0)) r5 = signalfd4(r3, &(0x7f00000001c0), 0x8, 0x0) pwrite64(r5, &(0x7f0000000200), 0x0, 0x0) ioctl$sock_bt_hci(r0, 0x400448e4, &(0x7f00000006c0)="76a1ce71776f1325a5c4c6d368ee6c47a82cd6817d47ff0d90e7e182b2db60bf380e5b13489c69c30d3a784f77537337c7265f7639db53b56af60c67b5f44afc63fee916c7c202fec7c9184ccfd954ed8d29d20bffca50fb4d7ea2901b0f51caff43a5f52e9da290970c24b3e03ffe45c6baf6b490a7a7afbc3c6be9ac33f2e0125645c54da943b741af2da2f254b1f4167001982e967e82523b80d179ccf6ebf883f4c08ed94e4a9f6d054c6d3cf43a18497077a65833d6e33b5d042d775a32a443cc59404bb35e3e3e57c63b0c") ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r5, 0xc0189378, &(0x7f0000000080)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="011000000000000054653000"]) ioctl$AUTOFS_IOC_PROTOVER(r4, 0x80049363, &(0x7f00000000c0)) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) [ 1963.605097] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 1963.612804] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 1963.623360] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1963.625394] EXT4-fs (loop6): group descriptors corrupted! 16:57:20 executing program 2: rt_sigaction(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x0, {[0x3]}}, 0x0, 0x8, &(0x7f0000000100)) epoll_pwait(0xffffffffffffffff, &(0x7f0000000040)=[{}, {}, {}], 0x3, 0x8, &(0x7f0000000180)={[0x1f]}, 0x8) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000000), &(0x7f0000000080)='system_u:object_r:syslogd_var_lib_t:s0\x00', 0x27, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x1, 0x1, {0x24, 0x24, 0x1, 0x3, 0x2, 0xfe2d, 0x0, 0x1d, 0x1}}) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x2000, 0x0) r1 = syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000100)) io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x3) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000140)={@private1={0xfc, 0x1, '\x00', 0x6}, 0x2, 0x2, 0x3, 0xc, 0x5e9e}, 0x20) unshare(0x48020200) [ 1963.709721] kauditd_printk_skb: 3 callbacks suppressed [ 1963.709732] audit: type=1400 audit(1697561840.945:96): avc: denied { associate } for pid=12808 comm="syz-executor.2" name="nvram" dev="devtmpfs" ino=99 scontext=system_u:object_r:syslogd_var_lib_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=filesystem permissive=1 [ 1963.725479] EXT4-fs (loop5): unsupported inode size: 0 [ 1963.726127] EXT4-fs (loop5): blocksize: 2048 16:57:20 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d400", 0xe, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) 16:57:20 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000", 0xc, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) 16:57:21 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) sendmsg$nl_generic(r0, 0x0, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) 16:57:21 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000040), 0x1a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) preadv(r0, &(0x7f0000000240)=[{&(0x7f0000000100)=""/19, 0x13}, {&(0x7f0000000340)=""/178, 0xb2}, {&(0x7f0000000400)=""/170, 0xaa}], 0x3, 0x0, 0x5) bind$unix(r1, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) listen(r1, 0x0) openat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x131201, 0x0) r2 = perf_event_open(&(0x7f0000000600)={0x2, 0xffffffffffffff12, 0x4, 0x3f, 0x1, 0x8, 0x0, 0xfffffffffffffff8, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x3}, 0x110, 0x1ff, 0x2, 0x6, 0x8, 0x2, 0x3, 0x0, 0x2}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) r3 = socket$unix(0x1, 0x5, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000002580)={0x0, 0x0, {}, {}, {0x0, @struct, 0x0}}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f00000000c0)={r4, 0x0, 0x20}) ioctl$BTRFS_IOC_SCRUB(r2, 0xc400941b, &(0x7f0000000680)={0x0, 0x2, 0x7ff}) ioctl$BTRFS_IOC_BALANCE_V2(r3, 0xc4009420, &(0x7f0000000a80)={0x1, 0x0, {0x6, @struct={0x0, 0xffff}, r4, 0x1, 0x5, 0xc, 0xff, 0xfffffffffffffffb, 0xb5, @usage=0x1, 0x401, 0x1f, [0xd7c, 0x7, 0x8001, 0x400, 0x6, 0x3]}, {0x1, @usage=0xffffffff, r5, 0x1, 0xff, 0x6, 0x2, 0x100000000, 0x0, @struct={0x0, 0x400000}, 0xea, 0x9, [0x55, 0x3210, 0x3, 0x2, 0x4, 0x80000001]}, {0x40, @struct={0x8, 0x4}, 0x0, 0x4, 0x0, 0x3dec, 0x8, 0xb8, 0x8b, @usage=0x2, 0x8, 0x10000, [0x7fff, 0x3, 0x7ff, 0xc0c, 0x7cb1, 0x4]}, {0x4, 0x7, 0x2}}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000580)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000140)=0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x2a, 0x0, 0xe2, 0x9e, 0x0, 0x10001, 0x22d00, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000004c0)}, 0x0, 0x8fa, 0xfff, 0x0, 0xfffffffffffffffc, 0x8, 0x2a1e, 0x0, 0x80, 0x0, 0x831}, r6, 0x0, r0, 0xa) connect$unix(r3, &(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e) openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000e80), 0x40, 0x0) 16:57:21 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) creat(0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x10000000) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) flistxattr(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b", 0x55, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) r0 = creat(&(0x7f0000000240)='./file0\x00', 0x8c) sendmsg$nl_generic(r0, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, 0x32, 0x10, 0x70bd2d, 0x25dfdbfe, {}, [@typed={0xc, 0x62, 0x0, 0x0, @u64=0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x400c0}, 0x2000c084) [ 1963.875815] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 1963.883464] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 16:57:21 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) sendmsg$nl_generic(r0, 0x0, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) [ 1963.945643] EXT4-fs (loop5): unsupported inode size: 0 [ 1963.946401] EXT4-fs (loop5): blocksize: 2048 16:57:21 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d400", 0xe, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) [ 1964.190285] nfs4: Unknown parameter 'ext4' [ 1964.211698] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue 16:57:34 executing program 2: rt_sigaction(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x0, {[0x3]}}, 0x0, 0x8, &(0x7f0000000100)) epoll_pwait(0xffffffffffffffff, &(0x7f0000000040)=[{}, {}, {}], 0x3, 0x8, &(0x7f0000000180)={[0x1f]}, 0x8) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000000), &(0x7f0000000080)='system_u:object_r:syslogd_var_lib_t:s0\x00', 0x27, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x1, 0x1, {0x24, 0x24, 0x1, 0x3, 0x2, 0xfe2d, 0x0, 0x1d, 0x1}}) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x2000, 0x0) r1 = syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000100)) io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x3) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000140)={@private1={0xfc, 0x1, '\x00', 0x6}, 0x2, 0x2, 0x3, 0xc, 0x5e9e}, 0x20) unshare(0x48020200) 16:57:34 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000040), 0x1a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) preadv(r0, &(0x7f0000000240)=[{&(0x7f0000000100)=""/19, 0x13}, {&(0x7f0000000340)=""/178, 0xb2}, {&(0x7f0000000400)=""/170, 0xaa}], 0x3, 0x0, 0x5) bind$unix(r1, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) listen(r1, 0x0) openat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x131201, 0x0) r2 = perf_event_open(&(0x7f0000000600)={0x2, 0xffffffffffffff12, 0x4, 0x3f, 0x1, 0x8, 0x0, 0xfffffffffffffff8, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x3}, 0x110, 0x1ff, 0x2, 0x6, 0x8, 0x2, 0x3, 0x0, 0x2}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) r3 = socket$unix(0x1, 0x5, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000002580)={0x0, 0x0, {}, {}, {0x0, @struct, 0x0}}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f00000000c0)={r4, 0x0, 0x20}) ioctl$BTRFS_IOC_SCRUB(r2, 0xc400941b, &(0x7f0000000680)={0x0, 0x2, 0x7ff}) ioctl$BTRFS_IOC_BALANCE_V2(r3, 0xc4009420, &(0x7f0000000a80)={0x1, 0x0, {0x6, @struct={0x0, 0xffff}, r4, 0x1, 0x5, 0xc, 0xff, 0xfffffffffffffffb, 0xb5, @usage=0x1, 0x401, 0x1f, [0xd7c, 0x7, 0x8001, 0x400, 0x6, 0x3]}, {0x1, @usage=0xffffffff, r5, 0x1, 0xff, 0x6, 0x2, 0x100000000, 0x0, @struct={0x0, 0x400000}, 0xea, 0x9, [0x55, 0x3210, 0x3, 0x2, 0x4, 0x80000001]}, {0x40, @struct={0x8, 0x4}, 0x0, 0x4, 0x0, 0x3dec, 0x8, 0xb8, 0x8b, @usage=0x2, 0x8, 0x10000, [0x7fff, 0x3, 0x7ff, 0xc0c, 0x7cb1, 0x4]}, {0x4, 0x7, 0x2}}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000580)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000140)=0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x2a, 0x0, 0xe2, 0x9e, 0x0, 0x10001, 0x22d00, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000004c0)}, 0x0, 0x8fa, 0xfff, 0x0, 0xfffffffffffffffc, 0x8, 0x2a1e, 0x0, 0x80, 0x0, 0x831}, r6, 0x0, r0, 0xa) connect$unix(r3, &(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e) openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000e80), 0x40, 0x0) 16:57:34 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000040), 0x1a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) preadv(r0, &(0x7f0000000240)=[{&(0x7f0000000100)=""/19, 0x13}, {&(0x7f0000000340)=""/178, 0xb2}, {&(0x7f0000000400)=""/170, 0xaa}], 0x3, 0x0, 0x5) bind$unix(r1, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) listen(r1, 0x0) openat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x131201, 0x0) r2 = perf_event_open(&(0x7f0000000600)={0x2, 0xffffffffffffff12, 0x4, 0x3f, 0x1, 0x8, 0x0, 0xfffffffffffffff8, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x3}, 0x110, 0x1ff, 0x2, 0x6, 0x8, 0x2, 0x3, 0x0, 0x2}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) r3 = socket$unix(0x1, 0x5, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000002580)={0x0, 0x0, {}, {}, {0x0, @struct, 0x0}}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f00000000c0)={r4, 0x0, 0x20}) ioctl$BTRFS_IOC_SCRUB(r2, 0xc400941b, &(0x7f0000000680)={0x0, 0x2, 0x7ff}) ioctl$BTRFS_IOC_BALANCE_V2(r3, 0xc4009420, &(0x7f0000000a80)={0x1, 0x0, {0x6, @struct={0x0, 0xffff}, r4, 0x1, 0x5, 0xc, 0xff, 0xfffffffffffffffb, 0xb5, @usage=0x1, 0x401, 0x1f, [0xd7c, 0x7, 0x8001, 0x400, 0x6, 0x3]}, {0x1, @usage=0xffffffff, r5, 0x1, 0xff, 0x6, 0x2, 0x100000000, 0x0, @struct={0x0, 0x400000}, 0xea, 0x9, [0x55, 0x3210, 0x3, 0x2, 0x4, 0x80000001]}, {0x40, @struct={0x8, 0x4}, 0x0, 0x4, 0x0, 0x3dec, 0x8, 0xb8, 0x8b, @usage=0x2, 0x8, 0x10000, [0x7fff, 0x3, 0x7ff, 0xc0c, 0x7cb1, 0x4]}, {0x4, 0x7, 0x2}}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000580)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000140)=0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x2a, 0x0, 0xe2, 0x9e, 0x0, 0x10001, 0x22d00, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000004c0)}, 0x0, 0x8fa, 0xfff, 0x0, 0xfffffffffffffffc, 0x8, 0x2a1e, 0x0, 0x80, 0x0, 0x831}, r6, 0x0, r0, 0xa) connect$unix(r3, &(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e) openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000e80), 0x40, 0x0) 16:57:34 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000040), 0x1a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) preadv(r0, &(0x7f0000000240)=[{&(0x7f0000000100)=""/19, 0x13}, {&(0x7f0000000340)=""/178, 0xb2}, {&(0x7f0000000400)=""/170, 0xaa}], 0x3, 0x0, 0x5) bind$unix(r1, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) listen(r1, 0x0) openat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x131201, 0x0) r2 = perf_event_open(&(0x7f0000000600)={0x2, 0xffffffffffffff12, 0x4, 0x3f, 0x1, 0x8, 0x0, 0xfffffffffffffff8, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x3}, 0x110, 0x1ff, 0x2, 0x6, 0x8, 0x2, 0x3, 0x0, 0x2}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) r3 = socket$unix(0x1, 0x5, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000002580)={0x0, 0x0, {}, {}, {0x0, @struct, 0x0}}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f00000000c0)={r4, 0x0, 0x20}) ioctl$BTRFS_IOC_SCRUB(r2, 0xc400941b, &(0x7f0000000680)={0x0, 0x2, 0x7ff}) ioctl$BTRFS_IOC_BALANCE_V2(r3, 0xc4009420, &(0x7f0000000a80)={0x1, 0x0, {0x6, @struct={0x0, 0xffff}, r4, 0x1, 0x5, 0xc, 0xff, 0xfffffffffffffffb, 0xb5, @usage=0x1, 0x401, 0x1f, [0xd7c, 0x7, 0x8001, 0x400, 0x6, 0x3]}, {0x1, @usage=0xffffffff, r5, 0x1, 0xff, 0x6, 0x2, 0x100000000, 0x0, @struct={0x0, 0x400000}, 0xea, 0x9, [0x55, 0x3210, 0x3, 0x2, 0x4, 0x80000001]}, {0x40, @struct={0x8, 0x4}, 0x0, 0x4, 0x0, 0x3dec, 0x8, 0xb8, 0x8b, @usage=0x2, 0x8, 0x10000, [0x7fff, 0x3, 0x7ff, 0xc0c, 0x7cb1, 0x4]}, {0x4, 0x7, 0x2}}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000580)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000140)=0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x2a, 0x0, 0xe2, 0x9e, 0x0, 0x10001, 0x22d00, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000004c0)}, 0x0, 0x8fa, 0xfff, 0x0, 0xfffffffffffffffc, 0x8, 0x2a1e, 0x0, 0x80, 0x0, 0x831}, r6, 0x0, r0, 0xa) connect$unix(r3, &(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e) openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000e80), 0x40, 0x0) 16:57:34 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) sendmsg$nl_generic(r0, 0x0, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) 16:57:34 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) creat(0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x10000000) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) flistxattr(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b", 0x55, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) r0 = creat(&(0x7f0000000240)='./file0\x00', 0x8c) sendmsg$nl_generic(r0, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, 0x32, 0x10, 0x70bd2d, 0x25dfdbfe, {}, [@typed={0xc, 0x62, 0x0, 0x0, @u64=0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x400c0}, 0x2000c084) 16:57:34 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, 0x0, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {0x0, 0x0, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) 16:57:34 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d400", 0xe, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) [ 1977.584901] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 1977.621513] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1977.622633] EXT4-fs (loop6): group descriptors corrupted! [ 1977.652609] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 16:57:34 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x20000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x221004, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000540)='./file0\x00', 0x0, 0x809089, 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2154d4, 0x0) [ 1977.726053] nfs4: Unknown parameter 'ext4' 16:57:34 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x98a) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000001300)=ANY=[@ANYBLOB="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"]) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) flock(r1, 0x6) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x4, 0x0, 0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x14e6}, 0x40002, 0x0, 0x0, 0x4, 0x5, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000002c0), 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY(r0, 0x5000940f, &(0x7f0000000300)={{}, "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"}) pipe(&(0x7f00000014c0)={0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) read(r3, &(0x7f0000000080)=""/48, 0x30) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x9, 0x7f, 0x7, 0x39, 0x0, 0x0, 0x82, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x4, 0x2, @perf_config_ext={0x7, 0xae4f}, 0x1ad04, 0x2, 0x4, 0x3, 0x1, 0x1, 0x8001, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x10, r3, 0x9) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000240)=0x67bb, 0x4) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000100)={0x101, 0x0, 0x0, 'queue0\x00'}) unshare(0x48020200) 16:57:34 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) 16:57:35 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000040), 0x1a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) preadv(r0, &(0x7f0000000240)=[{&(0x7f0000000100)=""/19, 0x13}, {&(0x7f0000000340)=""/178, 0xb2}, {&(0x7f0000000400)=""/170, 0xaa}], 0x3, 0x0, 0x5) bind$unix(r1, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) listen(r1, 0x0) openat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x131201, 0x0) r2 = perf_event_open(&(0x7f0000000600)={0x2, 0xffffffffffffff12, 0x4, 0x3f, 0x1, 0x8, 0x0, 0xfffffffffffffff8, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x3}, 0x110, 0x1ff, 0x2, 0x6, 0x8, 0x2, 0x3, 0x0, 0x2}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) r3 = socket$unix(0x1, 0x5, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000002580)={0x0, 0x0, {}, {}, {0x0, @struct, 0x0}}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f00000000c0)={r4, 0x0, 0x20}) ioctl$BTRFS_IOC_SCRUB(r2, 0xc400941b, &(0x7f0000000680)={0x0, 0x2, 0x7ff}) ioctl$BTRFS_IOC_BALANCE_V2(r3, 0xc4009420, &(0x7f0000000a80)={0x1, 0x0, {0x6, @struct={0x0, 0xffff}, r4, 0x1, 0x5, 0xc, 0xff, 0xfffffffffffffffb, 0xb5, @usage=0x1, 0x401, 0x1f, [0xd7c, 0x7, 0x8001, 0x400, 0x6, 0x3]}, {0x1, @usage=0xffffffff, r5, 0x1, 0xff, 0x6, 0x2, 0x100000000, 0x0, @struct={0x0, 0x400000}, 0xea, 0x9, [0x55, 0x3210, 0x3, 0x2, 0x4, 0x80000001]}, {0x40, @struct={0x8, 0x4}, 0x0, 0x4, 0x0, 0x3dec, 0x8, 0xb8, 0x8b, @usage=0x2, 0x8, 0x10000, [0x7fff, 0x3, 0x7ff, 0xc0c, 0x7cb1, 0x4]}, {0x4, 0x7, 0x2}}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000580)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000140)=0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x2a, 0x0, 0xe2, 0x9e, 0x0, 0x10001, 0x22d00, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000004c0)}, 0x0, 0x8fa, 0xfff, 0x0, 0xfffffffffffffffc, 0x8, 0x2a1e, 0x0, 0x80, 0x0, 0x831}, r6, 0x0, r0, 0xa) connect$unix(r3, &(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="71c8fcdec12c94cc2c956df44d0cfab1b74ae676aaf48ee784f18fa85887742923c7702a7c662659f337ab3d7a78b4ecf76f4f78d4ae2b6a52967d6401e9c68c6906297336eecfafa13e1a6858f797332f429ead621b12f7d737fa05091fd2150230446769df0f46629d692751480b4c5f", 0x71, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000e80), 0x40, 0x0) [ 1977.827614] EXT4-fs (loop5): unsupported inode size: 0 [ 1977.828271] EXT4-fs (loop5): blocksize: 2048 [ 1977.847916] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1977.849951] EXT4-fs (loop0): group descriptors corrupted! 16:57:35 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, 0x0, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {0x0, 0x0, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) 16:57:35 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000040), 0x1a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) preadv(r0, &(0x7f0000000240)=[{&(0x7f0000000100)=""/19, 0x13}, {&(0x7f0000000340)=""/178, 0xb2}, {&(0x7f0000000400)=""/170, 0xaa}], 0x3, 0x0, 0x5) bind$unix(r1, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) listen(r1, 0x0) openat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x131201, 0x0) r2 = perf_event_open(&(0x7f0000000600)={0x2, 0xffffffffffffff12, 0x4, 0x3f, 0x1, 0x8, 0x0, 0xfffffffffffffff8, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x3}, 0x110, 0x1ff, 0x2, 0x6, 0x8, 0x2, 0x3, 0x0, 0x2}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) r3 = socket$unix(0x1, 0x5, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000002580)={0x0, 0x0, {}, {}, {0x0, @struct, 0x0}}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f00000000c0)={r4, 0x0, 0x20}) ioctl$BTRFS_IOC_SCRUB(r2, 0xc400941b, &(0x7f0000000680)={0x0, 0x2, 0x7ff}) ioctl$BTRFS_IOC_BALANCE_V2(r3, 0xc4009420, &(0x7f0000000a80)={0x1, 0x0, {0x6, @struct={0x0, 0xffff}, r4, 0x1, 0x5, 0xc, 0xff, 0xfffffffffffffffb, 0xb5, @usage=0x1, 0x401, 0x1f, [0xd7c, 0x7, 0x8001, 0x400, 0x6, 0x3]}, {0x1, @usage=0xffffffff, r5, 0x1, 0xff, 0x6, 0x2, 0x100000000, 0x0, @struct={0x0, 0x400000}, 0xea, 0x9, [0x55, 0x3210, 0x3, 0x2, 0x4, 0x80000001]}, {0x40, @struct={0x8, 0x4}, 0x0, 0x4, 0x0, 0x3dec, 0x8, 0xb8, 0x8b, @usage=0x2, 0x8, 0x10000, [0x7fff, 0x3, 0x7ff, 0xc0c, 0x7cb1, 0x4]}, {0x4, 0x7, 0x2}}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000580)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000140)=0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x2a, 0x0, 0xe2, 0x9e, 0x0, 0x10001, 0x22d00, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000004c0)}, 0x0, 0x8fa, 0xfff, 0x0, 0xfffffffffffffffc, 0x8, 0x2a1e, 0x0, 0x80, 0x0, 0x831}, r6, 0x0, r0, 0xa) connect$unix(r3, &(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e) openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000e80), 0x40, 0x0) [ 1977.960318] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1977.961394] EXT4-fs (loop6): group descriptors corrupted! [ 1977.964262] nfs4: Unknown parameter 'ext4' 16:57:35 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000040), 0x1a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) preadv(r0, &(0x7f0000000240)=[{&(0x7f0000000100)=""/19, 0x13}, {&(0x7f0000000340)=""/178, 0xb2}, {&(0x7f0000000400)=""/170, 0xaa}], 0x3, 0x0, 0x5) bind$unix(r1, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) listen(r1, 0x0) openat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x131201, 0x0) r2 = perf_event_open(&(0x7f0000000600)={0x2, 0xffffffffffffff12, 0x4, 0x3f, 0x1, 0x8, 0x0, 0xfffffffffffffff8, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x3}, 0x110, 0x1ff, 0x2, 0x6, 0x8, 0x2, 0x3, 0x0, 0x2}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) r3 = socket$unix(0x1, 0x5, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000002580)={0x0, 0x0, {}, {}, {0x0, @struct, 0x0}}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f00000000c0)={r4, 0x0, 0x20}) ioctl$BTRFS_IOC_SCRUB(r2, 0xc400941b, &(0x7f0000000680)={0x0, 0x2, 0x7ff}) ioctl$BTRFS_IOC_BALANCE_V2(r3, 0xc4009420, &(0x7f0000000a80)={0x1, 0x0, {0x6, @struct={0x0, 0xffff}, r4, 0x1, 0x5, 0xc, 0xff, 0xfffffffffffffffb, 0xb5, @usage=0x1, 0x401, 0x1f, [0xd7c, 0x7, 0x8001, 0x400, 0x6, 0x3]}, {0x1, @usage=0xffffffff, r5, 0x1, 0xff, 0x6, 0x2, 0x100000000, 0x0, @struct={0x0, 0x400000}, 0xea, 0x9, [0x55, 0x3210, 0x3, 0x2, 0x4, 0x80000001]}, {0x40, @struct={0x8, 0x4}, 0x0, 0x4, 0x0, 0x3dec, 0x8, 0xb8, 0x8b, @usage=0x2, 0x8, 0x10000, [0x7fff, 0x3, 0x7ff, 0xc0c, 0x7cb1, 0x4]}, {0x4, 0x7, 0x2}}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000580)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000140)=0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x2a, 0x0, 0xe2, 0x9e, 0x0, 0x10001, 0x22d00, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000004c0)}, 0x0, 0x8fa, 0xfff, 0x0, 0xfffffffffffffffc, 0x8, 0x2a1e, 0x0, 0x80, 0x0, 0x831}, r6, 0x0, r0, 0xa) connect$unix(r3, &(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="71c8fcdec12c94cc2c956df44d0cfab1b74ae676aaf48ee784f18fa85887742923c7702a7c662659f337ab3d7a78b4ecf76f4f78d4ae2b6a52967d6401e9c68c6906297336eecfafa13e1a6858f797332f429ead621b12f7d737fa05091fd2150230446769df0f46629d692751480b4c5f", 0x71, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000e80), 0x40, 0x0) 16:57:35 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) creat(0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x10000000) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) flistxattr(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b000000", 0x58, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) r0 = creat(&(0x7f0000000240)='./file0\x00', 0x8c) sendmsg$nl_generic(r0, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, 0x32, 0x10, 0x70bd2d, 0x25dfdbfe, {}, [@typed={0xc, 0x62, 0x0, 0x0, @u64=0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x400c0}, 0x2000c084) [ 1978.023276] nfs4: Unknown parameter 'ext4' [ 1978.205360] EXT4-fs (loop5): unsupported inode size: 0 [ 1978.206064] EXT4-fs (loop5): blocksize: 2048 16:57:50 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x98a) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000001300)=ANY=[@ANYBLOB="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"]) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) flock(r1, 0x6) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x4, 0x0, 0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x14e6}, 0x40002, 0x0, 0x0, 0x4, 0x5, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000002c0), 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY(r0, 0x5000940f, &(0x7f0000000300)={{}, "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"}) pipe(&(0x7f00000014c0)={0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) read(r3, &(0x7f0000000080)=""/48, 0x30) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x9, 0x7f, 0x7, 0x39, 0x0, 0x0, 0x82, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x4, 0x2, @perf_config_ext={0x7, 0xae4f}, 0x1ad04, 0x2, 0x4, 0x3, 0x1, 0x1, 0x8001, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x10, r3, 0x9) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000240)=0x67bb, 0x4) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000100)={0x101, 0x0, 0x0, 'queue0\x00'}) unshare(0x48020200) 16:57:50 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, 0x0, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {0x0, 0x0, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) 16:57:50 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000280)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="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"]) sendfile(r1, r2, &(0x7f0000000080)=0x8, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) fork() r4 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r4}, &(0x7f0000000040)) pipe(&(0x7f00000014c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f0000000000)="e7", 0x1) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf8, 0x40, 0x80, 0x29, 0x0, 0x63, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x8, 0x69d68271203d2ac1, @perf_config_ext={0x1, 0xfffffffffffffff7}, 0x50000, 0x2, 0x7f, 0x8, 0xfffffffffffffffa, 0x4, 0xd5eb, 0x0, 0x1, 0x0, 0x1}, r4, 0x3, r5, 0x3) fcntl$dupfd(r0, 0x0, r3) 16:57:50 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000040), 0x1a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) preadv(r0, &(0x7f0000000240)=[{&(0x7f0000000100)=""/19, 0x13}, {&(0x7f0000000340)=""/178, 0xb2}, {&(0x7f0000000400)=""/170, 0xaa}], 0x3, 0x0, 0x5) bind$unix(r1, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) listen(r1, 0x0) openat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x131201, 0x0) r2 = perf_event_open(&(0x7f0000000600)={0x2, 0xffffffffffffff12, 0x4, 0x3f, 0x1, 0x8, 0x0, 0xfffffffffffffff8, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x3}, 0x110, 0x1ff, 0x2, 0x6, 0x8, 0x2, 0x3, 0x0, 0x2}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) r3 = socket$unix(0x1, 0x5, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000002580)={0x0, 0x0, {}, {}, {0x0, @struct, 0x0}}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f00000000c0)={r4, 0x0, 0x20}) ioctl$BTRFS_IOC_SCRUB(r2, 0xc400941b, &(0x7f0000000680)={0x0, 0x2, 0x7ff}) ioctl$BTRFS_IOC_BALANCE_V2(r3, 0xc4009420, &(0x7f0000000a80)={0x1, 0x0, {0x6, @struct={0x0, 0xffff}, r4, 0x1, 0x5, 0xc, 0xff, 0xfffffffffffffffb, 0xb5, @usage=0x1, 0x401, 0x1f, [0xd7c, 0x7, 0x8001, 0x400, 0x6, 0x3]}, {0x1, @usage=0xffffffff, r5, 0x1, 0xff, 0x6, 0x2, 0x100000000, 0x0, @struct={0x0, 0x400000}, 0xea, 0x9, [0x55, 0x3210, 0x3, 0x2, 0x4, 0x80000001]}, {0x40, @struct={0x8, 0x4}, 0x0, 0x4, 0x0, 0x3dec, 0x8, 0xb8, 0x8b, @usage=0x2, 0x8, 0x10000, [0x7fff, 0x3, 0x7ff, 0xc0c, 0x7cb1, 0x4]}, {0x4, 0x7, 0x2}}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000580)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000140)=0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x2a, 0x0, 0xe2, 0x9e, 0x0, 0x10001, 0x22d00, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000004c0)}, 0x0, 0x8fa, 0xfff, 0x0, 0xfffffffffffffffc, 0x8, 0x2a1e, 0x0, 0x80, 0x0, 0x831}, r6, 0x0, r0, 0xa) connect$unix(r3, &(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="71c8fcdec12c94cc2c956df44d0cfab1b74ae676aaf48ee784f18fa85887742923c7702a7c662659f337ab3d7a78b4ecf76f4f78d4ae2b6a52967d6401e9c68c6906297336eecfafa13e1a6858f797332f429ead621b12f7d737fa05091fd2150230446769df0f46629d692751480b4c5f", 0x71, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000e80), 0x40, 0x0) 16:57:50 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000040), 0x1a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) preadv(r0, &(0x7f0000000240)=[{&(0x7f0000000100)=""/19, 0x13}, {&(0x7f0000000340)=""/178, 0xb2}, {&(0x7f0000000400)=""/170, 0xaa}], 0x3, 0x0, 0x5) bind$unix(r1, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) listen(r1, 0x0) openat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x131201, 0x0) r2 = perf_event_open(&(0x7f0000000600)={0x2, 0xffffffffffffff12, 0x4, 0x3f, 0x1, 0x8, 0x0, 0xfffffffffffffff8, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x3}, 0x110, 0x1ff, 0x2, 0x6, 0x8, 0x2, 0x3, 0x0, 0x2}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) r3 = socket$unix(0x1, 0x5, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000002580)={0x0, 0x0, {}, {}, {0x0, @struct, 0x0}}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f00000000c0)={r4, 0x0, 0x20}) ioctl$BTRFS_IOC_SCRUB(r2, 0xc400941b, &(0x7f0000000680)={0x0, 0x2, 0x7ff}) ioctl$BTRFS_IOC_BALANCE_V2(r3, 0xc4009420, &(0x7f0000000a80)={0x1, 0x0, {0x6, @struct={0x0, 0xffff}, r4, 0x1, 0x5, 0xc, 0xff, 0xfffffffffffffffb, 0xb5, @usage=0x1, 0x401, 0x1f, [0xd7c, 0x7, 0x8001, 0x400, 0x6, 0x3]}, {0x1, @usage=0xffffffff, r5, 0x1, 0xff, 0x6, 0x2, 0x100000000, 0x0, @struct={0x0, 0x400000}, 0xea, 0x9, [0x55, 0x3210, 0x3, 0x2, 0x4, 0x80000001]}, {0x40, @struct={0x8, 0x4}, 0x0, 0x4, 0x0, 0x3dec, 0x8, 0xb8, 0x8b, @usage=0x2, 0x8, 0x10000, [0x7fff, 0x3, 0x7ff, 0xc0c, 0x7cb1, 0x4]}, {0x4, 0x7, 0x2}}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000580)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000140)=0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x2a, 0x0, 0xe2, 0x9e, 0x0, 0x10001, 0x22d00, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000004c0)}, 0x0, 0x8fa, 0xfff, 0x0, 0xfffffffffffffffc, 0x8, 0x2a1e, 0x0, 0x80, 0x0, 0x831}, r6, 0x0, r0, 0xa) connect$unix(r3, &(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="71c8fcdec12c94cc2c956df44d0cfab1b74ae676aaf48ee784f18fa85887742923c7702a7c662659f337ab3d7a78b4ecf76f4f78d4ae2b6a52967d6401e9c68c6906297336eecfafa13e1a6858f797332f429ead621b12f7d737fa05091fd2150230446769df0f46629d692751480b4c5f", 0x71, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000e80), 0x40, 0x0) 16:57:50 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) creat(0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x10000000) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) flistxattr(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b000000", 0x58, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) r0 = creat(&(0x7f0000000240)='./file0\x00', 0x8c) sendmsg$nl_generic(r0, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, 0x32, 0x10, 0x70bd2d, 0x25dfdbfe, {}, [@typed={0xc, 0x62, 0x0, 0x0, @u64=0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x400c0}, 0x2000c084) 16:57:50 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) 16:57:50 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) sendmsg$nl_generic(r0, 0x0, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) [ 1993.670793] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1993.672894] EXT4-fs (loop0): group descriptors corrupted! [ 1993.704924] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1993.706143] EXT4-fs (loop6): group descriptors corrupted! [ 1993.757445] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 16:57:51 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000040), 0x1a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) preadv(r0, &(0x7f0000000240)=[{&(0x7f0000000100)=""/19, 0x13}, {&(0x7f0000000340)=""/178, 0xb2}, {&(0x7f0000000400)=""/170, 0xaa}], 0x3, 0x0, 0x5) bind$unix(r1, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) listen(r1, 0x0) openat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x131201, 0x0) r2 = perf_event_open(&(0x7f0000000600)={0x2, 0xffffffffffffff12, 0x4, 0x3f, 0x1, 0x8, 0x0, 0xfffffffffffffff8, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x3}, 0x110, 0x1ff, 0x2, 0x6, 0x8, 0x2, 0x3, 0x0, 0x2}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) r3 = socket$unix(0x1, 0x5, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000002580)={0x0, 0x0, {}, {}, {0x0, @struct, 0x0}}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f00000000c0)={r4, 0x0, 0x20}) ioctl$BTRFS_IOC_SCRUB(r2, 0xc400941b, &(0x7f0000000680)={0x0, 0x2, 0x7ff}) ioctl$BTRFS_IOC_BALANCE_V2(r3, 0xc4009420, &(0x7f0000000a80)={0x1, 0x0, {0x6, @struct={0x0, 0xffff}, r4, 0x1, 0x5, 0xc, 0xff, 0xfffffffffffffffb, 0xb5, @usage=0x1, 0x401, 0x1f, [0xd7c, 0x7, 0x8001, 0x400, 0x6, 0x3]}, {0x1, @usage=0xffffffff, r5, 0x1, 0xff, 0x6, 0x2, 0x100000000, 0x0, @struct={0x0, 0x400000}, 0xea, 0x9, [0x55, 0x3210, 0x3, 0x2, 0x4, 0x80000001]}, {0x40, @struct={0x8, 0x4}, 0x0, 0x4, 0x0, 0x3dec, 0x8, 0xb8, 0x8b, @usage=0x2, 0x8, 0x10000, [0x7fff, 0x3, 0x7ff, 0xc0c, 0x7cb1, 0x4]}, {0x4, 0x7, 0x2}}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000580)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000140)) connect$unix(r3, &(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e) r6 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendto$unix(r6, &(0x7f00000001c0)="71c8fcdec12c94cc2c956df44d0cfab1b74ae676aaf48ee784f18fa85887742923c7702a7c662659f337ab3d7a78b4ecf76f4f78d4ae2b6a52967d6401e9c68c6906297336eecfafa13e1a6858f797332f429ead621b12f7d737fa05091fd2150230446769df0f46629d692751480b4c5f", 0x71, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000e80), 0x40, 0x0) [ 1993.777112] EXT4-fs (loop5): unsupported inode size: 0 [ 1993.778371] EXT4-fs (loop5): blocksize: 2048 [ 1993.792199] nfs4: Unknown parameter 'ext4' [ 1993.810133] nfs4: Unknown parameter 'ext4' 16:57:51 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x42, 0x7) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) r2 = signalfd(r1, &(0x7f0000000480), 0x8) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f00000004c0)={0x9000000a}) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000200)={r0, 0x8, 0x1000, 0x80000001}) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x4, 0x0, 0x393d, 0x1, &(0x7f0000000540)="1f823c670ba22f29251036a64b3a9a77fea70f07d8451c0d47ab7db4d1ed9d5ab92336b8bf8ce2180903e8464eeb5b7ed82ccfa7cf80d73885a2cf688144d96336153fa3a561f1b1c34cce97b128bbabac71c17e85f5925a170abc077d43a6a4507f7e14ed21ac74b84d6ffff125535c24869248f1837e7dc0d3cc89346e688da77130cf81d0d957a55bec719fca8fdd5726d0f4418787b08c54ee6735cab96c1294ffbc514f66f58488ef8196d15d3ec0d944e9876a9bcf25bfac1a75bf361076c8fad020ae4cf189d8a05e9e5de8bab2bd91c82fe93d8c2ef51c965c81e408eb22281978fd9f0cc85fb9b4", 0x4, 0x0, 0x0, {0x2}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000300)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x1, 0x0, 0x0, 0x0, 0x12345, 0x0, 0x0, 0x1}, 0x0) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r3, 0x0, 0x4048094) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) syz_mount_image$nfs4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) rmdir(&(0x7f0000000000)='./file0\x00') bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e22, 0x8, @dev={0xfe, 0x80, '\x00', 0x57}, 0x3}, 0x1c) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000500)={0xc0000003}) listen(0xffffffffffffffff, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ppoll(&(0x7f0000000240)=[{}, {r4, 0x82}, {r0, 0x8109}, {0xffffffffffffffff, 0x4}, {r0, 0x10090}], 0x5, &(0x7f00000002c0), &(0x7f0000000440)={[0xb9]}, 0x8) clone3(&(0x7f0000000080)={0x1040900, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) gettid() process_vm_readv(0x0, &(0x7f0000001a40)=[{&(0x7f00000018c0)=""/31, 0x1f}, {&(0x7f0000000340)=""/136, 0x88}, {&(0x7f0000001980)=""/158, 0x9e}], 0x3, &(0x7f0000001ec0)=[{&(0x7f0000001a80)=""/101, 0xffffffffffffff75}, {&(0x7f0000002240)=""/183, 0xb7}, {&(0x7f0000001bc0)=""/122, 0x7a}, {&(0x7f0000001c40)=""/163, 0xa3}, {&(0x7f0000001d00)=""/231, 0xe7}, {&(0x7f0000001e00)}, {&(0x7f0000000400)=""/9, 0x9}, {&(0x7f0000001b00)=""/46, 0x2e}], 0x8, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x8, 0x0, 0x0, 0x0, 0x100, 0xfffe}) 16:57:51 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, 0x0, &(0x7f0000000100), 0x180010, 0x0) openat(r0, &(0x7f0000000380)='./file1\x00', 0x200001, 0x40) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x3fd0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') creat(&(0x7f0000000200)='./file1\x00', 0x2) chroot(&(0x7f0000000280)='./file2\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x107142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000400)=0x0) syz_mount_image$iso9660(&(0x7f0000000300), &(0x7f0000000340)='./file0\x00', 0x9, 0x0, &(0x7f00000003c0), 0x10024, &(0x7f0000000440)={[{@map_normal}], [{@dont_hash}, {@measure}, {@subj_type={'subj_type', 0x3d, '@:#-(,'}}, {@dont_hash}, {@context={'context', 0x3d, 'user_u'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@fowner_lt={'fowner<', r3}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}) write(0xffffffffffffffff, &(0x7f0000000000)="e7", 0x1) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000500), 0x20302, 0x0) renameat(0xffffffffffffffff, &(0x7f00000003c0)='./file1\x00', r4, &(0x7f0000000540)='./file2\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, r1) r5 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x20000, 0x1e9) r6 = eventfd2(0xffff, 0x80000) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, &(0x7f0000000180)={{0x1, 0x1, 0x18, r6}, './file2\x00'}) sendfile(r1, r2, 0x0, 0x100000001) [ 1993.899436] EXT4-fs warning (device sda): verify_group_input:146: Cannot add at group 8 (only 16 groups) 16:57:51 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) 16:57:51 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, 0x0, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) 16:57:51 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) creat(0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x10000000) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) flistxattr(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b000000", 0x58, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) r0 = creat(&(0x7f0000000240)='./file0\x00', 0x8c) sendmsg$nl_generic(r0, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, 0x32, 0x10, 0x70bd2d, 0x25dfdbfe, {}, [@typed={0xc, 0x62, 0x0, 0x0, @u64=0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x400c0}, 0x2000c084) 16:57:51 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) sendmsg$nl_generic(r0, 0x0, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) 16:57:51 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) [ 1993.995877] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1993.997913] EXT4-fs (loop0): group descriptors corrupted! [ 1994.041065] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1994.043218] EXT4-fs (loop6): group descriptors corrupted! [ 1994.062772] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1994.063932] EXT4-fs (loop2): group descriptors corrupted! [ 1994.256541] nfs4: Unknown parameter 'ext4' [ 1994.262673] EXT4-fs (loop5): unsupported inode size: 0 [ 1994.263361] EXT4-fs (loop5): blocksize: 2048 [ 1994.275217] nfs4: Unknown parameter 'ext4' [ 1994.283214] nfs4: Unknown parameter 'ext4' 16:58:06 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000040), 0x1a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) preadv(r0, &(0x7f0000000240)=[{&(0x7f0000000100)=""/19, 0x13}, {&(0x7f0000000340)=""/178, 0xb2}, {&(0x7f0000000400)=""/170, 0xaa}], 0x3, 0x0, 0x5) bind$unix(r1, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) listen(r1, 0x0) openat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x131201, 0x0) r2 = perf_event_open(&(0x7f0000000600)={0x2, 0xffffffffffffff12, 0x4, 0x3f, 0x1, 0x8, 0x0, 0xfffffffffffffff8, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x3}, 0x110, 0x1ff, 0x2, 0x6, 0x8, 0x2, 0x3, 0x0, 0x2}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) r3 = socket$unix(0x1, 0x5, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000002580)={0x0, 0x0, {}, {}, {0x0, @struct, 0x0}}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f00000000c0)={r4, 0x0, 0x20}) ioctl$BTRFS_IOC_SCRUB(r2, 0xc400941b, &(0x7f0000000680)={0x0, 0x2, 0x7ff}) ioctl$BTRFS_IOC_BALANCE_V2(r3, 0xc4009420, &(0x7f0000000a80)={0x1, 0x0, {0x6, @struct={0x0, 0xffff}, r4, 0x1, 0x5, 0xc, 0xff, 0xfffffffffffffffb, 0xb5, @usage=0x1, 0x401, 0x1f, [0xd7c, 0x7, 0x8001, 0x400, 0x6, 0x3]}, {0x1, @usage=0xffffffff, r5, 0x1, 0xff, 0x6, 0x2, 0x100000000, 0x0, @struct={0x0, 0x400000}, 0xea, 0x9, [0x55, 0x3210, 0x3, 0x2, 0x4, 0x80000001]}, {0x40, @struct={0x8, 0x4}, 0x0, 0x4, 0x0, 0x3dec, 0x8, 0xb8, 0x8b, @usage=0x2, 0x8, 0x10000, [0x7fff, 0x3, 0x7ff, 0xc0c, 0x7cb1, 0x4]}, {0x4, 0x7, 0x2}}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000580)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000140)) connect$unix(r3, &(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e) r6 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendto$unix(r6, &(0x7f00000001c0)="71c8fcdec12c94cc2c956df44d0cfab1b74ae676aaf48ee784f18fa85887742923c7702a7c662659f337ab3d7a78b4ecf76f4f78d4ae2b6a52967d6401e9c68c6906297336eecfafa13e1a6858f797332f429ead621b12f7d737fa05091fd2150230446769df0f46629d692751480b4c5f", 0x71, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000e80), 0x40, 0x0) 16:58:06 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, 0x0, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) 16:58:06 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) sendmsg$nl_generic(r0, 0x0, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) 16:58:06 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x40000, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0xc0) io_submit(0x0, 0x7, &(0x7f0000000340)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40005, 0x1f}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_FSYNC={0x3, 0x3, 0x0, @fd_index=0x6}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000140)=@IORING_OP_WRITE={0x17, 0x5, 0x2007, @fd=r0, 0xe30, &(0x7f00000001c0)="f0fb06ad25e6a99d197a24e682ddb5ae989f8538a9f29e7211f3e7d99813ebb570ebfa7d8d42bb9aa5620b5722b598001a35021ada825435a0bb1ce1", 0x3c, 0x8}, 0x3) write(r2, &(0x7f0000000240)="01", 0x1) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000280)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x3, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10000, 0x0, {0x1}}, 0x5) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0/file0\x00', 0x404100, 0x100) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1, 0x80010, r1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x10) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0/file0\x00', 0x650483, 0x120) r3 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa008, 0x0, 0xffffff29}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstatfs(r3, &(0x7f00000000c0)=""/65) sendfile(r0, r1, 0x0, 0x20d315) 16:58:06 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) [ 2008.840371] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2008.842443] EXT4-fs (loop6): group descriptors corrupted! 16:58:06 executing program 1: sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x10, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000580)=ANY=[@ANYBLOB="9c0000004000000325bd7000000000000000000008009100", @ANYRES32=0x0, @ANYBLOB="5c009280570050004e0057b0c26ea2351ead7c206b6a9b83d5e500101646dd8df56efb423972fc844a49751cbcb68b64636f44fd5d55d43b3460c9a5c739c27225e742e6c16efaf04c2dedcc72aab4b6728de0dfb11fe94c61d7c5002400008014000d00000000000000000000000000000000000c0037000600000000000000"], 0x9c}}, 0x24000040) timerfd_settime(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="1c0000001a0001010000000000000000e9ffffff7a828f25ec5b0000"], 0x1c}}, 0x0) readv(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/183, 0xb7}, {&(0x7f0000000400)=""/253, 0xfd}], 0x2) unshare(0x48020200) 16:58:06 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) creat(0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x10000000) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) flistxattr(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b00000000", 0x59, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) r0 = creat(&(0x7f0000000240)='./file0\x00', 0x8c) sendmsg$nl_generic(r0, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, 0x32, 0x10, 0x70bd2d, 0x25dfdbfe, {}, [@typed={0xc, 0x62, 0x0, 0x0, @u64=0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x400c0}, 0x2000c084) 16:58:06 executing program 2: memfd_create(&(0x7f00000003c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\x82\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\xb5\xc6#w\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87\x8d\x8d\x82|\x94\x10\xdaU', 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/seq/timer\x00', 0x0, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000340)={0x3bc, 0x1c, 0x4, 0x70bd28, 0x25dfdbfc, {0x9}, [@nested={0x1f0, 0x91, 0x0, 0x1, [@generic="5f3d787f5d4ede8a4957d8641b321e896ad01a28b6123bdc2fb611032dca40", @generic="80bdb5f8fe71801ea5dc9686cff802ce01acc21a75e450dd6661e5f961bba9c53e44f0db96af444aa819c2463779bbd564807ff24b0d4a1cb5da346e3bec9f7e797b865f0b41d1782372f5199afc695c02850aab328b464ce996db00a1455d8d19b232059d2ed49858898809d8afd5ae0d2a251bfdab0ab7384614adc0ef80a36ccf1690f544589271cdb8a971e02fbc81a78324ff37cfd36d001efd2aa2e4acc23ec19541c2544b4363bcfc3faa1c3922322a813693b4fb3f892bd767c74ba96b5082b0d9446e6fd92019a94217e98c1b58d37cb883aa7a1ae5c46096cfccaf22b752af1a49fd4cfc8fe35d125317", @typed={0x8, 0x90, 0x0, 0x0, @uid=0xffffffffffffffff}, @typed={0x8, 0x3, 0x0, 0x0, @u32=0xfffff0d4}, @typed={0x8, 0x36, 0x0, 0x0, @ipv4=@dev={0xac, 0x14, 0x14, 0x36}}, @generic="b9a79d65b18d81572f5e7fa2997a8bd4ae92a43428dd0d93e5618b9b05441b0e968acecaf273c5f9e435990d6b8deaa764b39c06de27a214c40b5d1a432c49620da131f3d06a326ae9ee6861253198ab0ad375f96e75bd6bda028259d555fc460f2086873e1b9e61678983f66b6f47b64503653a3ffc14911511d5a0ad66d302d48afea157da65d5e6050a281afc9106def9e7fd059cec78b51ef064bbd47fcf0be872dc5493a3bac98f7070ba2f79dadbfb7e54a57a228cdb68196f4154", @typed={0x8, 0x0, 0x0, 0x0, @pid=0xffffffffffffffff}]}, @generic="4eef3bce62e984b85cc0036e6898867b8892964ae12f59b93f31453e64102f4d17e213121798de777f1c416cf41d5759e014dcbcf92a2dde18e516e50edb5fe279b55806b4acaa5d1862bf5cdef0487015189c9e330f5b86c37a4e87a76bc36a65533fea0114baa067829db2a14117f915e9c37b2825aa1eb6666f38c045c91a2e39117be877d025c5a9d97aee680978251f38340ac43832af9fff03c57baaa23902a6686188e2b2af5f68c04aa8471d5c5ebf36896675483218175389df0303ba9d62b1a20669b6b3a7f4272bb7e923bfd529aacf8240bf", @generic="ab6b2399ff2222e23e73d9eabb0bb800fb299e21c3aa3c86706052c6db154d6549ec0a90ca173e24981f869e60e3c3a5359d7e59968d492fc4f93a504c04052c53f01872caeaf76cb6638a7270a3cc4c9e12e1c9b2f791fcf9d7772ead432e3ff9bfa438a0572d106c9f563d81f51ecf959415a58256460b9345071366b3e242783e865454f6070af1dbddd021218d28a9593437b1bf8747d0470761fc6ea4910650da0ca3cb8954c09de7df52bc1c17fdba17752799d0d28b07bd2563c9f9d2b787814e6a03c0257d4f185ac301799173c8be5fdf3b476e345208ed954fb5"]}, 0x3bc}, 0x1, 0x0, 0x0, 0x22060040}, 0x20000000) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@nl=@unspec, 0x80) ftruncate(r0, 0xa2c1) pipe2(&(0x7f0000000000), 0x84000) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r1, &(0x7f0000000000), 0x1b4000) [ 2008.926541] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 2008.932905] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 2008.952670] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 2008.972885] nfs4: Unknown parameter 'ext4' [ 2008.983603] nfs4: Unknown parameter 'ext4' 16:58:06 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, 0x0, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) 16:58:06 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) sendmsg$nl_generic(r0, 0x0, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) 16:58:06 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) [ 2009.203436] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2009.205539] EXT4-fs (loop6): group descriptors corrupted! 16:58:06 executing program 3: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x1a30c1, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xa, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000002180)=ANY=[], 0x78) ioprio_get$pid(0x2, 0x0) [ 2009.247136] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 16:58:06 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000040), 0x1a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) preadv(r0, &(0x7f0000000240)=[{&(0x7f0000000100)=""/19, 0x13}, {&(0x7f0000000340)=""/178, 0xb2}, {&(0x7f0000000400)=""/170, 0xaa}], 0x3, 0x0, 0x5) bind$unix(r1, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) listen(r1, 0x0) openat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x131201, 0x0) r2 = perf_event_open(&(0x7f0000000600)={0x2, 0xffffffffffffff12, 0x4, 0x3f, 0x1, 0x8, 0x0, 0xfffffffffffffff8, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x3}, 0x110, 0x1ff, 0x2, 0x6, 0x8, 0x2, 0x3, 0x0, 0x2}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) r3 = socket$unix(0x1, 0x5, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000002580)={0x0, 0x0, {}, {}, {0x0, @struct, 0x0}}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f00000000c0)={r4, 0x0, 0x20}) ioctl$BTRFS_IOC_SCRUB(r2, 0xc400941b, &(0x7f0000000680)={0x0, 0x2, 0x7ff}) ioctl$BTRFS_IOC_BALANCE_V2(r3, 0xc4009420, &(0x7f0000000a80)={0x1, 0x0, {0x6, @struct={0x0, 0xffff}, r4, 0x1, 0x5, 0xc, 0xff, 0xfffffffffffffffb, 0xb5, @usage=0x1, 0x401, 0x1f, [0xd7c, 0x7, 0x8001, 0x400, 0x6, 0x3]}, {0x1, @usage=0xffffffff, r5, 0x1, 0xff, 0x6, 0x2, 0x100000000, 0x0, @struct={0x0, 0x400000}, 0xea, 0x9, [0x55, 0x3210, 0x3, 0x2, 0x4, 0x80000001]}, {0x40, @struct={0x8, 0x4}, 0x0, 0x4, 0x0, 0x3dec, 0x8, 0xb8, 0x8b, @usage=0x2, 0x8, 0x10000, [0x7fff, 0x3, 0x7ff, 0xc0c, 0x7cb1, 0x4]}, {0x4, 0x7, 0x2}}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000580)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000140)) connect$unix(r3, &(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e) r6 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendto$unix(r6, &(0x7f00000001c0)="71c8fcdec12c94cc2c956df44d0cfab1b74ae676aaf48ee784f18fa85887742923c7702a7c662659f337ab3d7a78b4ecf76f4f78d4ae2b6a52967d6401e9c68c6906297336eecfafa13e1a6858f797332f429ead621b12f7d737fa05091fd2150230446769df0f46629d692751480b4c5f", 0x71, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000e80), 0x40, 0x0) [ 2009.386650] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 16:58:06 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000, 0x4, 0x0, 0x0, 0x0, 0xc0000000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r1, 0x0) mount$cgroup(0x0, &(0x7f00000004c0)='./file3\x00', &(0x7f0000000500), 0x2010840, &(0x7f00000005c0)=ANY=[@ANYBLOB='obj_type=,dont_appraise,euid=', @ANYRESDEC=r1, @ANYBLOB="2c6d6561737572652c6d6561737572652c68e173682c6f626a5f726f6c653d76666174002c61756469742c657569643dd752", @ANYRESDEC=0xee00, @ANYBLOB=',\x00']) ioctl$AUTOFS_IOC_READY(0xffffffffffffffff, 0x9360, 0x2d0d) r2 = geteuid() lsetxattr$security_capability(&(0x7f00000001c0)='./file2\x00', &(0x7f00000003c0), &(0x7f0000000480)=@v3={0x3000000, [{0x57f, 0xffff8001}, {0x1, 0x7}], r2}, 0x18, 0x2) r3 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf7, 0x12, 0x9, 0x6, 0x0, 0x100, 0x4c80, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8001, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x8002, 0x0, 0x200, 0x9, 0x1, 0x7, 0x7f, 0x0, 0x400, 0x0, 0x2}, 0xffffffffffffffff, 0x5, r0, 0x3) r4 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$int_in(r6, 0x5452, 0x0) ioctl$int_in(r3, 0x5421, &(0x7f0000000400)=0x8) ioctl$EXT4_IOC_MOVE_EXT(r6, 0xc028660f, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x6, 0xb0}) sendfile(r4, r5, 0x0, 0x100000001) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xf, &(0x7f0000000000)=0x1000000, 0x4) sendmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000300)="05038b000013890000004c435ce0f87181858ced753d49d8ecb2a18956fd475167c74940c9f170abcef15a2646cc6bc18bc7ea42b0a819b9aa6d6e0a40de161036b064c609c453dcc0193484715e01a3cf7350060000007a6365dbffdfe98717e7ebe77c36cec6bce2ec8f103a63900770d3e65bce", 0x75}], 0x1}, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000440)={0x3, 0x6}, 0x4) 16:58:06 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20000854, &(0x7f0000000140)={0x2, 0x0, @dev}, 0x10) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000001) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f00000000c0)=0xffffffffffffffff, 0x4) setsockopt$sock_linger(r0, 0x1, 0x35, &(0x7f0000000000)={0x1}, 0x8) signalfd4(0xffffffffffffffff, &(0x7f0000000040)={[0x4]}, 0x8, 0x800) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) ioctl$SNAPSHOT_PLATFORM_SUPPORT(0xffffffffffffffff, 0x330f, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x2000, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x10001, 0x0) dup2(r2, r3) r4 = openat(0xffffffffffffff9c, &(0x7f0000001140)='./file1/file0\x00', 0x700100, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x2, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x80800) writev(r5, &(0x7f0000001280)=[{&(0x7f0000000140)="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", 0x1000}, {&(0x7f0000001180)='y', 0x1}], 0x2) fcntl$setpipe(r5, 0x407, 0x0) sendfile(r2, r4, 0x0, 0x20d315) [ 2009.655619] EXT4-fs (loop5): unsupported inode size: 0 [ 2009.656878] EXT4-fs (loop5): blocksize: 2048 [ 2009.931588] nfs4: Unknown parameter 'ext4' [ 2010.023273] nfs4: Unknown parameter 'ext4' 16:58:20 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) sendmsg$nl_generic(r0, 0x0, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) 16:58:20 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000040), 0x1a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) preadv(r0, &(0x7f0000000240)=[{&(0x7f0000000100)=""/19, 0x13}, {&(0x7f0000000340)=""/178, 0xb2}, {&(0x7f0000000400)=""/170, 0xaa}], 0x3, 0x0, 0x5) bind$unix(r1, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) listen(r1, 0x0) openat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x131201, 0x0) r2 = perf_event_open(&(0x7f0000000600)={0x2, 0xffffffffffffff12, 0x4, 0x3f, 0x1, 0x8, 0x0, 0xfffffffffffffff8, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x3}, 0x110, 0x1ff, 0x2, 0x6, 0x8, 0x2, 0x3, 0x0, 0x2}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) r3 = socket$unix(0x1, 0x5, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000002580)={0x0, 0x0, {}, {}, {0x0, @struct, 0x0}}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f00000000c0)={r4, 0x0, 0x20}) ioctl$BTRFS_IOC_SCRUB(r2, 0xc400941b, &(0x7f0000000680)={0x0, 0x2, 0x7ff}) ioctl$BTRFS_IOC_BALANCE_V2(r3, 0xc4009420, &(0x7f0000000a80)={0x1, 0x0, {0x6, @struct={0x0, 0xffff}, r4, 0x1, 0x5, 0xc, 0xff, 0xfffffffffffffffb, 0xb5, @usage=0x1, 0x401, 0x1f, [0xd7c, 0x7, 0x8001, 0x400, 0x6, 0x3]}, {0x1, @usage=0xffffffff, r5, 0x1, 0xff, 0x6, 0x2, 0x100000000, 0x0, @struct={0x0, 0x400000}, 0xea, 0x9, [0x55, 0x3210, 0x3, 0x2, 0x4, 0x80000001]}, {0x40, @struct={0x8, 0x4}, 0x0, 0x4, 0x0, 0x3dec, 0x8, 0xb8, 0x8b, @usage=0x2, 0x8, 0x10000, [0x7fff, 0x3, 0x7ff, 0xc0c, 0x7cb1, 0x4]}, {0x4, 0x7, 0x2}}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000580)) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x2a, 0x0, 0xe2, 0x9e, 0x0, 0x10001, 0x22d00, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000004c0)}, 0x0, 0x8fa, 0xfff, 0x0, 0xfffffffffffffffc, 0x8, 0x2a1e, 0x0, 0x80, 0x0, 0x831}, 0x0, 0x0, r0, 0xa) connect$unix(r3, &(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e) r6 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendto$unix(r6, &(0x7f00000001c0)="71c8fcdec12c94cc2c956df44d0cfab1b74ae676aaf48ee784f18fa85887742923c7702a7c662659f337ab3d7a78b4ecf76f4f78d4ae2b6a52967d6401e9c68c6906297336eecfafa13e1a6858f797332f429ead621b12f7d737fa05091fd2150230446769df0f46629d692751480b4c5f", 0x71, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000e80), 0x40, 0x0) 16:58:20 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() setpriority(0x0, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)={0x2c, 0x10, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0xe, 0x0, 0x0, 0x1, [@generic="487fec864b245e0f3f9b"]}]}, 0x2c}}, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000000), 0x4) bind$inet6(0xffffffffffffffff, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000005c0), 0xc, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYRESOCT, @ANYRES16, @ANYBLOB="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"], 0x100}, 0x1, 0x0, 0x0, 0x4804}, 0x44) unshare(0x48020200) 16:58:20 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000002a40)=0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="e7", 0x1) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f00000001c0), &(0x7f0000000300)={0x0, 0xfb, 0xca, 0x5, 0x1, "8be0e9ee9a2492c3467926d261a7ff90", "3d6316f20be8b7318be18614b6590a7b8963deb7d0e16091c3abb3349f938d86e1e33d7a9fb189594c44484f79a468e258574982214859eb0841381913695b6dc8c614888e86a35839c51d887aeac7a1549ed1002a96f271a9ba480300fe7abc622fdb3d767a1137705f7eb439d3061ad4ea64ab83ff0090a0fe56743cc2a134e02ed794bb117c6f052d7802795a5760e044cbdf433b7dda7c9b34b638c30be38c7e721f972179e1fd9ed45fd4b7784e3ca6584279"}, 0xca, 0x3) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000280)=@in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x20}}}}, 0x0) io_uring_enter(r0, 0x76d2, 0x0, 0x0, 0x0, 0x0) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r4, &(0x7f0000000100)=ANY=[], 0xfdef) r5 = socket$nl_sock_diag(0x10, 0x3, 0x4) ppoll(&(0x7f0000000000)=[{0xffffffffffffffff, 0x230}, {r5}, {0xffffffffffffffff, 0x4}, {r4, 0x408}, {r4, 0x108}], 0x5, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0)={[0x8]}, 0x8) fallocate(r4, 0x8, 0x0, 0x8000) openat(r4, &(0x7f0000000180)='./file0\x00', 0x351201, 0x3) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240), 0x80100, 0x0) 16:58:20 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) creat(0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x10000000) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) flistxattr(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b00000000", 0x59, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) r0 = creat(&(0x7f0000000240)='./file0\x00', 0x8c) sendmsg$nl_generic(r0, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, 0x32, 0x10, 0x70bd2d, 0x25dfdbfe, {}, [@typed={0xc, 0x62, 0x0, 0x0, @u64=0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x400c0}, 0x2000c084) 16:58:20 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, 0x0, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="0300000004000000", 0x8, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) 16:58:20 executing program 3: openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) write(r0, 0x0, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/class/mdio_bus', 0x585840, 0x15) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/power/resume', 0x22902, 0x0) copy_file_range(r2, 0x0, r3, 0x0, 0xa1, 0x0) ioctl$EXT4_IOC_CLEAR_ES_CACHE(0xffffffffffffffff, 0x6628) flistxattr(r1, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r2, 0x4018f50b, &(0x7f0000000080)={0x1, 0x0, 0x401}) lseek(r3, 0x100, 0x1) unshare(0x48020200) r4 = fork() ptrace(0x10, r4) ptrace$getregset(0x4204, r4, 0x202, &(0x7f0000000040)={&(0x7f0000000380)=""/165, 0x6d}) 16:58:20 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) [ 2023.695949] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 2023.698018] EXT4-fs (loop6): group descriptors corrupted! [ 2023.704251] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 2023.739391] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 16:58:21 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000040), 0x1a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) preadv(r0, &(0x7f0000000240)=[{&(0x7f0000000100)=""/19, 0x13}, {&(0x7f0000000340)=""/178, 0xb2}, {&(0x7f0000000400)=""/170, 0xaa}], 0x3, 0x0, 0x5) bind$unix(r1, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) listen(r1, 0x0) openat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x131201, 0x0) r2 = perf_event_open(&(0x7f0000000600)={0x2, 0xffffffffffffff12, 0x4, 0x3f, 0x1, 0x8, 0x0, 0xfffffffffffffff8, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x3}, 0x110, 0x1ff, 0x2, 0x6, 0x8, 0x2, 0x3, 0x0, 0x2}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) r3 = socket$unix(0x1, 0x5, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000002580)={0x0, 0x0, {}, {}, {0x0, @struct, 0x0}}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f00000000c0)={r4, 0x0, 0x20}) ioctl$BTRFS_IOC_SCRUB(r2, 0xc400941b, &(0x7f0000000680)={0x0, 0x2, 0x7ff}) ioctl$BTRFS_IOC_BALANCE_V2(r3, 0xc4009420, &(0x7f0000000a80)={0x1, 0x0, {0x6, @struct={0x0, 0xffff}, r4, 0x1, 0x5, 0xc, 0xff, 0xfffffffffffffffb, 0xb5, @usage=0x1, 0x401, 0x1f, [0xd7c, 0x7, 0x8001, 0x400, 0x6, 0x3]}, {0x1, @usage=0xffffffff, r5, 0x1, 0xff, 0x6, 0x2, 0x100000000, 0x0, @struct={0x0, 0x400000}, 0xea, 0x9, [0x55, 0x3210, 0x3, 0x2, 0x4, 0x80000001]}, {0x40, @struct={0x8, 0x4}, 0x0, 0x4, 0x0, 0x3dec, 0x8, 0xb8, 0x8b, @usage=0x2, 0x8, 0x10000, [0x7fff, 0x3, 0x7ff, 0xc0c, 0x7cb1, 0x4]}, {0x4, 0x7, 0x2}}) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x2a, 0x0, 0xe2, 0x9e, 0x0, 0x10001, 0x22d00, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000004c0)}, 0x0, 0x8fa, 0xfff, 0x0, 0xfffffffffffffffc, 0x8, 0x2a1e, 0x0, 0x80, 0x0, 0x831}, 0x0, 0x0, r0, 0xa) connect$unix(r3, &(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e) r6 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendto$unix(r6, &(0x7f00000001c0)="71c8fcdec12c94cc2c956df44d0cfab1b74ae676aaf48ee784f18fa85887742923c7702a7c662659f337ab3d7a78b4ecf76f4f78d4ae2b6a52967d6401e9c68c6906297336eecfafa13e1a6858f797332f429ead621b12f7d737fa05091fd2150230446769df0f46629d692751480b4c5f", 0x71, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000e80), 0x40, 0x0) [ 2023.800574] EXT4-fs (loop5): unsupported inode size: 0 [ 2023.801320] EXT4-fs (loop5): blocksize: 2048 [ 2023.843943] nfs4: Unknown parameter 'ext4' [ 2023.869218] nfs4: Unknown parameter 'ext4' 16:58:21 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, 0x0, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="0300000004000000", 0x8, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) 16:58:21 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) sendmsg$nl_generic(r0, 0x0, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) [ 2024.005003] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 2024.006477] EXT4-fs (loop6): group descriptors corrupted! 16:58:21 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) creat(0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x10000000) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) flistxattr(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b00000000", 0x59, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) r0 = creat(&(0x7f0000000240)='./file0\x00', 0x8c) sendmsg$nl_generic(r0, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, 0x32, 0x10, 0x70bd2d, 0x25dfdbfe, {}, [@typed={0xc, 0x62, 0x0, 0x0, @u64=0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x400c0}, 0x2000c084) [ 2024.048405] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 16:58:21 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) 16:58:21 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000040), 0x1a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) preadv(r0, &(0x7f0000000240)=[{&(0x7f0000000100)=""/19, 0x13}, {&(0x7f0000000340)=""/178, 0xb2}, {&(0x7f0000000400)=""/170, 0xaa}], 0x3, 0x0, 0x5) bind$unix(r1, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) listen(r1, 0x0) openat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x131201, 0x0) r2 = perf_event_open(&(0x7f0000000600)={0x2, 0xffffffffffffff12, 0x4, 0x3f, 0x1, 0x8, 0x0, 0xfffffffffffffff8, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x3}, 0x110, 0x1ff, 0x2, 0x6, 0x8, 0x2, 0x3, 0x0, 0x2}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) r3 = socket$unix(0x1, 0x5, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000002580)={0x0, 0x0, {}, {}, {0x0, @struct, 0x0}}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f00000000c0)={r4, 0x0, 0x20}) ioctl$BTRFS_IOC_SCRUB(r2, 0xc400941b, &(0x7f0000000680)={0x0, 0x2, 0x7ff}) ioctl$BTRFS_IOC_BALANCE_V2(r3, 0xc4009420, &(0x7f0000000a80)={0x1, 0x0, {0x6, @struct={0x0, 0xffff}, r4, 0x1, 0x5, 0xc, 0xff, 0xfffffffffffffffb, 0xb5, @usage=0x1, 0x401, 0x1f, [0xd7c, 0x7, 0x8001, 0x400, 0x6, 0x3]}, {0x1, @usage=0xffffffff, r5, 0x1, 0xff, 0x6, 0x2, 0x100000000, 0x0, @struct={0x0, 0x400000}, 0xea, 0x9, [0x55, 0x3210, 0x3, 0x2, 0x4, 0x80000001]}, {0x40, @struct={0x8, 0x4}, 0x0, 0x4, 0x0, 0x3dec, 0x8, 0xb8, 0x8b, @usage=0x2, 0x8, 0x10000, [0x7fff, 0x3, 0x7ff, 0xc0c, 0x7cb1, 0x4]}, {0x4, 0x7, 0x2}}) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x2a, 0x0, 0xe2, 0x9e, 0x0, 0x10001, 0x22d00, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000004c0)}, 0x0, 0x8fa, 0xfff, 0x0, 0xfffffffffffffffc, 0x8, 0x2a1e, 0x0, 0x80, 0x0, 0x831}, 0x0, 0x0, r0, 0xa) connect$unix(r3, &(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e) r6 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendto$unix(r6, &(0x7f00000001c0)="71c8fcdec12c94cc2c956df44d0cfab1b74ae676aaf48ee784f18fa85887742923c7702a7c662659f337ab3d7a78b4ecf76f4f78d4ae2b6a52967d6401e9c68c6906297336eecfafa13e1a6858f797332f429ead621b12f7d737fa05091fd2150230446769df0f46629d692751480b4c5f", 0x71, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000e80), 0x40, 0x0) 16:58:21 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0xffffffff8100000f}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) futex(0x0, 0x8b, 0x0, 0x0, &(0x7f0000000140), 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000440)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/timer_list\x00', 0x0, 0x0) lseek(r2, 0x9e46, 0x0) ioctl$TIOCCBRK(r1, 0x5428) openat$vcs(0xffffffffffffff9c, 0x0, 0x20000, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000540)=0x1) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1}, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local}, 0x1c) r3 = fork() ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) ioctl$AUTOFS_IOC_EXPIRE(0xffffffffffffffff, 0x810c9365, &(0x7f0000000200)={{0x2, 0x7}, 0x100, './file0\x00'}) ptrace(0x10, r3) ptrace(0x4207, r3) [ 2024.137320] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 2024.181283] nfs4: Unknown parameter 'ext4' [ 2024.228922] nfs4: Unknown parameter 'ext4' 16:58:21 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) sendmsg$nl_generic(r0, 0x0, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) [ 2024.242122] EXT4-fs (loop5): unsupported inode size: 0 [ 2024.242810] EXT4-fs (loop5): blocksize: 2048 16:58:21 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, 0x0, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="0300000004000000", 0x8, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) [ 2024.305533] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 2024.306604] EXT4-fs (loop6): group descriptors corrupted! [ 2024.360957] nfs4: Unknown parameter 'ext4' [ 2024.375258] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 2024.517967] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 16:58:35 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) creat(0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x10000000) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) flistxattr(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) r0 = creat(&(0x7f0000000240)='./file0\x00', 0x8c) sendmsg$nl_generic(r0, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, 0x32, 0x10, 0x70bd2d, 0x25dfdbfe, {}, [@typed={0xc, 0x62, 0x0, 0x0, @u64=0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x400c0}, 0x2000c084) 16:58:35 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000040), 0x1a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) preadv(r0, &(0x7f0000000240)=[{&(0x7f0000000100)=""/19, 0x13}, {&(0x7f0000000340)=""/178, 0xb2}, {&(0x7f0000000400)=""/170, 0xaa}], 0x3, 0x0, 0x5) bind$unix(r1, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) listen(r1, 0x0) openat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x131201, 0x0) r2 = perf_event_open(&(0x7f0000000600)={0x2, 0xffffffffffffff12, 0x4, 0x3f, 0x1, 0x8, 0x0, 0xfffffffffffffff8, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x3}, 0x110, 0x1ff, 0x2, 0x6, 0x8, 0x2, 0x3, 0x0, 0x2}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) r3 = socket$unix(0x1, 0x5, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000002580)={0x0, 0x0, {}, {}, {0x0, @struct, 0x0}}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f00000000c0)={r4, 0x0, 0x20}) ioctl$BTRFS_IOC_SCRUB(r2, 0xc400941b, &(0x7f0000000680)={0x0, 0x2, 0x7ff}) ioctl$BTRFS_IOC_BALANCE_V2(r3, 0xc4009420, &(0x7f0000000a80)={0x1, 0x0, {0x6, @struct={0x0, 0xffff}, r4, 0x1, 0x5, 0xc, 0xff, 0xfffffffffffffffb, 0xb5, @usage=0x1, 0x401, 0x1f, [0xd7c, 0x7, 0x8001, 0x400, 0x6, 0x3]}, {0x1, @usage=0xffffffff, r5, 0x1, 0xff, 0x6, 0x2, 0x100000000, 0x0, @struct={0x0, 0x400000}, 0xea, 0x9, [0x55, 0x3210, 0x3, 0x2, 0x4, 0x80000001]}, {0x40, @struct={0x8, 0x4}, 0x0, 0x4, 0x0, 0x3dec, 0x8, 0xb8, 0x8b, @usage=0x2, 0x8, 0x10000, [0x7fff, 0x3, 0x7ff, 0xc0c, 0x7cb1, 0x4]}, {0x4, 0x7, 0x2}}) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x2a, 0x0, 0xe2, 0x9e, 0x0, 0x10001, 0x22d00, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000004c0)}, 0x0, 0x8fa, 0xfff, 0x0, 0xfffffffffffffffc, 0x8, 0x2a1e, 0x0, 0x80, 0x0, 0x831}, 0x0, 0x0, r0, 0xa) connect$unix(r3, &(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e) r6 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendto$unix(r6, &(0x7f00000001c0)="71c8fcdec12c94cc2c956df44d0cfab1b74ae676aaf48ee784f18fa85887742923c7702a7c662659f337ab3d7a78b4ecf76f4f78d4ae2b6a52967d6401e9c68c6906297336eecfafa13e1a6858f797332f429ead621b12f7d737fa05091fd2150230446769df0f46629d692751480b4c5f", 0x71, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000e80), 0x40, 0x0) 16:58:35 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) 16:58:35 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) 16:58:35 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, 0x0, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000", 0xc, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) 16:58:35 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) sendmsg$nl_generic(r0, 0x0, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) 16:58:35 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) creat(0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x10000000) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) flistxattr(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b00000000", 0x59, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) r0 = creat(&(0x7f0000000240)='./file0\x00', 0x8c) sendmsg$nl_generic(r0, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, 0x32, 0x10, 0x70bd2d, 0x25dfdbfe, {}, [@typed={0xc, 0x62, 0x0, 0x0, @u64=0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x400c0}, 0x2000c084) 16:58:35 executing program 3: r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000440)={0x0, "9b55f610ffe7b9856842eb69443042b20caac33d7dda6ec6986b177fa13c2bd2c68577ea852c8bb47f31ee549b6a921e231ef07ee0f7fca620564faeeeafa440"}, 0x48, 0x0) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', r1) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(0x0, &(0x7f00000003c0)={'syz', 0x0}, 0x0, 0x0, 0x0) r2 = add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f00000004c0)=ANY=[@ANYBLOB="0e0f101112131415161718111a1b1c1d1e1f202122232425262728292a2b2c2d2e2f30ff3231343b3c3d3e3f409d86db2d6fe9e828ac27c434f4d61ddba2324449e573b75377cc68b418e7722bc129866fa6eb3b5a7b21ec44ae7c5aeb52ee5d3ed53d79267a913c9c44f62b66600a6148ae856a2506477742111e2b5ca45fd126031b8e0fee3ea04d66b0d4be4ff0ff78a0a354e1d470e1be4e4433fde6c6c6de3e6f4eef3fd2a03663cd7e812e7eb4b7c696bd4ed2bb93093b1c41aa06652179ee81000000000071d3c766af07fea01b8a6362071051af80e2a74b1b7f2710cf2a3258c3007bcc8ad67bdfe26151df6bf9bd"], 0x48, r0) r3 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000080)={'fscrypt:', @desc2}, &(0x7f0000000300)={0x0, "3ef8a4c24927541ee4e5f8f0b6b073f3a14d9e238c0905546a9d62c9625f460dacb026ba3f615f7fdd3496dc19ed7064fc4d0bd8c5f4b761484442989c621844", 0x2e}, 0x48, 0xfffffffffffffffd) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', r3) r4 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000080)={'fscrypt:', @desc2}, &(0x7f0000000300)={0x0, "3ef8a4c24927541ee4e5f8f0b6b073f3a14d9e238c0905546a9d62c9625f460dacb026ba3f615f7fdd3496dc19ed7064fc4d0bd8c5f4b761484442989c621844", 0x2e}, 0x48, 0xfffffffffffffffd) request_key(&(0x7f0000000180)='cifs.idmap\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', r4) r5 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000080)={'fscrypt:', @desc2}, &(0x7f0000000300)={0x0, "3ef8a4c24927541ee4e5f8f0b6b073f3a14d9e238c0905546a9d62c9625f460dacb026ba3f615f7fdd3496dc19ed7064fc4d0bd8c5f4b761484442989c621844", 0x2e}, 0x48, 0xfffffffffffffffd) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='\x00', r5) keyctl$KEYCTL_MOVE(0x1e, r3, r4, r5, 0x1) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000200)='id_resolver\x00', 0x0) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2037.962539] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 2038.007506] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 2038.011720] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 2038.028032] Option ' ð~à÷ü¦ VO®î¯¤@' to dns_resolver key: bad/missing value 16:58:35 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, 0x0, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000", 0xc, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) [ 2038.091001] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 2038.144428] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 2038.154728] nfs4: Unknown parameter 'ext4' [ 2038.178441] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 16:58:35 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000040), 0x1a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) preadv(r0, &(0x7f0000000240)=[{&(0x7f0000000100)=""/19, 0x13}, {&(0x7f0000000340)=""/178, 0xb2}, {&(0x7f0000000400)=""/170, 0xaa}], 0x3, 0x0, 0x5) bind$unix(r1, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) listen(r1, 0x0) openat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x131201, 0x0) r2 = perf_event_open(&(0x7f0000000600)={0x2, 0xffffffffffffff12, 0x4, 0x3f, 0x1, 0x8, 0x0, 0xfffffffffffffff8, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x3}, 0x110, 0x1ff, 0x2, 0x6, 0x8, 0x2, 0x3, 0x0, 0x2}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) r3 = socket$unix(0x1, 0x5, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000002580)={0x0, 0x0, {}, {}, {0x0, @struct, 0x0}}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f00000000c0)={r4, 0x0, 0x20}) ioctl$BTRFS_IOC_SCRUB(r2, 0xc400941b, &(0x7f0000000680)={0x0, 0x2, 0x7ff}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000580)) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x2a, 0x0, 0xe2, 0x9e, 0x0, 0x10001, 0x22d00, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000004c0)}, 0x0, 0x8fa, 0xfff, 0x0, 0xfffffffffffffffc, 0x8, 0x2a1e, 0x0, 0x80, 0x0, 0x831}, 0x0, 0x0, r0, 0xa) connect$unix(r3, &(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e) r5 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendto$unix(r5, &(0x7f00000001c0)="71c8fcdec12c94cc2c956df44d0cfab1b74ae676aaf48ee784f18fa85887742923c7702a7c662659f337ab3d7a78b4ecf76f4f78d4ae2b6a52967d6401e9c68c6906297336eecfafa13e1a6858f797332f429ead621b12f7d737fa05091fd2150230446769df0f46629d692751480b4c5f", 0x71, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000e80), 0x40, 0x0) 16:58:35 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) sendmsg$nl_generic(r0, 0x0, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) [ 2038.224920] EXT4-fs (loop1): unsupported inode size: 0 [ 2038.225628] EXT4-fs (loop1): blocksize: 2048 16:58:35 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) 16:58:35 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, 0x0, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000", 0xc, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) 16:58:35 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) creat(0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x10000000) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) flistxattr(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) r0 = creat(&(0x7f0000000240)='./file0\x00', 0x8c) sendmsg$nl_generic(r0, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, 0x32, 0x10, 0x70bd2d, 0x25dfdbfe, {}, [@typed={0xc, 0x62, 0x0, 0x0, @u64=0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x400c0}, 0x2000c084) [ 2038.338167] nfs4: Unknown parameter 'ext4' [ 2038.361509] Option ' ð~à÷ü¦ VO®î¯¤@' to dns_resolver key: bad/missing value 16:58:35 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000040), 0x1a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) preadv(r0, &(0x7f0000000240)=[{&(0x7f0000000100)=""/19, 0x13}, {&(0x7f0000000340)=""/178, 0xb2}, {&(0x7f0000000400)=""/170, 0xaa}], 0x3, 0x0, 0x5) bind$unix(r1, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) listen(r1, 0x0) openat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x131201, 0x0) r2 = perf_event_open(&(0x7f0000000600)={0x2, 0xffffffffffffff12, 0x4, 0x3f, 0x1, 0x8, 0x0, 0xfffffffffffffff8, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x3}, 0x110, 0x1ff, 0x2, 0x6, 0x8, 0x2, 0x3, 0x0, 0x2}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) r3 = socket$unix(0x1, 0x5, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000002580)={0x0, 0x0, {}, {}, {0x0, @struct, 0x0}}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f00000000c0)={r4, 0x0, 0x20}) ioctl$BTRFS_IOC_SCRUB(r2, 0xc400941b, &(0x7f0000000680)={0x0, 0x2, 0x7ff}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000580)) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x2a, 0x0, 0xe2, 0x9e, 0x0, 0x10001, 0x22d00, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000004c0)}, 0x0, 0x8fa, 0xfff, 0x0, 0xfffffffffffffffc, 0x8, 0x2a1e, 0x0, 0x80, 0x0, 0x831}, 0x0, 0x0, r0, 0xa) connect$unix(r3, &(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e) r5 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendto$unix(r5, &(0x7f00000001c0)="71c8fcdec12c94cc2c956df44d0cfab1b74ae676aaf48ee784f18fa85887742923c7702a7c662659f337ab3d7a78b4ecf76f4f78d4ae2b6a52967d6401e9c68c6906297336eecfafa13e1a6858f797332f429ead621b12f7d737fa05091fd2150230446769df0f46629d692751480b4c5f", 0x71, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000e80), 0x40, 0x0) 16:58:35 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000040), 0x1a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) preadv(r0, &(0x7f0000000240)=[{&(0x7f0000000100)=""/19, 0x13}, {&(0x7f0000000340)=""/178, 0xb2}, {&(0x7f0000000400)=""/170, 0xaa}], 0x3, 0x0, 0x5) bind$unix(r1, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) listen(r1, 0x0) openat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x131201, 0x0) r2 = perf_event_open(&(0x7f0000000600)={0x2, 0xffffffffffffff12, 0x4, 0x3f, 0x1, 0x8, 0x0, 0xfffffffffffffff8, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x3}, 0x110, 0x1ff, 0x2, 0x6, 0x8, 0x2, 0x3, 0x0, 0x2}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) r3 = socket$unix(0x1, 0x5, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000002580)={0x0, 0x0, {}, {}, {0x0, @struct, 0x0}}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f00000000c0)={r4, 0x0, 0x20}) ioctl$BTRFS_IOC_SCRUB(r2, 0xc400941b, &(0x7f0000000680)={0x0, 0x2, 0x7ff}) ioctl$BTRFS_IOC_BALANCE_V2(r3, 0xc4009420, &(0x7f0000000a80)={0x1, 0x0, {0x6, @struct={0x0, 0xffff}, r4, 0x1, 0x5, 0xc, 0xff, 0xfffffffffffffffb, 0xb5, @usage=0x1, 0x401, 0x1f, [0xd7c, 0x7, 0x8001, 0x400, 0x6, 0x3]}, {0x1, @usage=0xffffffff, r5, 0x1, 0xff, 0x6, 0x2, 0x100000000, 0x0, @struct={0x0, 0x400000}, 0xea, 0x9, [0x55, 0x3210, 0x3, 0x2, 0x4, 0x80000001]}, {0x40, @struct={0x8, 0x4}, 0x0, 0x4, 0x0, 0x3dec, 0x8, 0xb8, 0x8b, @usage=0x2, 0x8, 0x10000, [0x7fff, 0x3, 0x7ff, 0xc0c, 0x7cb1, 0x4]}, {0x4, 0x7, 0x2}}) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x2a, 0x0, 0xe2, 0x9e, 0x0, 0x10001, 0x22d00, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000004c0)}, 0x0, 0x8fa, 0xfff, 0x0, 0xfffffffffffffffc, 0x8, 0x2a1e, 0x0, 0x80, 0x0, 0x831}, 0x0, 0x0, r0, 0xa) connect$unix(r3, &(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e) r6 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendto$unix(r6, &(0x7f00000001c0)="71c8fcdec12c94cc2c956df44d0cfab1b74ae676aaf48ee784f18fa85887742923c7702a7c662659f337ab3d7a78b4ecf76f4f78d4ae2b6a52967d6401e9c68c6906297336eecfafa13e1a6858f797332f429ead621b12f7d737fa05091fd2150230446769df0f46629d692751480b4c5f", 0x71, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000e80), 0x40, 0x0) [ 2038.439725] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 2038.448702] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 2038.527833] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue 16:58:35 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) [ 2038.562364] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 16:58:35 executing program 1: r0 = openat(0xffffffffffffff9c, 0x0, 0x44e2, 0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x80000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x0) mknodat$null(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x800, 0x103) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) r2 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) linkat(r2, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x1000) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='numa_maps\x00') readv(r3, &(0x7f0000003700)=[{&(0x7f0000000200)=""/216, 0xd8}, {&(0x7f00000003c0)=""/121, 0x79}, {&(0x7f0000000380)=""/51, 0x33}, {&(0x7f00000014c0)=""/160, 0xa0}, {&(0x7f0000001640)=""/256, 0x100}, {0x0}, {&(0x7f00000015c0)=""/51, 0x33}, {&(0x7f00000001c0)=""/57, 0x39}], 0x8) readv(r3, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000019c0)=ANY=[@ANYBLOB="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"], 0x28}}, 0x0) r6 = syz_io_uring_setup(0x4f3, &(0x7f0000000300)={0x0, 0x9d80, 0x10, 0x3, 0x3af, 0x0, r0}, &(0x7f0000bff000/0x400000)=nil, &(0x7f0000cb6000/0x4000)=nil, &(0x7f0000000000), &(0x7f0000000180)) dup3(r5, r6, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_int(r7, 0x29, 0x4, 0x0, &(0x7f0000000080)) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000480)={'team0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_SET(r3, &(0x7f00000017c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001580)={&(0x7f0000001800)={0x50, 0x0, 0x0, 0x70bd2b, 0x25dfdbfd, {}, [@ETHTOOL_A_DEBUG_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}]}]}, 0x50}, 0x1, 0x0, 0x0, 0x11}, 0x800) 16:58:35 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) sendmsg$nl_generic(r0, 0x0, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) 16:58:35 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000040), 0x1a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) preadv(r0, &(0x7f0000000240)=[{&(0x7f0000000100)=""/19, 0x13}, {&(0x7f0000000340)=""/178, 0xb2}, {&(0x7f0000000400)=""/170, 0xaa}], 0x3, 0x0, 0x5) bind$unix(r1, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) listen(r1, 0x0) openat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x131201, 0x0) r2 = perf_event_open(&(0x7f0000000600)={0x2, 0xffffffffffffff12, 0x4, 0x3f, 0x1, 0x8, 0x0, 0xfffffffffffffff8, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x3}, 0x110, 0x1ff, 0x2, 0x6, 0x8, 0x2, 0x3, 0x0, 0x2}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) r3 = socket$unix(0x1, 0x5, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000002580)={0x0, 0x0, {}, {}, {0x0, @struct, 0x0}}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f00000000c0)={r4, 0x0, 0x20}) ioctl$BTRFS_IOC_SCRUB(r2, 0xc400941b, &(0x7f0000000680)={0x0, 0x2, 0x7ff}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000580)) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x2a, 0x0, 0xe2, 0x9e, 0x0, 0x10001, 0x22d00, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000004c0)}, 0x0, 0x8fa, 0xfff, 0x0, 0xfffffffffffffffc, 0x8, 0x2a1e, 0x0, 0x80, 0x0, 0x831}, 0x0, 0x0, r0, 0xa) connect$unix(r3, &(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e) r5 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendto$unix(r5, &(0x7f00000001c0)="71c8fcdec12c94cc2c956df44d0cfab1b74ae676aaf48ee784f18fa85887742923c7702a7c662659f337ab3d7a78b4ecf76f4f78d4ae2b6a52967d6401e9c68c6906297336eecfafa13e1a6858f797332f429ead621b12f7d737fa05091fd2150230446769df0f46629d692751480b4c5f", 0x71, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000e80), 0x40, 0x0) 16:58:35 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000040), 0x1a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) preadv(r0, &(0x7f0000000240)=[{&(0x7f0000000100)=""/19, 0x13}, {&(0x7f0000000340)=""/178, 0xb2}, {&(0x7f0000000400)=""/170, 0xaa}], 0x3, 0x0, 0x5) bind$unix(r1, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) listen(r1, 0x0) openat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x131201, 0x0) r2 = perf_event_open(&(0x7f0000000600)={0x2, 0xffffffffffffff12, 0x4, 0x3f, 0x1, 0x8, 0x0, 0xfffffffffffffff8, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x3}, 0x110, 0x1ff, 0x2, 0x6, 0x8, 0x2, 0x3, 0x0, 0x2}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) r3 = socket$unix(0x1, 0x5, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000002580)={0x0, 0x0, {}, {}, {0x0, @struct, 0x0}}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f00000000c0)={r4, 0x0, 0x20}) ioctl$BTRFS_IOC_SCRUB(r2, 0xc400941b, &(0x7f0000000680)={0x0, 0x2, 0x7ff}) ioctl$BTRFS_IOC_BALANCE_V2(r3, 0xc4009420, &(0x7f0000000a80)={0x1, 0x0, {0x6, @struct={0x0, 0xffff}, r4, 0x1, 0x5, 0xc, 0xff, 0xfffffffffffffffb, 0xb5, @usage=0x1, 0x401, 0x1f, [0xd7c, 0x7, 0x8001, 0x400, 0x6, 0x3]}, {0x1, @usage=0xffffffff, r5, 0x1, 0xff, 0x6, 0x2, 0x100000000, 0x0, @struct={0x0, 0x400000}, 0xea, 0x9, [0x55, 0x3210, 0x3, 0x2, 0x4, 0x80000001]}, {0x40, @struct={0x8, 0x4}, 0x0, 0x4, 0x0, 0x3dec, 0x8, 0xb8, 0x8b, @usage=0x2, 0x8, 0x10000, [0x7fff, 0x3, 0x7ff, 0xc0c, 0x7cb1, 0x4]}, {0x4, 0x7, 0x2}}) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x2a, 0x0, 0xe2, 0x9e, 0x0, 0x10001, 0x22d00, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000004c0)}, 0x0, 0x8fa, 0xfff, 0x0, 0xfffffffffffffffc, 0x8, 0x2a1e, 0x0, 0x80, 0x0, 0x831}, 0x0, 0x0, r0, 0xa) connect$unix(r3, &(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e) r6 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendto$unix(r6, &(0x7f00000001c0)="71c8fcdec12c94cc2c956df44d0cfab1b74ae676aaf48ee784f18fa85887742923c7702a7c662659f337ab3d7a78b4ecf76f4f78d4ae2b6a52967d6401e9c68c6906297336eecfafa13e1a6858f797332f429ead621b12f7d737fa05091fd2150230446769df0f46629d692751480b4c5f", 0x71, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000e80), 0x40, 0x0) [ 2038.731373] nfs4: Unknown parameter 'ext4' [ 2038.752450] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 2038.826206] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 16:58:49 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) creat(0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x10000000) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) flistxattr(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) r0 = creat(&(0x7f0000000240)='./file0\x00', 0x8c) sendmsg$nl_generic(r0, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, 0x32, 0x10, 0x70bd2d, 0x25dfdbfe, {}, [@typed={0xc, 0x62, 0x0, 0x0, @u64=0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x400c0}, 0x2000c084) 16:58:49 executing program 1: r0 = openat(0xffffffffffffff9c, 0x0, 0x44e2, 0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x80000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x0) mknodat$null(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x800, 0x103) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) r2 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) linkat(r2, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x1000) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='numa_maps\x00') readv(r3, &(0x7f0000003700)=[{&(0x7f0000000200)=""/216, 0xd8}, {&(0x7f00000003c0)=""/121, 0x79}, {&(0x7f0000000380)=""/51, 0x33}, {&(0x7f00000014c0)=""/160, 0xa0}, {&(0x7f0000001640)=""/256, 0x100}, {0x0}, {&(0x7f00000015c0)=""/51, 0x33}, {&(0x7f00000001c0)=""/57, 0x39}], 0x8) readv(r3, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000019c0)=ANY=[@ANYBLOB="c1f9808ec37123000000000200000008000000000000000c0012f6de4bef2d98358782df5e47ccaaf9fdd22ace6a0f8c21a103a5cd72b615936b1abd9e50f4da86da1b2cc71402f3e953fcd78b768444cf6bd1f260c027bd063536eb954c023da3a6e9546f4fd0b7d0f32d1c344867f2247e9dd1c6ba31ed92f354940ec2f46075a70205005b13c88ea9b88a8bdd912e150e4d512fb136979e86cfd70d4f53d3f764e5dfaa2813257f035900000099320000001d6cbb6165eb8eea9fd3b164ffd7803452d2830ae10c9603576ff8dba32ab18b11d27b5f34e7227ec22fba68678cb663f32bb5ce84f1b5c3f21fd260273768f76209b2434f651c6a453589ce1fbb4b74d044a9b5250278ce93bf30b30a3d8c21903c0e6f2d5175e252ce588b9864826306d3e71c92d6ba0ae71cf5db04575ecd3748f061d23a9fe7359e2735234ae0682d0eb4557405fce73465f55b7ef7894b49496dc80a31c1a414c6d97af09d6cfb91610fc6064484ee3d772898b030e78117f830638a41ef2a39f6773668490ac1157bee763545f002294ef3e83af3857ad96e18ef0cf8f8c116b20cba0a0ca2731454514b5a6ff2bc608de1674f49f5706b578200"], 0x28}}, 0x0) r6 = syz_io_uring_setup(0x4f3, &(0x7f0000000300)={0x0, 0x9d80, 0x10, 0x3, 0x3af, 0x0, r0}, &(0x7f0000bff000/0x400000)=nil, &(0x7f0000cb6000/0x4000)=nil, &(0x7f0000000000), &(0x7f0000000180)) dup3(r5, r6, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_int(r7, 0x29, 0x4, 0x0, &(0x7f0000000080)) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000480)={'team0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_SET(r3, &(0x7f00000017c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001580)={&(0x7f0000001800)={0x50, 0x0, 0x0, 0x70bd2b, 0x25dfdbfd, {}, [@ETHTOOL_A_DEBUG_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}]}]}, 0x50}, 0x1, 0x0, 0x0, 0x11}, 0x800) 16:58:49 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, 0x0, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d400", 0xe, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) 16:58:49 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000040), 0x1a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) preadv(r0, &(0x7f0000000240)=[{&(0x7f0000000100)=""/19, 0x13}, {&(0x7f0000000340)=""/178, 0xb2}, {&(0x7f0000000400)=""/170, 0xaa}], 0x3, 0x0, 0x5) bind$unix(r1, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) listen(r1, 0x0) openat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x131201, 0x0) perf_event_open(&(0x7f0000000600)={0x2, 0xffffffffffffff12, 0x4, 0x3f, 0x1, 0x8, 0x0, 0xfffffffffffffff8, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x3}, 0x110, 0x1ff, 0x2, 0x6, 0x8, 0x2, 0x3, 0x0, 0x2}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000002580)={0x0, 0x0, {}, {}, {0x0, @struct, 0x0}}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f00000000c0)={r3, 0x0, 0x20}) ioctl$BTRFS_IOC_BALANCE_V2(r2, 0xc4009420, &(0x7f0000000a80)={0x1, 0x0, {0x6, @struct={0x0, 0xffff}, r3, 0x1, 0x5, 0xc, 0xff, 0xfffffffffffffffb, 0xb5, @usage=0x1, 0x401, 0x1f, [0xd7c, 0x7, 0x8001, 0x400, 0x6, 0x3]}, {0x1, @usage=0xffffffff, 0x0, 0x1, 0xff, 0x6, 0x2, 0x100000000, 0x0, @struct={0x0, 0x400000}, 0xea, 0x9, [0x55, 0x3210, 0x3, 0x2, 0x4, 0x80000001]}, {0x40, @struct={0x8, 0x4}, 0x0, 0x4, 0x0, 0x3dec, 0x8, 0xb8, 0x8b, @usage=0x2, 0x8, 0x10000, [0x7fff, 0x3, 0x7ff, 0xc0c, 0x7cb1, 0x4]}, {0x4, 0x7, 0x2}}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000580)) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x2a, 0x0, 0xe2, 0x9e, 0x0, 0x10001, 0x22d00, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000004c0)}, 0x0, 0x8fa, 0xfff, 0x0, 0xfffffffffffffffc, 0x8, 0x2a1e, 0x0, 0x80, 0x0, 0x831}, 0x0, 0x0, r0, 0xa) connect$unix(r2, &(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e) r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendto$unix(r4, &(0x7f00000001c0)="71c8fcdec12c94cc2c956df44d0cfab1b74ae676aaf48ee784f18fa85887742923c7702a7c662659f337ab3d7a78b4ecf76f4f78d4ae2b6a52967d6401e9c68c6906297336eecfafa13e1a6858f797332f429ead621b12f7d737fa05091fd2150230446769df0f46629d692751480b4c5f", 0x71, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000e80), 0x40, 0x0) 16:58:49 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r2 = socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local, r3}, 0x14) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="0500000000000000000000000000000012000000000000000000"]) setresuid(0xffffffffffffffff, r4, 0x0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r5, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r6 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000200)={'syztnl2\x00', r3, 0x1, 0x700, 0x100, 0x56b, {{0x28, 0x4, 0x0, 0x8, 0xa0, 0x67, 0x0, 0xf8, 0x2f, 0x0, @empty, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@rr={0x7, 0x17, 0x15, [@empty, @multicast2, @empty, @broadcast, @loopback]}, @timestamp={0x44, 0xc, 0x37, 0x0, 0x3, [0x3, 0xd8e1]}, @lsrr={0x83, 0x7, 0xb3, [@private=0xa010101]}, @rr={0x7, 0x2b, 0xd8, [@loopback, @private=0xa010102, @rand_addr=0x64010100, @multicast2, @loopback, @rand_addr=0x64010101, @dev={0xac, 0x14, 0x14, 0x11}, @initdev={0xac, 0x1e, 0x0, 0x0}, @loopback, @dev={0xac, 0x14, 0x14, 0x22}]}, @lsrr={0x83, 0xb, 0x22, [@multicast1, @multicast2]}, @rr={0x7, 0xf, 0x64, [@loopback, @remote, @multicast2]}, @cipso={0x86, 0x1b, 0x3, [{0x2, 0x5, "54a590"}, {0x5, 0x10, "922ad128a61b70d7504713ac746f"}]}]}}}}}) ioctl$sock_inet6_SIOCDIFADDR(r6, 0x8936, &(0x7f0000000300)={@remote, 0x7, r7}) 16:58:49 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = getpgid(0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x24, 0x1e, 0xc0b12afe4b722e85, 0x0, 0x0, {}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x8, 0x0, 0x0, @pid=r2}]}, 0x24}}, 0x0) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r3 = getpgid(0xffffffffffffffff) ptrace(0x10, r3) clone3(&(0x7f0000001500)={0x80000000, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0x2f}, &(0x7f00000002c0)=""/197, 0xc5, &(0x7f0000001440)=""/134, &(0x7f00000003c0)=[r3, 0x0], 0x2, {r1}}, 0x58) r4 = memfd_create(&(0x7f0000000080)='\x00', 0x2) r5 = socket$nl_audit(0x10, 0x3, 0x9) getsockopt$IP_SET_OP_GET_FNAME(r1, 0x1, 0x53, &(0x7f0000000400)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f0000001600)=0x2c) read(r5, &(0x7f0000001580)=""/92, 0x5c) fcntl$getown(r4, 0x9) ptrace$getregset(0x4204, 0x0, 0x2, &(0x7f0000000140)={&(0x7f0000000440)=""/4096, 0x1000}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1c92c2, 0x0) 16:58:49 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) 16:58:49 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) sendmsg$nl_generic(r0, 0x0, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) [ 2052.123855] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 2052.166807] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 2052.173511] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 2052.581141] nfs4: Unknown parameter 'ext4' [ 2052.757282] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 16:59:05 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = getpgid(0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x24, 0x1e, 0xc0b12afe4b722e85, 0x0, 0x0, {}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x8, 0x0, 0x0, @pid=r2}]}, 0x24}}, 0x0) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r3 = getpgid(0xffffffffffffffff) ptrace(0x10, r3) clone3(&(0x7f0000001500)={0x80000000, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0x2f}, &(0x7f00000002c0)=""/197, 0xc5, &(0x7f0000001440)=""/134, &(0x7f00000003c0)=[r3, 0x0], 0x2, {r1}}, 0x58) r4 = memfd_create(&(0x7f0000000080)='\x00', 0x2) r5 = socket$nl_audit(0x10, 0x3, 0x9) getsockopt$IP_SET_OP_GET_FNAME(r1, 0x1, 0x53, &(0x7f0000000400)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f0000001600)=0x2c) read(r5, &(0x7f0000001580)=""/92, 0x5c) fcntl$getown(r4, 0x9) ptrace$getregset(0x4204, 0x0, 0x2, &(0x7f0000000140)={&(0x7f0000000440)=""/4096, 0x1000}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1c92c2, 0x0) 16:59:05 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) sendmsg$nl_generic(r0, 0x0, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) 16:59:05 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, 0x0, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d400", 0xe, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) 16:59:05 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) creat(0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x10000000) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) flistxattr(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, 0x0) r0 = creat(&(0x7f0000000240)='./file0\x00', 0x8c) sendmsg$nl_generic(r0, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, 0x32, 0x10, 0x70bd2d, 0x25dfdbfe, {}, [@typed={0xc, 0x62, 0x0, 0x0, @u64=0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x400c0}, 0x2000c084) 16:59:05 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000040), 0x1a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) preadv(r0, &(0x7f0000000240)=[{&(0x7f0000000100)=""/19, 0x13}, {&(0x7f0000000340)=""/178, 0xb2}, {&(0x7f0000000400)=""/170, 0xaa}], 0x3, 0x0, 0x5) bind$unix(r1, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) listen(r1, 0x0) openat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x131201, 0x0) perf_event_open(&(0x7f0000000600)={0x2, 0xffffffffffffff12, 0x4, 0x3f, 0x1, 0x8, 0x0, 0xfffffffffffffff8, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x3}, 0x110, 0x1ff, 0x2, 0x6, 0x8, 0x2, 0x3, 0x0, 0x2}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000002580)={0x0, 0x0, {}, {}, {0x0, @struct, 0x0}}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f00000000c0)={r3, 0x0, 0x20}) ioctl$BTRFS_IOC_BALANCE_V2(r2, 0xc4009420, &(0x7f0000000a80)={0x1, 0x0, {0x6, @struct={0x0, 0xffff}, r3, 0x1, 0x5, 0xc, 0xff, 0xfffffffffffffffb, 0xb5, @usage=0x1, 0x401, 0x1f, [0xd7c, 0x7, 0x8001, 0x400, 0x6, 0x3]}, {0x1, @usage=0xffffffff, 0x0, 0x1, 0xff, 0x6, 0x2, 0x100000000, 0x0, @struct={0x0, 0x400000}, 0xea, 0x9, [0x55, 0x3210, 0x3, 0x2, 0x4, 0x80000001]}, {0x40, @struct={0x8, 0x4}, 0x0, 0x4, 0x0, 0x3dec, 0x8, 0xb8, 0x8b, @usage=0x2, 0x8, 0x10000, [0x7fff, 0x3, 0x7ff, 0xc0c, 0x7cb1, 0x4]}, {0x4, 0x7, 0x2}}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000580)) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x2a, 0x0, 0xe2, 0x9e, 0x0, 0x10001, 0x22d00, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000004c0)}, 0x0, 0x8fa, 0xfff, 0x0, 0xfffffffffffffffc, 0x8, 0x2a1e, 0x0, 0x80, 0x0, 0x831}, 0x0, 0x0, r0, 0xa) connect$unix(r2, &(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e) r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendto$unix(r4, &(0x7f00000001c0)="71c8fcdec12c94cc2c956df44d0cfab1b74ae676aaf48ee784f18fa85887742923c7702a7c662659f337ab3d7a78b4ecf76f4f78d4ae2b6a52967d6401e9c68c6906297336eecfafa13e1a6858f797332f429ead621b12f7d737fa05091fd2150230446769df0f46629d692751480b4c5f", 0x71, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000e80), 0x40, 0x0) 16:59:05 executing program 1: r0 = openat(0xffffffffffffff9c, 0x0, 0x44e2, 0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x80000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x0) mknodat$null(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x800, 0x103) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) r2 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) linkat(r2, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x1000) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='numa_maps\x00') readv(r3, &(0x7f0000003700)=[{&(0x7f0000000200)=""/216, 0xd8}, {&(0x7f00000003c0)=""/121, 0x79}, {&(0x7f0000000380)=""/51, 0x33}, {&(0x7f00000014c0)=""/160, 0xa0}, {&(0x7f0000001640)=""/256, 0x100}, {0x0}, {&(0x7f00000015c0)=""/51, 0x33}, {&(0x7f00000001c0)=""/57, 0x39}], 0x8) readv(r3, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000019c0)=ANY=[@ANYBLOB="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"], 0x28}}, 0x0) r6 = syz_io_uring_setup(0x4f3, &(0x7f0000000300)={0x0, 0x9d80, 0x10, 0x3, 0x3af, 0x0, r0}, &(0x7f0000bff000/0x400000)=nil, &(0x7f0000cb6000/0x4000)=nil, &(0x7f0000000000), &(0x7f0000000180)) dup3(r5, r6, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_int(r7, 0x29, 0x4, 0x0, &(0x7f0000000080)) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000480)={'team0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_SET(r3, &(0x7f00000017c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001580)={&(0x7f0000001800)={0x50, 0x0, 0x0, 0x70bd2b, 0x25dfdbfd, {}, [@ETHTOOL_A_DEBUG_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}]}]}, 0x50}, 0x1, 0x0, 0x0, 0x11}, 0x800) 16:59:05 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) 16:59:05 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r2 = socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local, r3}, 0x14) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="0500000000000000000000000000000012000000000000000000"]) setresuid(0xffffffffffffffff, r4, 0x0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r5, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r6 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000200)={'syztnl2\x00', r3, 0x1, 0x700, 0x100, 0x56b, {{0x28, 0x4, 0x0, 0x8, 0xa0, 0x67, 0x0, 0xf8, 0x2f, 0x0, @empty, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@rr={0x7, 0x17, 0x15, [@empty, @multicast2, @empty, @broadcast, @loopback]}, @timestamp={0x44, 0xc, 0x37, 0x0, 0x3, [0x3, 0xd8e1]}, @lsrr={0x83, 0x7, 0xb3, [@private=0xa010101]}, @rr={0x7, 0x2b, 0xd8, [@loopback, @private=0xa010102, @rand_addr=0x64010100, @multicast2, @loopback, @rand_addr=0x64010101, @dev={0xac, 0x14, 0x14, 0x11}, @initdev={0xac, 0x1e, 0x0, 0x0}, @loopback, @dev={0xac, 0x14, 0x14, 0x22}]}, @lsrr={0x83, 0xb, 0x22, [@multicast1, @multicast2]}, @rr={0x7, 0xf, 0x64, [@loopback, @remote, @multicast2]}, @cipso={0x86, 0x1b, 0x3, [{0x2, 0x5, "54a590"}, {0x5, 0x10, "922ad128a61b70d7504713ac746f"}]}]}}}}}) ioctl$sock_inet6_SIOCDIFADDR(r6, 0x8936, &(0x7f0000000300)={@remote, 0x7, r7}) [ 2068.087088] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 2068.149915] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 2068.226065] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 2068.245130] nfs4: Unknown parameter 'ext4' 16:59:05 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r2 = socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local, r3}, 0x14) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="0500000000000000000000000000000012000000000000000000"]) setresuid(0xffffffffffffffff, r4, 0x0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r5, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r6 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000200)={'syztnl2\x00', r3, 0x1, 0x700, 0x100, 0x56b, {{0x28, 0x4, 0x0, 0x8, 0xa0, 0x67, 0x0, 0xf8, 0x2f, 0x0, @empty, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@rr={0x7, 0x17, 0x15, [@empty, @multicast2, @empty, @broadcast, @loopback]}, @timestamp={0x44, 0xc, 0x37, 0x0, 0x3, [0x3, 0xd8e1]}, @lsrr={0x83, 0x7, 0xb3, [@private=0xa010101]}, @rr={0x7, 0x2b, 0xd8, [@loopback, @private=0xa010102, @rand_addr=0x64010100, @multicast2, @loopback, @rand_addr=0x64010101, @dev={0xac, 0x14, 0x14, 0x11}, @initdev={0xac, 0x1e, 0x0, 0x0}, @loopback, @dev={0xac, 0x14, 0x14, 0x22}]}, @lsrr={0x83, 0xb, 0x22, [@multicast1, @multicast2]}, @rr={0x7, 0xf, 0x64, [@loopback, @remote, @multicast2]}, @cipso={0x86, 0x1b, 0x3, [{0x2, 0x5, "54a590"}, {0x5, 0x10, "922ad128a61b70d7504713ac746f"}]}]}}}}}) ioctl$sock_inet6_SIOCDIFADDR(r6, 0x8936, &(0x7f0000000300)={@remote, 0x7, r7}) 16:59:05 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) sendmsg$nl_generic(r0, 0x0, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) 16:59:05 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) [ 2068.501879] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 16:59:05 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) creat(0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x10000000) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) flistxattr(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, 0x0) r0 = creat(&(0x7f0000000240)='./file0\x00', 0x8c) sendmsg$nl_generic(r0, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, 0x32, 0x10, 0x70bd2d, 0x25dfdbfe, {}, [@typed={0xc, 0x62, 0x0, 0x0, @u64=0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x400c0}, 0x2000c084) 16:59:05 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, 0x0, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d400", 0xe, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) 16:59:05 executing program 1: r0 = openat(0xffffffffffffff9c, 0x0, 0x44e2, 0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x80000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x0) mknodat$null(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x800, 0x103) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) r2 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) linkat(r2, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x1000) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='numa_maps\x00') readv(r3, &(0x7f0000003700)=[{&(0x7f0000000200)=""/216, 0xd8}, {&(0x7f00000003c0)=""/121, 0x79}, {&(0x7f0000000380)=""/51, 0x33}, {&(0x7f00000014c0)=""/160, 0xa0}, {&(0x7f0000001640)=""/256, 0x100}, {0x0}, {&(0x7f00000015c0)=""/51, 0x33}, {&(0x7f00000001c0)=""/57, 0x39}], 0x8) readv(r3, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000019c0)=ANY=[@ANYBLOB="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"], 0x28}}, 0x0) r6 = syz_io_uring_setup(0x4f3, &(0x7f0000000300)={0x0, 0x9d80, 0x10, 0x3, 0x3af, 0x0, r0}, &(0x7f0000bff000/0x400000)=nil, &(0x7f0000cb6000/0x4000)=nil, &(0x7f0000000000), &(0x7f0000000180)) dup3(r5, r6, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_int(r7, 0x29, 0x4, 0x0, &(0x7f0000000080)) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000480)={'team0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_SET(r3, &(0x7f00000017c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001580)={&(0x7f0000001800)={0x50, 0x0, 0x0, 0x70bd2b, 0x25dfdbfd, {}, [@ETHTOOL_A_DEBUG_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}]}]}, 0x50}, 0x1, 0x0, 0x0, 0x11}, 0x800) 16:59:05 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000040), 0x1a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) preadv(r0, &(0x7f0000000240)=[{&(0x7f0000000100)=""/19, 0x13}, {&(0x7f0000000340)=""/178, 0xb2}, {&(0x7f0000000400)=""/170, 0xaa}], 0x3, 0x0, 0x5) bind$unix(r1, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) listen(r1, 0x0) openat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x131201, 0x0) perf_event_open(&(0x7f0000000600)={0x2, 0xffffffffffffff12, 0x4, 0x3f, 0x1, 0x8, 0x0, 0xfffffffffffffff8, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x3}, 0x110, 0x1ff, 0x2, 0x6, 0x8, 0x2, 0x3, 0x0, 0x2}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000002580)={0x0, 0x0, {}, {}, {0x0, @struct, 0x0}}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f00000000c0)={r3, 0x0, 0x20}) ioctl$BTRFS_IOC_BALANCE_V2(r2, 0xc4009420, &(0x7f0000000a80)={0x1, 0x0, {0x6, @struct={0x0, 0xffff}, r3, 0x1, 0x5, 0xc, 0xff, 0xfffffffffffffffb, 0xb5, @usage=0x1, 0x401, 0x1f, [0xd7c, 0x7, 0x8001, 0x400, 0x6, 0x3]}, {0x1, @usage=0xffffffff, 0x0, 0x1, 0xff, 0x6, 0x2, 0x100000000, 0x0, @struct={0x0, 0x400000}, 0xea, 0x9, [0x55, 0x3210, 0x3, 0x2, 0x4, 0x80000001]}, {0x40, @struct={0x8, 0x4}, 0x0, 0x4, 0x0, 0x3dec, 0x8, 0xb8, 0x8b, @usage=0x2, 0x8, 0x10000, [0x7fff, 0x3, 0x7ff, 0xc0c, 0x7cb1, 0x4]}, {0x4, 0x7, 0x2}}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000580)) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x2a, 0x0, 0xe2, 0x9e, 0x0, 0x10001, 0x22d00, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000004c0)}, 0x0, 0x8fa, 0xfff, 0x0, 0xfffffffffffffffc, 0x8, 0x2a1e, 0x0, 0x80, 0x0, 0x831}, 0x0, 0x0, r0, 0xa) connect$unix(r2, &(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e) r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendto$unix(r4, &(0x7f00000001c0)="71c8fcdec12c94cc2c956df44d0cfab1b74ae676aaf48ee784f18fa85887742923c7702a7c662659f337ab3d7a78b4ecf76f4f78d4ae2b6a52967d6401e9c68c6906297336eecfafa13e1a6858f797332f429ead621b12f7d737fa05091fd2150230446769df0f46629d692751480b4c5f", 0x71, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000e80), 0x40, 0x0) [ 2068.664818] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 2068.722015] nfs4: Unknown parameter 'ext4' 16:59:06 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) sendmsg$nl_generic(r0, 0x0, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) [ 2068.959435] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 2069.119050] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 2069.130608] perf: interrupt took too long (3228 > 3161), lowering kernel.perf_event_max_sample_rate to 61000 [ 2069.162135] perf: interrupt took too long (4075 > 4035), lowering kernel.perf_event_max_sample_rate to 49000 [ 2069.192044] perf: interrupt took too long (5102 > 5093), lowering kernel.perf_event_max_sample_rate to 39000 16:59:19 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = getpgid(0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x24, 0x1e, 0xc0b12afe4b722e85, 0x0, 0x0, {}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x8, 0x0, 0x0, @pid=r2}]}, 0x24}}, 0x0) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r3 = getpgid(0xffffffffffffffff) ptrace(0x10, r3) clone3(&(0x7f0000001500)={0x80000000, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0x2f}, &(0x7f00000002c0)=""/197, 0xc5, &(0x7f0000001440)=""/134, &(0x7f00000003c0)=[r3, 0x0], 0x2, {r1}}, 0x58) r4 = memfd_create(&(0x7f0000000080)='\x00', 0x2) r5 = socket$nl_audit(0x10, 0x3, 0x9) getsockopt$IP_SET_OP_GET_FNAME(r1, 0x1, 0x53, &(0x7f0000000400)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f0000001600)=0x2c) read(r5, &(0x7f0000001580)=""/92, 0x5c) fcntl$getown(r4, 0x9) ptrace$getregset(0x4204, 0x0, 0x2, &(0x7f0000000140)={&(0x7f0000000440)=""/4096, 0x1000}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1c92c2, 0x0) 16:59:19 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, 0x0, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) 16:59:19 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7", 0x31, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) 16:59:19 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000040), 0x1a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) preadv(r0, &(0x7f0000000240)=[{&(0x7f0000000100)=""/19, 0x13}, {&(0x7f0000000340)=""/178, 0xb2}, {&(0x7f0000000400)=""/170, 0xaa}], 0x3, 0x0, 0x5) bind$unix(r1, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) listen(r1, 0x0) openat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x131201, 0x0) r2 = perf_event_open(&(0x7f0000000600)={0x2, 0xffffffffffffff12, 0x4, 0x3f, 0x1, 0x8, 0x0, 0xfffffffffffffff8, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x3}, 0x110, 0x1ff, 0x2, 0x6, 0x8, 0x2, 0x3, 0x0, 0x2}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) r3 = socket$unix(0x1, 0x5, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000002580)={0x0, 0x0, {}, {}, {0x0, @struct, 0x0}}) ioctl$BTRFS_IOC_SCRUB(r2, 0xc400941b, &(0x7f0000000680)={0x0, 0x2, 0x7ff}) ioctl$BTRFS_IOC_BALANCE_V2(r3, 0xc4009420, &(0x7f0000000a80)={0x1, 0x0, {0x6, @struct={0x0, 0xffff}, r4, 0x1, 0x5, 0xc, 0xff, 0xfffffffffffffffb, 0xb5, @usage=0x1, 0x401, 0x1f, [0xd7c, 0x7, 0x8001, 0x400, 0x6, 0x3]}, {0x1, @usage=0xffffffff, r5, 0x1, 0xff, 0x6, 0x2, 0x100000000, 0x0, @struct={0x0, 0x400000}, 0xea, 0x9, [0x55, 0x3210, 0x3, 0x2, 0x4, 0x80000001]}, {0x40, @struct={0x8, 0x4}, 0x0, 0x4, 0x0, 0x3dec, 0x8, 0xb8, 0x8b, @usage=0x2, 0x8, 0x10000, [0x7fff, 0x3, 0x7ff, 0xc0c, 0x7cb1, 0x4]}, {0x4, 0x7, 0x2}}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000580)) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x2a, 0x0, 0xe2, 0x9e, 0x0, 0x10001, 0x22d00, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000004c0)}, 0x0, 0x8fa, 0xfff, 0x0, 0xfffffffffffffffc, 0x8, 0x2a1e, 0x0, 0x80, 0x0, 0x831}, 0x0, 0x0, r0, 0xa) connect$unix(r3, &(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e) r6 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendto$unix(r6, &(0x7f00000001c0)="71c8fcdec12c94cc2c956df44d0cfab1b74ae676aaf48ee784f18fa85887742923c7702a7c662659f337ab3d7a78b4ecf76f4f78d4ae2b6a52967d6401e9c68c6906297336eecfafa13e1a6858f797332f429ead621b12f7d737fa05091fd2150230446769df0f46629d692751480b4c5f", 0x71, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000e80), 0x40, 0x0) 16:59:19 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) creat(0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x10000000) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) flistxattr(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, 0x0) r0 = creat(&(0x7f0000000240)='./file0\x00', 0x8c) sendmsg$nl_generic(r0, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, 0x32, 0x10, 0x70bd2d, 0x25dfdbfe, {}, [@typed={0xc, 0x62, 0x0, 0x0, @u64=0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x400c0}, 0x2000c084) 16:59:19 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000040), 0x1a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) preadv(r0, &(0x7f0000000240)=[{&(0x7f0000000100)=""/19, 0x13}, {&(0x7f0000000340)=""/178, 0xb2}, {&(0x7f0000000400)=""/170, 0xaa}], 0x3, 0x0, 0x5) bind$unix(r1, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) listen(r1, 0x0) openat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x131201, 0x0) perf_event_open(&(0x7f0000000600)={0x2, 0xffffffffffffff12, 0x4, 0x3f, 0x1, 0x8, 0x0, 0xfffffffffffffff8, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x3}, 0x110, 0x1ff, 0x2, 0x6, 0x8, 0x2, 0x3, 0x0, 0x2}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000002580)={0x0, 0x0, {}, {}, {0x0, @struct, 0x0}}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f00000000c0)={r3, 0x0, 0x20}) ioctl$BTRFS_IOC_BALANCE_V2(r2, 0xc4009420, &(0x7f0000000a80)={0x1, 0x0, {0x6, @struct={0x0, 0xffff}, r3, 0x1, 0x5, 0xc, 0xff, 0xfffffffffffffffb, 0xb5, @usage=0x1, 0x401, 0x1f, [0xd7c, 0x7, 0x8001, 0x400, 0x6, 0x3]}, {0x1, @usage=0xffffffff, 0x0, 0x1, 0xff, 0x6, 0x2, 0x100000000, 0x0, @struct={0x0, 0x400000}, 0xea, 0x9, [0x55, 0x3210, 0x3, 0x2, 0x4, 0x80000001]}, {0x40, @struct={0x8, 0x4}, 0x0, 0x4, 0x0, 0x3dec, 0x8, 0xb8, 0x8b, @usage=0x2, 0x8, 0x10000, [0x7fff, 0x3, 0x7ff, 0xc0c, 0x7cb1, 0x4]}, {0x4, 0x7, 0x2}}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000580)) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x2a, 0x0, 0xe2, 0x9e, 0x0, 0x10001, 0x22d00, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000004c0)}, 0x0, 0x8fa, 0xfff, 0x0, 0xfffffffffffffffc, 0x8, 0x2a1e, 0x0, 0x80, 0x0, 0x831}, 0x0, 0x0, r0, 0xa) connect$unix(r2, &(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e) r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendto$unix(r4, &(0x7f00000001c0)="71c8fcdec12c94cc2c956df44d0cfab1b74ae676aaf48ee784f18fa85887742923c7702a7c662659f337ab3d7a78b4ecf76f4f78d4ae2b6a52967d6401e9c68c6906297336eecfafa13e1a6858f797332f429ead621b12f7d737fa05091fd2150230446769df0f46629d692751480b4c5f", 0x71, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000e80), 0x40, 0x0) 16:59:19 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) [ 2082.764917] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 16:59:20 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) sendmsg$nl_generic(r0, 0x0, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) [ 2082.826358] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 2082.829799] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2082.831782] EXT4-fs (loop6): group descriptors corrupted! [ 2082.867748] nfs4: Unknown parameter 'ext4' [ 2082.876553] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 16:59:20 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) creat(0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x10000000) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) flistxattr(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)) r0 = creat(&(0x7f0000000240)='./file0\x00', 0x8c) sendmsg$nl_generic(r0, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, 0x32, 0x10, 0x70bd2d, 0x25dfdbfe, {}, [@typed={0xc, 0x62, 0x0, 0x0, @u64=0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x400c0}, 0x2000c084) [ 2083.003277] nfs4: Unknown parameter 'ext4' 16:59:20 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000040), 0x1a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) preadv(r0, &(0x7f0000000240)=[{&(0x7f0000000100)=""/19, 0x13}, {&(0x7f0000000340)=""/178, 0xb2}, {&(0x7f0000000400)=""/170, 0xaa}], 0x3, 0x0, 0x5) bind$unix(r1, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) listen(r1, 0x0) openat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x131201, 0x0) r2 = perf_event_open(&(0x7f0000000600)={0x2, 0xffffffffffffff12, 0x4, 0x3f, 0x1, 0x8, 0x0, 0xfffffffffffffff8, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x3}, 0x110, 0x1ff, 0x2, 0x6, 0x8, 0x2, 0x3, 0x0, 0x2}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) r3 = socket$unix(0x1, 0x5, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000002580)={0x0, 0x0, {}, {}, {0x0, @struct, 0x0}}) ioctl$BTRFS_IOC_SCRUB(r2, 0xc400941b, &(0x7f0000000680)={0x0, 0x2, 0x7ff}) ioctl$BTRFS_IOC_BALANCE_V2(r3, 0xc4009420, &(0x7f0000000a80)={0x1, 0x0, {0x6, @struct={0x0, 0xffff}, r4, 0x1, 0x5, 0xc, 0xff, 0xfffffffffffffffb, 0xb5, @usage=0x1, 0x401, 0x1f, [0xd7c, 0x7, 0x8001, 0x400, 0x6, 0x3]}, {0x1, @usage=0xffffffff, r5, 0x1, 0xff, 0x6, 0x2, 0x100000000, 0x0, @struct={0x0, 0x400000}, 0xea, 0x9, [0x55, 0x3210, 0x3, 0x2, 0x4, 0x80000001]}, {0x40, @struct={0x8, 0x4}, 0x0, 0x4, 0x0, 0x3dec, 0x8, 0xb8, 0x8b, @usage=0x2, 0x8, 0x10000, [0x7fff, 0x3, 0x7ff, 0xc0c, 0x7cb1, 0x4]}, {0x4, 0x7, 0x2}}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000580)) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x2a, 0x0, 0xe2, 0x9e, 0x0, 0x10001, 0x22d00, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000004c0)}, 0x0, 0x8fa, 0xfff, 0x0, 0xfffffffffffffffc, 0x8, 0x2a1e, 0x0, 0x80, 0x0, 0x831}, 0x0, 0x0, r0, 0xa) connect$unix(r3, &(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e) r6 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendto$unix(r6, &(0x7f00000001c0)="71c8fcdec12c94cc2c956df44d0cfab1b74ae676aaf48ee784f18fa85887742923c7702a7c662659f337ab3d7a78b4ecf76f4f78d4ae2b6a52967d6401e9c68c6906297336eecfafa13e1a6858f797332f429ead621b12f7d737fa05091fd2150230446769df0f46629d692751480b4c5f", 0x71, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000e80), 0x40, 0x0) [ 2083.027753] nfs4: Unknown parameter 'ext4' 16:59:20 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000000), r1) sendmsg$IEEE802154_ADD_IFACE(r0, &(0x7f0000000180)={0x0, 0xfffffffffffffe9a, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010000000000000000002100000009001f00706879310000000005002000000000000c0005000000000000000000cb1d9431f0a6fcd65ccb48a4ab9d5e4ad4080b82a98494fd6fa57e909b48df8c2d080924934f1fc7c0a4be4f321b11b78467430f4f6811b11e66fe896be33a06936401985cd6ddc029fbcdf916daa9ba9d48bc7c9b7715799c437a0c44b882295ee3c16b869000eba0bfad94b01c503391431695aa8e51be445e94369ee8"], 0x34}}, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f00000000c0)={'wpan3\x00', 0x0}) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r3, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000280)={&(0x7f0000000100)={0x5c, 0x0, 0x400, 0x70bd27, 0x25dfdbfe, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r4}, @NL802154_ATTR_SEC_LEVEL={0x14, 0x22, 0x0, 0x1, [@NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x1}, @NL802154_SECLEVEL_ATTR_FRAME={0x8, 0x2, 0x1}]}, @NL802154_ATTR_SEC_LEVEL={0x2c, 0x22, 0x0, 0x1, [@NL802154_SECLEVEL_ATTR_DEV_OVERRIDE={0x5}, @NL802154_SECLEVEL_ATTR_LEVELS={0x5}, @NL802154_SECLEVEL_ATTR_LEVELS={0x5, 0x1, 0x8}, @NL802154_SECLEVEL_ATTR_DEV_OVERRIDE={0x5, 0x4, 0x1}, @NL802154_SECLEVEL_ATTR_LEVELS={0x5, 0x1, 0x3f}]}]}, 0x5c}, 0x1, 0x0, 0x0, 0x1}, 0x84) 16:59:20 executing program 2: r0 = openat(0xffffffffffffff9c, 0x0, 0x639d1876ab868171, 0x0) ftruncate(0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x62) ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) creat(0x0, 0x0) r2 = openat(r0, &(0x7f0000000100)='./file1\x00', 0x1ad043, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000440)=[{&(0x7f00000001c0)=""/96, 0x60}, {&(0x7f0000000240)=""/103, 0x67}, {0x0}], 0x3, 0x2, 0x1) fallocate(r2, 0x0, 0x0, 0x8800000) r3 = openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./file1\x00', 0x4000, 0x20) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x101}, 0x4c20, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x100000001) 16:59:20 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) sendmsg$nl_generic(r0, 0x0, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) 16:59:20 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, 0x0, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) 16:59:20 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7", 0x31, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) [ 2083.283962] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 16:59:20 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000040), 0x1a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) preadv(r0, &(0x7f0000000240)=[{&(0x7f0000000100)=""/19, 0x13}, {&(0x7f0000000340)=""/178, 0xb2}, {&(0x7f0000000400)=""/170, 0xaa}], 0x3, 0x0, 0x5) bind$unix(r1, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) listen(r1, 0x0) openat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x131201, 0x0) r2 = perf_event_open(&(0x7f0000000600)={0x2, 0xffffffffffffff12, 0x4, 0x3f, 0x1, 0x8, 0x0, 0xfffffffffffffff8, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x3}, 0x110, 0x1ff, 0x2, 0x6, 0x8, 0x2, 0x3, 0x0, 0x2}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) r3 = socket$unix(0x1, 0x5, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000002580)={0x0, 0x0, {}, {}, {0x0, @struct, 0x0}}) ioctl$BTRFS_IOC_SCRUB(r2, 0xc400941b, &(0x7f0000000680)={0x0, 0x2, 0x7ff}) ioctl$BTRFS_IOC_BALANCE_V2(r3, 0xc4009420, &(0x7f0000000a80)={0x1, 0x0, {0x6, @struct={0x0, 0xffff}, r4, 0x1, 0x5, 0xc, 0xff, 0xfffffffffffffffb, 0xb5, @usage=0x1, 0x401, 0x1f, [0xd7c, 0x7, 0x8001, 0x400, 0x6, 0x3]}, {0x1, @usage=0xffffffff, r5, 0x1, 0xff, 0x6, 0x2, 0x100000000, 0x0, @struct={0x0, 0x400000}, 0xea, 0x9, [0x55, 0x3210, 0x3, 0x2, 0x4, 0x80000001]}, {0x40, @struct={0x8, 0x4}, 0x0, 0x4, 0x0, 0x3dec, 0x8, 0xb8, 0x8b, @usage=0x2, 0x8, 0x10000, [0x7fff, 0x3, 0x7ff, 0xc0c, 0x7cb1, 0x4]}, {0x4, 0x7, 0x2}}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000580)) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x2a, 0x0, 0xe2, 0x9e, 0x0, 0x10001, 0x22d00, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000004c0)}, 0x0, 0x8fa, 0xfff, 0x0, 0xfffffffffffffffc, 0x8, 0x2a1e, 0x0, 0x80, 0x0, 0x831}, 0x0, 0x0, r0, 0xa) connect$unix(r3, &(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e) r6 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendto$unix(r6, &(0x7f00000001c0)="71c8fcdec12c94cc2c956df44d0cfab1b74ae676aaf48ee784f18fa85887742923c7702a7c662659f337ab3d7a78b4ecf76f4f78d4ae2b6a52967d6401e9c68c6906297336eecfafa13e1a6858f797332f429ead621b12f7d737fa05091fd2150230446769df0f46629d692751480b4c5f", 0x71, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000e80), 0x40, 0x0) [ 2083.376980] nfs4: Unknown parameter 'ext4' [ 2083.384366] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 2083.434529] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2083.436424] EXT4-fs (loop6): group descriptors corrupted! [ 2083.552042] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2083.587160] nfs4: Unknown parameter 'ext4' 16:59:34 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7", 0x31, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) 16:59:34 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000040), 0x1a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) preadv(r0, &(0x7f0000000240)=[{&(0x7f0000000100)=""/19, 0x13}, {&(0x7f0000000340)=""/178, 0xb2}, {&(0x7f0000000400)=""/170, 0xaa}], 0x3, 0x0, 0x5) bind$unix(r1, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) listen(r1, 0x0) openat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x131201, 0x0) r2 = perf_event_open(&(0x7f0000000600)={0x2, 0xffffffffffffff12, 0x4, 0x3f, 0x1, 0x8, 0x0, 0xfffffffffffffff8, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x3}, 0x110, 0x1ff, 0x2, 0x6, 0x8, 0x2, 0x3, 0x0, 0x2}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) r3 = socket$unix(0x1, 0x5, 0x0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f00000000c0)={0x0, 0x0, 0x20}) ioctl$BTRFS_IOC_SCRUB(r2, 0xc400941b, &(0x7f0000000680)={0x0, 0x2, 0x7ff}) ioctl$BTRFS_IOC_BALANCE_V2(r3, 0xc4009420, &(0x7f0000000a80)={0x1, 0x0, {0x6, @struct={0x0, 0xffff}, 0x0, 0x1, 0x5, 0xc, 0xff, 0xfffffffffffffffb, 0xb5, @usage=0x1, 0x401, 0x1f, [0xd7c, 0x7, 0x8001, 0x400, 0x6, 0x3]}, {0x1, @usage=0xffffffff, r4, 0x1, 0xff, 0x6, 0x2, 0x100000000, 0x0, @struct={0x0, 0x400000}, 0xea, 0x9, [0x55, 0x3210, 0x3, 0x2, 0x4, 0x80000001]}, {0x40, @struct={0x8, 0x4}, 0x0, 0x4, 0x0, 0x3dec, 0x8, 0xb8, 0x8b, @usage=0x2, 0x8, 0x10000, [0x7fff, 0x3, 0x7ff, 0xc0c, 0x7cb1, 0x4]}, {0x4, 0x7, 0x2}}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000580)) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x2a, 0x0, 0xe2, 0x9e, 0x0, 0x10001, 0x22d00, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000004c0)}, 0x0, 0x8fa, 0xfff, 0x0, 0xfffffffffffffffc, 0x8, 0x2a1e, 0x0, 0x80, 0x0, 0x831}, 0x0, 0x0, r0, 0xa) connect$unix(r3, &(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e) r5 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendto$unix(r5, &(0x7f00000001c0)="71c8fcdec12c94cc2c956df44d0cfab1b74ae676aaf48ee784f18fa85887742923c7702a7c662659f337ab3d7a78b4ecf76f4f78d4ae2b6a52967d6401e9c68c6906297336eecfafa13e1a6858f797332f429ead621b12f7d737fa05091fd2150230446769df0f46629d692751480b4c5f", 0x71, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000e80), 0x40, 0x0) 16:59:34 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) sendmsg$nl_generic(r0, 0x0, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) 16:59:34 executing program 1: ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = dup2(r1, r0) inotify_init() mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000200)=ANY=[]) lseek(r2, 0x7, 0x3) r3 = creat(&(0x7f00000000c0)='./file1\x00', 0x20) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0xa001, 0x6a) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r4, r2, 0x0, 0x7ffffff9) [ 2097.708883] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 16:59:34 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) creat(0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x10000000) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) flistxattr(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)) r0 = creat(&(0x7f0000000240)='./file0\x00', 0x8c) sendmsg$nl_generic(r0, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, 0x32, 0x10, 0x70bd2d, 0x25dfdbfe, {}, [@typed={0xc, 0x62, 0x0, 0x0, @u64=0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x400c0}, 0x2000c084) 16:59:34 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x5, 0xffffffffffffffff, 0x0) pread64(0xffffffffffffffff, 0x0, 0x7ffffffff000, 0xf0ff1f00000000) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @remote, 0xffff}, 0x1c) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x41) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f00000000c0)=0x1000, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="28000000100001000000000000000000000000000500000024386a562b500000000c00008008000d00ac141400"], 0x28}}, 0x0) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="73797a3160696d431c5c8c3f27c3d66384689a8dc28a7a4dc23d5a7edab8990b4ef18681314ba3b82d4d19a6f7a1e8f12f159c71b9086b73b5a6312dece79b5dd05111f4faa6cb008be647f33f9d6c9b1374bb80ff9538afa2f182e5e439c6b9f1a334bf7e9f9c69fb36425219f8dd5dca172e04dc2f87dd"], 0x7d) chdir(&(0x7f00000001c0)='./file0\x00') r1 = syz_open_dev$mouse(&(0x7f0000000400), 0x7fffffff, 0x2d0401) sendmsg$NL80211_CMD_ADD_NAN_FUNCTION(r1, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x24, 0x0, 0x800, 0x70bd29, 0x25dfdbfd, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_NAN_FUNC={0x8, 0xf0, 0x0, 0x1, [@NL80211_NAN_FUNC_SUBSCRIBE_ACTIVE={0x4}]}]}, 0x24}, 0x1, 0x0, 0x0, 0x95}, 0x40000) open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0, 0xffffffff81000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/crypto\x00', 0x0, 0x0) pread64(r2, &(0x7f00000010c0)=""/4088, 0xff8, 0x0) writev(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000000)="0000abe02400030021206cda3b5e5672b89aeddb2a535fbd0706006dff0043a9d7cceb232fb81bf74ebdd05b7677", 0x2e}, {&(0x7f0000000680)="7fd41c04550300020000000000000000010046e92ed2616f72657d044129471d4fd47924fd0900e09e0068deec02", 0x2e}], 0x2) 16:59:34 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, 0x0, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) 16:59:34 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x101342, 0x0) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x8602, 0x0) sendfile(r0, r1, 0x0, 0x100000001) ftruncate(r0, 0xff) ioctl$sock_SIOCETHTOOL(r1, 0x8946, 0x0) [ 2097.762044] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2097.771836] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 2097.791016] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 2097.795264] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 2097.797370] EXT4-fs (loop6): group descriptors corrupted! 16:59:35 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000040), 0x1a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) preadv(r0, &(0x7f0000000240)=[{&(0x7f0000000100)=""/19, 0x13}, {&(0x7f0000000340)=""/178, 0xb2}, {&(0x7f0000000400)=""/170, 0xaa}], 0x3, 0x0, 0x5) bind$unix(r1, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) listen(r1, 0x0) openat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x131201, 0x0) r2 = perf_event_open(&(0x7f0000000600)={0x2, 0xffffffffffffff12, 0x4, 0x3f, 0x1, 0x8, 0x0, 0xfffffffffffffff8, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x3}, 0x110, 0x1ff, 0x2, 0x6, 0x8, 0x2, 0x3, 0x0, 0x2}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) r3 = socket$unix(0x1, 0x5, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000002580)={0x0, 0x0, {}, {}, {0x0, @struct, 0x0}}) ioctl$BTRFS_IOC_SCRUB(r2, 0xc400941b, &(0x7f0000000680)={0x0, 0x2, 0x7ff}) ioctl$BTRFS_IOC_BALANCE_V2(r3, 0xc4009420, &(0x7f0000000a80)={0x1, 0x0, {0x6, @struct={0x0, 0xffff}, r4, 0x1, 0x5, 0xc, 0xff, 0xfffffffffffffffb, 0xb5, @usage=0x1, 0x401, 0x1f, [0xd7c, 0x7, 0x8001, 0x400, 0x6, 0x3]}, {0x1, @usage=0xffffffff, r5, 0x1, 0xff, 0x6, 0x2, 0x100000000, 0x0, @struct={0x0, 0x400000}, 0xea, 0x9, [0x55, 0x3210, 0x3, 0x2, 0x4, 0x80000001]}, {0x40, @struct={0x8, 0x4}, 0x0, 0x4, 0x0, 0x3dec, 0x8, 0xb8, 0x8b, @usage=0x2, 0x8, 0x10000, [0x7fff, 0x3, 0x7ff, 0xc0c, 0x7cb1, 0x4]}, {0x4, 0x7, 0x2}}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000580)) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x2a, 0x0, 0xe2, 0x9e, 0x0, 0x10001, 0x22d00, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000004c0)}, 0x0, 0x8fa, 0xfff, 0x0, 0xfffffffffffffffc, 0x8, 0x2a1e, 0x0, 0x80, 0x0, 0x831}, 0x0, 0x0, r0, 0xa) connect$unix(r3, &(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e) r6 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendto$unix(r6, &(0x7f00000001c0)="71c8fcdec12c94cc2c956df44d0cfab1b74ae676aaf48ee784f18fa85887742923c7702a7c662659f337ab3d7a78b4ecf76f4f78d4ae2b6a52967d6401e9c68c6906297336eecfafa13e1a6858f797332f429ead621b12f7d737fa05091fd2150230446769df0f46629d692751480b4c5f", 0x71, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000e80), 0x40, 0x0) 16:59:35 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000040), 0x1a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) preadv(r0, &(0x7f0000000240)=[{&(0x7f0000000100)=""/19, 0x13}, {&(0x7f0000000340)=""/178, 0xb2}, {&(0x7f0000000400)=""/170, 0xaa}], 0x3, 0x0, 0x5) bind$unix(r1, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) listen(r1, 0x0) openat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x131201, 0x0) r2 = perf_event_open(&(0x7f0000000600)={0x2, 0xffffffffffffff12, 0x4, 0x3f, 0x1, 0x8, 0x0, 0xfffffffffffffff8, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x3}, 0x110, 0x1ff, 0x2, 0x6, 0x8, 0x2, 0x3, 0x0, 0x2}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) r3 = socket$unix(0x1, 0x5, 0x0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f00000000c0)={0x0, 0x0, 0x20}) ioctl$BTRFS_IOC_SCRUB(r2, 0xc400941b, &(0x7f0000000680)={0x0, 0x2, 0x7ff}) ioctl$BTRFS_IOC_BALANCE_V2(r3, 0xc4009420, &(0x7f0000000a80)={0x1, 0x0, {0x6, @struct={0x0, 0xffff}, 0x0, 0x1, 0x5, 0xc, 0xff, 0xfffffffffffffffb, 0xb5, @usage=0x1, 0x401, 0x1f, [0xd7c, 0x7, 0x8001, 0x400, 0x6, 0x3]}, {0x1, @usage=0xffffffff, r4, 0x1, 0xff, 0x6, 0x2, 0x100000000, 0x0, @struct={0x0, 0x400000}, 0xea, 0x9, [0x55, 0x3210, 0x3, 0x2, 0x4, 0x80000001]}, {0x40, @struct={0x8, 0x4}, 0x0, 0x4, 0x0, 0x3dec, 0x8, 0xb8, 0x8b, @usage=0x2, 0x8, 0x10000, [0x7fff, 0x3, 0x7ff, 0xc0c, 0x7cb1, 0x4]}, {0x4, 0x7, 0x2}}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000580)) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x2a, 0x0, 0xe2, 0x9e, 0x0, 0x10001, 0x22d00, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000004c0)}, 0x0, 0x8fa, 0xfff, 0x0, 0xfffffffffffffffc, 0x8, 0x2a1e, 0x0, 0x80, 0x0, 0x831}, 0x0, 0x0, r0, 0xa) connect$unix(r3, &(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e) r5 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendto$unix(r5, &(0x7f00000001c0)="71c8fcdec12c94cc2c956df44d0cfab1b74ae676aaf48ee784f18fa85887742923c7702a7c662659f337ab3d7a78b4ecf76f4f78d4ae2b6a52967d6401e9c68c6906297336eecfafa13e1a6858f797332f429ead621b12f7d737fa05091fd2150230446769df0f46629d692751480b4c5f", 0x71, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000e80), 0x40, 0x0) [ 2097.884858] nfs4: Unknown parameter 'ext4' [ 2097.890892] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 16:59:35 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) openat(r0, &(0x7f00000000c0)='./file0\x00', 0x10000, 0x1) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0xfdef) syz_io_uring_complete(r1) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000014c0)={0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) read(r3, &(0x7f0000000080)=""/48, 0x30) syz_io_uring_submit(r1, 0x0, &(0x7f0000000000)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x0, 0x0, @fd=r3, 0x5, 0x0, 0x2, 0x5, 0x1}, 0x1) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 16:59:35 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}], 0x81, &(0x7f00000006c0)=ANY=[]) pipe(&(0x7f00000014c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000000)="e7", 0x1) r2 = socket$inet_icmp(0x2, 0x2, 0x1) fcntl$setstatus(r2, 0x4, 0x4000) write$P9_RREADLINK(r1, &(0x7f0000000080)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) signalfd(r0, &(0x7f00000000c0)={[0x2]}, 0x8) 16:59:35 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000", 0x4a, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) 16:59:35 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) creat(0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x10000000) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) flistxattr(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)) r0 = creat(&(0x7f0000000240)='./file0\x00', 0x8c) sendmsg$nl_generic(r0, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, 0x32, 0x10, 0x70bd2d, 0x25dfdbfe, {}, [@typed={0xc, 0x62, 0x0, 0x0, @u64=0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x400c0}, 0x2000c084) 16:59:35 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) sendmsg$nl_generic(r0, 0x0, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) [ 2098.002172] nfs4: Unknown parameter 'ext4' 16:59:35 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) sendmsg$nl_generic(r0, 0x0, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) 16:59:35 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, 0x0, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) [ 2098.081082] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2098.104560] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 2098.123200] nfs4: Unknown parameter 'ext4' [ 2098.134476] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated 16:59:35 executing program 1: mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, 0x100010, 0xffffffffffffffff, 0x2000) mbind(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x0, 0x0, 0x0) [ 2098.147087] EXT4-fs (loop0): get root inode failed [ 2098.148265] EXT4-fs (loop0): mount failed 16:59:35 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, 0x0, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) [ 2098.186196] EXT4-fs (loop6): VFS: Can't find ext4 filesystem 16:59:35 executing program 2: r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmat(r0, &(0x7f0000ff9000/0x4000)=nil, 0x4000) shmctl$SHM_LOCK(r0, 0xb) shmctl$IPC_RMID(r0, 0x0) mlock2(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x1) shmat(r0, &(0x7f0000ff9000/0x4000)=nil, 0x5000) shmctl$SHM_UNLOCK(r0, 0xc) 16:59:35 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) creat(0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x10000000) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) flistxattr(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)) r0 = creat(&(0x7f0000000240)='./file0\x00', 0x8c) sendmsg$nl_generic(r0, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, 0x32, 0x10, 0x70bd2d, 0x25dfdbfe, {}, [@typed={0xc, 0x62, 0x0, 0x0, @u64=0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x400c0}, 0x2000c084) 16:59:35 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) creat(0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x10000000) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) flistxattr(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) r0 = creat(0x0, 0x8c) sendmsg$nl_generic(r0, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, 0x32, 0x10, 0x70bd2d, 0x25dfdbfe, {}, [@typed={0xc, 0x62, 0x0, 0x0, @u64=0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x400c0}, 0x2000c084) [ 2098.227232] nfs4: Unknown parameter 'ext4' 16:59:35 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000040), 0x1a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) preadv(r0, &(0x7f0000000240)=[{&(0x7f0000000100)=""/19, 0x13}, {&(0x7f0000000340)=""/178, 0xb2}, {&(0x7f0000000400)=""/170, 0xaa}], 0x3, 0x0, 0x5) bind$unix(r1, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) listen(r1, 0x0) openat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x131201, 0x0) r2 = perf_event_open(&(0x7f0000000600)={0x2, 0xffffffffffffff12, 0x4, 0x3f, 0x1, 0x8, 0x0, 0xfffffffffffffff8, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x3}, 0x110, 0x1ff, 0x2, 0x6, 0x8, 0x2, 0x3, 0x0, 0x2}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) r3 = socket$unix(0x1, 0x5, 0x0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f00000000c0)={0x0, 0x0, 0x20}) ioctl$BTRFS_IOC_SCRUB(r2, 0xc400941b, &(0x7f0000000680)={0x0, 0x2, 0x7ff}) ioctl$BTRFS_IOC_BALANCE_V2(r3, 0xc4009420, &(0x7f0000000a80)={0x1, 0x0, {0x6, @struct={0x0, 0xffff}, 0x0, 0x1, 0x5, 0xc, 0xff, 0xfffffffffffffffb, 0xb5, @usage=0x1, 0x401, 0x1f, [0xd7c, 0x7, 0x8001, 0x400, 0x6, 0x3]}, {0x1, @usage=0xffffffff, r4, 0x1, 0xff, 0x6, 0x2, 0x100000000, 0x0, @struct={0x0, 0x400000}, 0xea, 0x9, [0x55, 0x3210, 0x3, 0x2, 0x4, 0x80000001]}, {0x40, @struct={0x8, 0x4}, 0x0, 0x4, 0x0, 0x3dec, 0x8, 0xb8, 0x8b, @usage=0x2, 0x8, 0x10000, [0x7fff, 0x3, 0x7ff, 0xc0c, 0x7cb1, 0x4]}, {0x4, 0x7, 0x2}}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000580)) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x2a, 0x0, 0xe2, 0x9e, 0x0, 0x10001, 0x22d00, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000004c0)}, 0x0, 0x8fa, 0xfff, 0x0, 0xfffffffffffffffc, 0x8, 0x2a1e, 0x0, 0x80, 0x0, 0x831}, 0x0, 0x0, r0, 0xa) connect$unix(r3, &(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e) r5 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendto$unix(r5, &(0x7f00000001c0)="71c8fcdec12c94cc2c956df44d0cfab1b74ae676aaf48ee784f18fa85887742923c7702a7c662659f337ab3d7a78b4ecf76f4f78d4ae2b6a52967d6401e9c68c6906297336eecfafa13e1a6858f797332f429ead621b12f7d737fa05091fd2150230446769df0f46629d692751480b4c5f", 0x71, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000e80), 0x40, 0x0) [ 2098.249936] nfs4: Unknown parameter 'ext4' [ 2098.319173] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 2098.453725] EXT4-fs (loop5): mounted filesystem without journal. Opts: delalloc,,errors=continue 16:59:50 executing program 3: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='loginuid\x00') syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_int(r2, 0x107, 0x14, 0x0, &(0x7f0000000100)) r3 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000140)='./file0\x00', 0x7, 0x1, &(0x7f0000000340)=[{&(0x7f0000000180)="1d23de7449ee513d0fbbb59dcf0b1bbac60fe6674c12730f11d2e4a1e5f805fa4b51984ac5bc8ca2939f684ddf22e6602e5bd13a291e12eb168fd3a24106088d1c278eafb335beb6e01629099e679c512f7219aa2f120c110a54e373ea9d3aaeb23dde64ff57a34a6b52aa10e55013c177ccf8a58eb34a2f8f5a64e95da56e9e9bb1de581df6f59867fe2d2005abe10959b04704", 0x94, 0x101}], 0x14041, &(0x7f00000014c0)=ANY=[@ANYBLOB]) dup2(0xffffffffffffffff, r3) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_xfrm(r1, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="1400000cd000000126bd7000fddbdf25ffeec959"], 0x14}}, 0xf1a8feb270d50a00) r4 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$packet_int(r1, 0x107, 0x12, &(0x7f0000000240)=0x8000, 0x4) sendmsg$nl_generic(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 16:59:50 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) sendmsg$nl_generic(r0, 0x0, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) 16:59:50 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) creat(0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x10000000) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) flistxattr(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) r0 = creat(0x0, 0x8c) sendmsg$nl_generic(r0, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, 0x32, 0x10, 0x70bd2d, 0x25dfdbfe, {}, [@typed={0xc, 0x62, 0x0, 0x0, @u64=0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x400c0}, 0x2000c084) 16:59:50 executing program 2: tgkill(0x0, 0x0, 0x5) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x802c2, 0x40) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file1\x00', 0x10140, 0x34) r2 = creat(&(0x7f0000000040)='./file1\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x105142, 0x0) dup2(r5, r5) r6 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r7 = fcntl$dupfd(0xffffffffffffffff, 0x0, r6) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r7, 0x40505412, &(0x7f00000002c0)={0x4, 0x9, 0xaf0e}) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r7, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000480)=ANY=[@ANYBLOB="33c1188d6b2d95d8e8bfdefdd9fd400a1eb436000000ad55fee0fafed9aa47c97b81b687167b4f4f0fdf30767d554dffdc9191ccfcf179d3ad8d2d481192b81b8d2ef87f98448ff8a70ee3658222570a37a48cd1eb8060da5a70a3e25a85164e0933f590c20a3cfc2f2557", @ANYRES16=0x0, @ANYBLOB="00042dbd7000ffdbdf250700000008000300", @ANYRES32=0x0, @ANYBLOB="08003b000400000005002d00010000000500330001000000"], 0x34}, 0x1, 0x0, 0x0, 0x20000040}, 0x10) openat(r7, &(0x7f0000000200)='./file0\x00', 0x0, 0x10) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={&(0x7f00000001c0)}, 0x40522, 0x0, 0x0, 0x0, 0x1f, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) 16:59:50 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, 0x0, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) 16:59:50 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000", 0x4a, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) 16:59:50 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa0002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1241}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x5, 0x80, 0x8, 0x8, 0x81, 0x2, 0x0, 0x4, 0x840, 0xa, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x1, 0x1fffe000000}, 0x6404, 0x1f, 0x20, 0x0, 0x7, 0x8, 0xe, 0x0, 0x9}, 0xffffffffffffffff, 0xa, r0, 0x2) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000300), 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x4) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x4000000) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="0000000000000000ffffffe2"]) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x8, 0x50, 0xffffffffffffffff, 0x8000000) r2 = socket$inet6(0xa, 0x3, 0x8926) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000000)={'ip6tnl0\x00', &(0x7f00000001c0)={'ip6tnl0\x00', 0x0, 0x4, 0x1, 0x9, 0x6, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @local, 0x7800, 0x8, 0xfe6, 0x4}}) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x0) 16:59:50 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000040), 0x1a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) preadv(r0, &(0x7f0000000240)=[{&(0x7f0000000100)=""/19, 0x13}, {&(0x7f0000000340)=""/178, 0xb2}, {&(0x7f0000000400)=""/170, 0xaa}], 0x3, 0x0, 0x5) bind$unix(r1, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) listen(r1, 0x0) openat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x131201, 0x0) r2 = perf_event_open(&(0x7f0000000600)={0x2, 0xffffffffffffff12, 0x4, 0x3f, 0x1, 0x8, 0x0, 0xfffffffffffffff8, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x3}, 0x110, 0x1ff, 0x2, 0x6, 0x8, 0x2, 0x3, 0x0, 0x2}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000002580)={0x0, 0x0, {}, {}, {0x0, @struct, 0x0}}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f00000000c0)={r3, 0x0, 0x20}) ioctl$BTRFS_IOC_SCRUB(r2, 0xc400941b, &(0x7f0000000680)={0x0, 0x2, 0x7ff}) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f0000000a80)={0x1, 0x0, {0x6, @struct={0x0, 0xffff}, r3, 0x1, 0x5, 0xc, 0xff, 0xfffffffffffffffb, 0xb5, @usage=0x1, 0x401, 0x1f, [0xd7c, 0x7, 0x8001, 0x400, 0x6, 0x3]}, {0x1, @usage=0xffffffff, r4, 0x1, 0xff, 0x6, 0x2, 0x100000000, 0x0, @struct={0x0, 0x400000}, 0xea, 0x9, [0x55, 0x3210, 0x3, 0x2, 0x4, 0x80000001]}, {0x40, @struct={0x8, 0x4}, 0x0, 0x4, 0x0, 0x3dec, 0x8, 0xb8, 0x8b, @usage=0x2, 0x8, 0x10000, [0x7fff, 0x3, 0x7ff, 0xc0c, 0x7cb1, 0x4]}, {0x4, 0x7, 0x2}}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000580)) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x2a, 0x0, 0xe2, 0x9e, 0x0, 0x10001, 0x22d00, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000004c0)}, 0x0, 0x8fa, 0xfff, 0x0, 0xfffffffffffffffc, 0x8, 0x2a1e, 0x0, 0x80, 0x0, 0x831}, 0x0, 0x0, r0, 0xa) connect$unix(0xffffffffffffffff, &(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e) r5 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendto$unix(r5, &(0x7f00000001c0)="71c8fcdec12c94cc2c956df44d0cfab1b74ae676aaf48ee784f18fa85887742923c7702a7c662659f337ab3d7a78b4ecf76f4f78d4ae2b6a52967d6401e9c68c6906297336eecfafa13e1a6858f797332f429ead621b12f7d737fa05091fd2150230446769df0f46629d692751480b4c5f", 0x71, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000e80), 0x40, 0x0) [ 2112.856051] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 2112.873208] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 2112.882836] isofs_fill_super: bread failed, dev=loop3, iso_blknum=16, block=32 [ 2112.945738] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated [ 2112.955495] EXT4-fs (loop0): get root inode failed [ 2112.956608] EXT4-fs (loop0): mount failed [ 2112.961746] EXT4-fs (loop5): mounted filesystem without journal. Opts: delalloc,,errors=continue [ 2112.964835] nfs4: Unknown parameter 'ext4' 16:59:50 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) sendmsg$nl_generic(r0, 0x0, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) 16:59:50 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000040), 0x1a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) preadv(r0, &(0x7f0000000240)=[{&(0x7f0000000100)=""/19, 0x13}, {&(0x7f0000000340)=""/178, 0xb2}, {&(0x7f0000000400)=""/170, 0xaa}], 0x3, 0x0, 0x5) bind$unix(r1, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) listen(r1, 0x0) openat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x131201, 0x0) r2 = perf_event_open(&(0x7f0000000600)={0x2, 0xffffffffffffff12, 0x4, 0x3f, 0x1, 0x8, 0x0, 0xfffffffffffffff8, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x3}, 0x110, 0x1ff, 0x2, 0x6, 0x8, 0x2, 0x3, 0x0, 0x2}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000002580)={0x0, 0x0, {}, {}, {0x0, @struct, 0x0}}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f00000000c0)={r3, 0x0, 0x20}) ioctl$BTRFS_IOC_SCRUB(r2, 0xc400941b, &(0x7f0000000680)={0x0, 0x2, 0x7ff}) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f0000000a80)={0x1, 0x0, {0x6, @struct={0x0, 0xffff}, r3, 0x1, 0x5, 0xc, 0xff, 0xfffffffffffffffb, 0xb5, @usage=0x1, 0x401, 0x1f, [0xd7c, 0x7, 0x8001, 0x400, 0x6, 0x3]}, {0x1, @usage=0xffffffff, r4, 0x1, 0xff, 0x6, 0x2, 0x100000000, 0x0, @struct={0x0, 0x400000}, 0xea, 0x9, [0x55, 0x3210, 0x3, 0x2, 0x4, 0x80000001]}, {0x40, @struct={0x8, 0x4}, 0x0, 0x4, 0x0, 0x3dec, 0x8, 0xb8, 0x8b, @usage=0x2, 0x8, 0x10000, [0x7fff, 0x3, 0x7ff, 0xc0c, 0x7cb1, 0x4]}, {0x4, 0x7, 0x2}}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000580)) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x2a, 0x0, 0xe2, 0x9e, 0x0, 0x10001, 0x22d00, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000004c0)}, 0x0, 0x8fa, 0xfff, 0x0, 0xfffffffffffffffc, 0x8, 0x2a1e, 0x0, 0x80, 0x0, 0x831}, 0x0, 0x0, r0, 0xa) connect$unix(0xffffffffffffffff, &(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e) r5 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendto$unix(r5, &(0x7f00000001c0)="71c8fcdec12c94cc2c956df44d0cfab1b74ae676aaf48ee784f18fa85887742923c7702a7c662659f337ab3d7a78b4ecf76f4f78d4ae2b6a52967d6401e9c68c6906297336eecfafa13e1a6858f797332f429ead621b12f7d737fa05091fd2150230446769df0f46629d692751480b4c5f", 0x71, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000e80), 0x40, 0x0) 16:59:50 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) creat(0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x10000000) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) flistxattr(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) r0 = creat(0x0, 0x8c) sendmsg$nl_generic(r0, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, 0x32, 0x10, 0x70bd2d, 0x25dfdbfe, {}, [@typed={0xc, 0x62, 0x0, 0x0, @u64=0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x400c0}, 0x2000c084) 16:59:50 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, 0x0, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) [ 2113.141498] EXT4-fs (loop6): VFS: Can't find ext4 filesystem 16:59:50 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000040), 0x1a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) preadv(r0, &(0x7f0000000240)=[{&(0x7f0000000100)=""/19, 0x13}, {&(0x7f0000000340)=""/178, 0xb2}, {&(0x7f0000000400)=""/170, 0xaa}], 0x3, 0x0, 0x5) bind$unix(r1, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) listen(r1, 0x0) openat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x131201, 0x0) r2 = perf_event_open(&(0x7f0000000600)={0x2, 0xffffffffffffff12, 0x4, 0x3f, 0x1, 0x8, 0x0, 0xfffffffffffffff8, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x3}, 0x110, 0x1ff, 0x2, 0x6, 0x8, 0x2, 0x3, 0x0, 0x2}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000002580)={0x0, 0x0, {}, {}, {0x0, @struct, 0x0}}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f00000000c0)={r3, 0x0, 0x20}) ioctl$BTRFS_IOC_SCRUB(r2, 0xc400941b, &(0x7f0000000680)={0x0, 0x2, 0x7ff}) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f0000000a80)={0x1, 0x0, {0x6, @struct={0x0, 0xffff}, r3, 0x1, 0x5, 0xc, 0xff, 0xfffffffffffffffb, 0xb5, @usage=0x1, 0x401, 0x1f, [0xd7c, 0x7, 0x8001, 0x400, 0x6, 0x3]}, {0x1, @usage=0xffffffff, r4, 0x1, 0xff, 0x6, 0x2, 0x100000000, 0x0, @struct={0x0, 0x400000}, 0xea, 0x9, [0x55, 0x3210, 0x3, 0x2, 0x4, 0x80000001]}, {0x40, @struct={0x8, 0x4}, 0x0, 0x4, 0x0, 0x3dec, 0x8, 0xb8, 0x8b, @usage=0x2, 0x8, 0x10000, [0x7fff, 0x3, 0x7ff, 0xc0c, 0x7cb1, 0x4]}, {0x4, 0x7, 0x2}}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000580)) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x2a, 0x0, 0xe2, 0x9e, 0x0, 0x10001, 0x22d00, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000004c0)}, 0x0, 0x8fa, 0xfff, 0x0, 0xfffffffffffffffc, 0x8, 0x2a1e, 0x0, 0x80, 0x0, 0x831}, 0x0, 0x0, r0, 0xa) connect$unix(0xffffffffffffffff, &(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e) r5 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendto$unix(r5, &(0x7f00000001c0)="71c8fcdec12c94cc2c956df44d0cfab1b74ae676aaf48ee784f18fa85887742923c7702a7c662659f337ab3d7a78b4ecf76f4f78d4ae2b6a52967d6401e9c68c6906297336eecfafa13e1a6858f797332f429ead621b12f7d737fa05091fd2150230446769df0f46629d692751480b4c5f", 0x71, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000e80), 0x40, 0x0) 16:59:50 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000", 0x4a, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) [ 2113.328012] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 16:59:50 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, 0x0, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) 16:59:50 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) creat(0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x10000000) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) flistxattr(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) r0 = creat(0x0, 0x8c) sendmsg$nl_generic(r0, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, 0x32, 0x10, 0x70bd2d, 0x25dfdbfe, {}, [@typed={0xc, 0x62, 0x0, 0x0, @u64=0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x400c0}, 0x2000c084) [ 2113.444752] isofs_fill_super: bread failed, dev=loop3, iso_blknum=16, block=32 [ 2113.463379] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 2113.516740] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated [ 2113.525429] EXT4-fs (loop0): get root inode failed [ 2113.526644] EXT4-fs (loop0): mount failed [ 2113.594943] EXT4-fs (loop5): mounted filesystem without journal. Opts: delalloc,,errors=continue [ 2113.607841] nfs4: Unknown parameter 'ext4' [ 2113.618915] nfs4: Unknown parameter 'ext4' [ 2113.712182] EXT4-fs (loop1): mounted filesystem without journal. Opts: delalloc,,errors=continue 17:00:05 executing program 1: mq_notify(0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='.\x00', 0x500, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/power/resume', 0x22902, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x260d01, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000fea000/0x13000)=nil, 0x0, &(0x7f0000000140)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f00000000c0), 0xe}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$bt_hci(r0, &(0x7f0000000040)=ANY=[], 0xfdef) setsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f0000000100)=0xffff, 0x2) 17:00:05 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) sendmsg$nl_generic(r0, 0x0, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) 17:00:05 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) creat(0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x10000000) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) flistxattr(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) sendmsg$nl_generic(r0, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, 0x32, 0x10, 0x70bd2d, 0x25dfdbfe, {}, [@typed={0xc, 0x62, 0x0, 0x0, @u64=0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x400c0}, 0x2000c084) 17:00:05 executing program 2: syz_emit_ethernet(0x86, &(0x7f0000000b40)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb86dd6096153f00503a00fc020000000000000000000000000000ff02000000000000000000000000000102009078000000006000000000003a0000000000000000000000ffff0a010100ff0100000000000000000000000000013b02040106105e00ff010000000000000000000000000001f63406a527f784d849dd8dda0bd73a9c931e42b6cdddffb40a52d04efad197867fc1edc45008f2a37154df6ae5f49eae7d51d0ba17e3db922f8635141272f934020795a18382c1c35f16a8c91b3c8214e2db0f3fe803a671a62a115e6079f57edd98c3c813076abc8193a82f6bed1acc193864447aaa6035eaa195ac252ae5532b0465de10d04987b62d"], 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0), 0x6e, &(0x7f00000005c0)=[{&(0x7f0000000140)=""/83, 0x53}, {&(0x7f00000001c0)=""/166, 0xa6}, {&(0x7f0000000280)=""/193, 0xc1}, {&(0x7f0000000380)=""/238, 0xee}, {&(0x7f0000000480)=""/7, 0x7}, {&(0x7f00000004c0)=""/229, 0xe5}], 0x6, &(0x7f0000000640)=ANY=[@ANYBLOB="20000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYBLOB="1c001f00000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0x40}, 0x141) write$tun(0xffffffffffffffff, &(0x7f0000000700)={@void, @val={0x0, 0x0, 0x7ff, 0x6, 0x5, 0x1}, @ipv6=@gre_packet={0x7, 0x6, "b835b8", 0x3eb, 0x2f, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}, @loopback, {[@hopopts={0x3c, 0x1, '\x00', [@jumbo={0xc2, 0x4, 0x4}, @padn={0x1, 0x1, [0x0]}, @padn={0x1, 0x1, [0x0]}]}, @hopopts={0x2e, 0x5, '\x00', [@enc_lim={0x4, 0x1, 0x14}, @ra={0x5, 0x2, 0xa7}, @hao={0xc9, 0x10, @private0}, @enc_lim, @padn={0x1, 0x3, [0x0, 0x0, 0x0]}, @padn={0x1, 0x1, [0x0]}, @padn={0x1, 0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, @enc_lim={0x4, 0x1, 0x7}]}, @fragment={0x16, 0x0, 0x5, 0x1, 0x0, 0x0, 0x67}, @srh={0xa3, 0x4, 0x4, 0x2, 0x40, 0x0, 0x3, [@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @dev={0xfe, 0x80, '\x00', 0x22}]}, @fragment={0x3c, 0x0, 0x0, 0x0, 0x0, 0x7, 0x64}, @routing={0x16, 0xe, 0x2, 0x1f, 0x0, [@private2, @mcast2, @private2, @mcast2, @empty, @rand_addr=' \x01\x00', @private2]}, @dstopts={0x32, 0x0, '\x00', [@padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}]}, @srh={0x2e, 0x6, 0x4, 0x3, 0x9, 0x10, 0x4, [@private1={0xfc, 0x1, '\x00', 0x1}, @mcast1, @private0]}], {{0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x880b, 0xdd, 0x2, [], "db8ff935b22d3dc415e92c5c5153c148ff67a4730b4bb9d4a8abf90c5fc009e5b78af02ff45280ee924b300ddf61f379ef389d24b18f56ad4dfbe1ca3b4b6509f875c047a2cc8fc6c3c54eef61caa6c0d7e77a98d61cdc53c43784034265e6148d7c893d67f4897c4baec0fb9bb1d635c1f853280d790567cd8eb7eaa0a772116b051ecf8ea9e3999068bb54ed1670cd25202e5d43590469845d3407cd02154e971da2efee2cd72e922388ec86b78afc788a725777d26ed3e350ba7dacd4129f92c700905af0e543f8bf4e5599f9b3a2e52424383e90c3476a7944d44a"}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [0x100], "6ae360d7e076cd307ed089824e252a5e22515ec5ca50fc8b77145beb463917ee693232fb304bcb257c09ae9b30340db06f4fa4632fc43dadb80676"}, {0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x86dd, [0x800, 0x1, 0x0], "9329e240e62c33547c0e89b960f955b94bb49f426afcfa956555768e785c2511f8dc054aaabc6df149049b411e11943a6726ef27261ff5248999c77fb15b9b4930adb75a716d8fe6279b9fe294639c86457d538f885b057d566603ff027f9886b700de619969cff279ba0d68ebda62f9265a1ba4957e80c2b3fb7a0f19ab1c55bbc6d6b4d38ca565c36bea77ee8a89647b1b7490b3b3965b6e7dfb3093b4c581761be88facdffb30e9baba7e401e4e9f4b8b7cba830c32feba0958c0dcab7383a17050202cdcc49d63b868a1cd46765528a5fde282c5aed07dd40c061d442dffc59767bfbfcf1166795a7b"}, {0x8, 0x88be, 0x2, {{0x0, 0x1, 0x9, 0x3, 0x1, 0x3, 0x1, 0xc0}, 0x1, {0x5}}}, {0x8, 0x22eb, 0x0, {{0x4, 0x2, 0x86, 0x1, 0x0, 0x2, 0x3, 0x4}, 0x2, {0x6, 0x80c1, 0x0, 0x19, 0x1, 0x1, 0x2, 0x1, 0x1}}}, {0x8, 0x6558, 0x3, "6861f4e8d28e3525f2d31f0198dea75400ef4c2f9209c1a21533e88c19d431e38dcdff78a89881b6aba9059b9d1f81e09cb0083f717b3296852c62452dd6b8f0bc722fdc363730e0449e4cd15950369b58c7992f"}}}}}, 0x41d) setsockopt$inet_int(r0, 0x0, 0x8, &(0x7f00000006c0)=0xfffffc01, 0x4) 17:00:05 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000040), 0x1a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) preadv(r0, &(0x7f0000000240)=[{&(0x7f0000000100)=""/19, 0x13}, {&(0x7f0000000340)=""/178, 0xb2}, {&(0x7f0000000400)=""/170, 0xaa}], 0x3, 0x0, 0x5) bind$unix(r1, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) listen(r1, 0x0) openat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x131201, 0x0) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000002580)={0x0, 0x0, {}, {}, {0x0, @struct, 0x0}}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f00000000c0)={r3, 0x0, 0x20}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000680)={0x0, 0x2, 0x7ff}) ioctl$BTRFS_IOC_BALANCE_V2(r2, 0xc4009420, &(0x7f0000000a80)={0x1, 0x0, {0x6, @struct={0x0, 0xffff}, r3, 0x1, 0x5, 0xc, 0xff, 0xfffffffffffffffb, 0xb5, @usage=0x1, 0x401, 0x1f, [0xd7c, 0x7, 0x8001, 0x400, 0x6, 0x3]}, {0x1, @usage=0xffffffff, r4, 0x1, 0xff, 0x6, 0x2, 0x100000000, 0x0, @struct={0x0, 0x400000}, 0xea, 0x9, [0x55, 0x3210, 0x3, 0x2, 0x4, 0x80000001]}, {0x40, @struct={0x8, 0x4}, 0x0, 0x4, 0x0, 0x3dec, 0x8, 0xb8, 0x8b, @usage=0x2, 0x8, 0x10000, [0x7fff, 0x3, 0x7ff, 0xc0c, 0x7cb1, 0x4]}, {0x4, 0x7, 0x2}}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000580)) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x2a, 0x0, 0xe2, 0x9e, 0x0, 0x10001, 0x22d00, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000004c0)}, 0x0, 0x8fa, 0xfff, 0x0, 0xfffffffffffffffc, 0x8, 0x2a1e, 0x0, 0x80, 0x0, 0x831}, 0x0, 0x0, r0, 0xa) connect$unix(r2, &(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e) r5 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendto$unix(r5, &(0x7f00000001c0)="71c8fcdec12c94cc2c956df44d0cfab1b74ae676aaf48ee784f18fa85887742923c7702a7c662659f337ab3d7a78b4ecf76f4f78d4ae2b6a52967d6401e9c68c6906297336eecfafa13e1a6858f797332f429ead621b12f7d737fa05091fd2150230446769df0f46629d692751480b4c5f", 0x71, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000e80), 0x40, 0x0) 17:00:05 executing program 3: statx(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x0, 0x8, 0x0) fchownat(0xffffffffffffff9c, &(0x7f00000003c0)='./file1\x00', 0x0, 0x0, 0x1000) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000400), 0x303242, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) ioctl$AUTOFS_IOC_PROTOVER(r0, 0x80049363, &(0x7f0000000040)) pipe(&(0x7f00000014c0)={0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) read(r1, &(0x7f0000000080)=""/48, 0x30) ioctl$AUTOFS_IOC_PROTOVER(r1, 0x80049363, &(0x7f00000000c0)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x1c}}, 0x0) 17:00:05 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00", 0x56, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) 17:00:05 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, 0x0, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) [ 2128.700453] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 2128.700740] EXT4-fs (loop0): unsupported inode size: 0 [ 2128.702950] EXT4-fs (loop0): blocksize: 1024 17:00:05 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x4e24, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}, 0x0, 0x0, 0x4b, 0x0, "a1434d16d913534f654ed1777e0a7fa37760b9e3107318c497350ee047a9f8490f847220e51cb7466d3400322e1767bc90d79831007ef1d09975e05300cb5d5e673b91f6279a08cc5b4cd61c9a449cc7"}, 0xd8) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000002ec0), 0x4) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x16}, 0xff}, 0xfffffffffffffd8a) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000340)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x0, 0x0, "15bb6949bc674ed64133723aa6453b9d292123bebbcd37c5097fd53da62c01e266166394afb8d0aca105da30931d140a11973acb9dcc0d8da3a4f6f42444a1948f422c8d8d2d8bba069588783e32b713"}, 0xd8) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r0, 0x8983, &(0x7f0000000100)) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x23, &(0x7f0000000480), &(0x7f00000004c0)=0x4) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffdffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(r0, &(0x7f0000001e00)=""/4096, 0x1000, 0xcd08, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000440)={'sit0\x00', &(0x7f0000000580)={'syztnl2\x00', 0x0, 0x4, 0x5, 0x9, 0x0, 0x3b, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @local, 0x88d04b715b832e11, 0x7800, 0x3, 0x4}}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000300)={'ip6gre0\x00', &(0x7f0000000600)={'syztnl0\x00', r2, 0x2f, 0x6, 0x8, 0x80000000, 0x3, @private0, @mcast2, 0x40, 0x7, 0x8, 0x8}}) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e21, 0x4503, @private0, 0x9}, 0x1c) syz_io_uring_setup(0x7399, 0x0, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x4000001) [ 2128.720003] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 2128.735992] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2128.843241] nfs4: Unknown parameter 'ext4' 17:00:06 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r0, 0x0, 0x0, 0x1000002) write$binfmt_aout(r0, &(0x7f0000000280)={{0x0, 0xd6, 0x2, 0x180, 0x0, 0x0, 0x3}, "", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x520) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4317, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'bridge_slave_1\x00'}) sendfile(r2, r1, 0x0, 0x500000001) 17:00:06 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000040), 0x1a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) preadv(r0, &(0x7f0000000240)=[{&(0x7f0000000100)=""/19, 0x13}, {&(0x7f0000000340)=""/178, 0xb2}, {&(0x7f0000000400)=""/170, 0xaa}], 0x3, 0x0, 0x5) bind$unix(r1, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) listen(r1, 0x0) openat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x131201, 0x0) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000002580)={0x0, 0x0, {}, {}, {0x0, @struct, 0x0}}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f00000000c0)={r3, 0x0, 0x20}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000680)={0x0, 0x2, 0x7ff}) ioctl$BTRFS_IOC_BALANCE_V2(r2, 0xc4009420, &(0x7f0000000a80)={0x1, 0x0, {0x6, @struct={0x0, 0xffff}, r3, 0x1, 0x5, 0xc, 0xff, 0xfffffffffffffffb, 0xb5, @usage=0x1, 0x401, 0x1f, [0xd7c, 0x7, 0x8001, 0x400, 0x6, 0x3]}, {0x1, @usage=0xffffffff, r4, 0x1, 0xff, 0x6, 0x2, 0x100000000, 0x0, @struct={0x0, 0x400000}, 0xea, 0x9, [0x55, 0x3210, 0x3, 0x2, 0x4, 0x80000001]}, {0x40, @struct={0x8, 0x4}, 0x0, 0x4, 0x0, 0x3dec, 0x8, 0xb8, 0x8b, @usage=0x2, 0x8, 0x10000, [0x7fff, 0x3, 0x7ff, 0xc0c, 0x7cb1, 0x4]}, {0x4, 0x7, 0x2}}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000580)) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x2a, 0x0, 0xe2, 0x9e, 0x0, 0x10001, 0x22d00, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000004c0)}, 0x0, 0x8fa, 0xfff, 0x0, 0xfffffffffffffffc, 0x8, 0x2a1e, 0x0, 0x80, 0x0, 0x831}, 0x0, 0x0, r0, 0xa) connect$unix(r2, &(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e) r5 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendto$unix(r5, &(0x7f00000001c0)="71c8fcdec12c94cc2c956df44d0cfab1b74ae676aaf48ee784f18fa85887742923c7702a7c662659f337ab3d7a78b4ecf76f4f78d4ae2b6a52967d6401e9c68c6906297336eecfafa13e1a6858f797332f429ead621b12f7d737fa05091fd2150230446769df0f46629d692751480b4c5f", 0x71, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000e80), 0x40, 0x0) [ 2128.894035] nfs4: Unknown parameter 'ext4' [ 2128.932158] EXT4-fs (loop5): mounted filesystem without journal. Opts: delalloc,,errors=continue 17:00:06 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00", 0x56, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) 17:00:06 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) creat(0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x10000000) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) flistxattr(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) sendmsg$nl_generic(r0, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, 0x32, 0x10, 0x70bd2d, 0x25dfdbfe, {}, [@typed={0xc, 0x62, 0x0, 0x0, @u64=0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x400c0}, 0x2000c084) 17:00:06 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, 0x0, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) [ 2129.177407] EXT4-fs (loop0): unsupported inode size: 0 [ 2129.178609] EXT4-fs (loop0): blocksize: 1024 17:00:06 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) sendmsg$nl_generic(r0, 0x0, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) 17:00:06 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000040), 0x1a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) preadv(r0, &(0x7f0000000240)=[{&(0x7f0000000100)=""/19, 0x13}, {&(0x7f0000000340)=""/178, 0xb2}, {&(0x7f0000000400)=""/170, 0xaa}], 0x3, 0x0, 0x5) bind$unix(r1, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) listen(r1, 0x0) openat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x131201, 0x0) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000002580)={0x0, 0x0, {}, {}, {0x0, @struct, 0x0}}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f00000000c0)={r3, 0x0, 0x20}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000680)={0x0, 0x2, 0x7ff}) ioctl$BTRFS_IOC_BALANCE_V2(r2, 0xc4009420, &(0x7f0000000a80)={0x1, 0x0, {0x6, @struct={0x0, 0xffff}, r3, 0x1, 0x5, 0xc, 0xff, 0xfffffffffffffffb, 0xb5, @usage=0x1, 0x401, 0x1f, [0xd7c, 0x7, 0x8001, 0x400, 0x6, 0x3]}, {0x1, @usage=0xffffffff, r4, 0x1, 0xff, 0x6, 0x2, 0x100000000, 0x0, @struct={0x0, 0x400000}, 0xea, 0x9, [0x55, 0x3210, 0x3, 0x2, 0x4, 0x80000001]}, {0x40, @struct={0x8, 0x4}, 0x0, 0x4, 0x0, 0x3dec, 0x8, 0xb8, 0x8b, @usage=0x2, 0x8, 0x10000, [0x7fff, 0x3, 0x7ff, 0xc0c, 0x7cb1, 0x4]}, {0x4, 0x7, 0x2}}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000580)) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x2a, 0x0, 0xe2, 0x9e, 0x0, 0x10001, 0x22d00, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000004c0)}, 0x0, 0x8fa, 0xfff, 0x0, 0xfffffffffffffffc, 0x8, 0x2a1e, 0x0, 0x80, 0x0, 0x831}, 0x0, 0x0, r0, 0xa) connect$unix(r2, &(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e) r5 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendto$unix(r5, &(0x7f00000001c0)="71c8fcdec12c94cc2c956df44d0cfab1b74ae676aaf48ee784f18fa85887742923c7702a7c662659f337ab3d7a78b4ecf76f4f78d4ae2b6a52967d6401e9c68c6906297336eecfafa13e1a6858f797332f429ead621b12f7d737fa05091fd2150230446769df0f46629d692751480b4c5f", 0x71, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000e80), 0x40, 0x0) [ 2129.268468] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 2129.295878] nfs4: Unknown parameter 'ext4' [ 2129.336225] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 2129.394081] EXT4-fs (loop5): mounted filesystem without journal. Opts: delalloc,,errors=continue [ 2129.506749] nfs4: Unknown parameter 'ext4' 17:00:06 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00", 0x56, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) 17:00:06 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) creat(0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x10000000) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) flistxattr(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) sendmsg$nl_generic(r0, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, 0x32, 0x10, 0x70bd2d, 0x25dfdbfe, {}, [@typed={0xc, 0x62, 0x0, 0x0, @u64=0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x400c0}, 0x2000c084) [ 2129.584476] EXT4-fs (loop0): unsupported inode size: 0 [ 2129.585647] EXT4-fs (loop0): blocksize: 1024 17:00:06 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) sendmsg$nl_generic(r0, 0x0, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) 17:00:06 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000040), 0x1a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) preadv(r0, &(0x7f0000000240)=[{&(0x7f0000000100)=""/19, 0x13}, {&(0x7f0000000340)=""/178, 0xb2}, {&(0x7f0000000400)=""/170, 0xaa}], 0x3, 0x0, 0x5) bind$unix(r1, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) listen(r1, 0x0) r2 = perf_event_open(&(0x7f0000000600)={0x2, 0xffffffffffffff12, 0x4, 0x3f, 0x1, 0x8, 0x0, 0xfffffffffffffff8, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x3}, 0x110, 0x1ff, 0x2, 0x6, 0x8, 0x2, 0x3, 0x0, 0x2}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) r3 = socket$unix(0x1, 0x5, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000002580)={0x0, 0x0, {}, {}, {0x0, @struct, 0x0}}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f00000000c0)={r4, 0x0, 0x20}) ioctl$BTRFS_IOC_SCRUB(r2, 0xc400941b, &(0x7f0000000680)={0x0, 0x2, 0x7ff}) ioctl$BTRFS_IOC_BALANCE_V2(r3, 0xc4009420, &(0x7f0000000a80)={0x1, 0x0, {0x6, @struct={0x0, 0xffff}, r4, 0x1, 0x5, 0xc, 0xff, 0xfffffffffffffffb, 0xb5, @usage=0x1, 0x401, 0x1f, [0xd7c, 0x7, 0x8001, 0x400, 0x6, 0x3]}, {0x1, @usage=0xffffffff, r5, 0x1, 0xff, 0x6, 0x2, 0x100000000, 0x0, @struct={0x0, 0x400000}, 0xea, 0x9, [0x55, 0x3210, 0x3, 0x2, 0x4, 0x80000001]}, {0x40, @struct={0x8, 0x4}, 0x0, 0x4, 0x0, 0x3dec, 0x8, 0xb8, 0x8b, @usage=0x2, 0x8, 0x10000, [0x7fff, 0x3, 0x7ff, 0xc0c, 0x7cb1, 0x4]}, {0x4, 0x7, 0x2}}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000580)) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x2a, 0x0, 0xe2, 0x9e, 0x0, 0x10001, 0x22d00, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000004c0)}, 0x0, 0x8fa, 0xfff, 0x0, 0xfffffffffffffffc, 0x8, 0x2a1e, 0x0, 0x80, 0x0, 0x831}, 0x0, 0x0, r0, 0xa) connect$unix(r3, &(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e) r6 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendto$unix(r6, &(0x7f00000001c0)="71c8fcdec12c94cc2c956df44d0cfab1b74ae676aaf48ee784f18fa85887742923c7702a7c662659f337ab3d7a78b4ecf76f4f78d4ae2b6a52967d6401e9c68c6906297336eecfafa13e1a6858f797332f429ead621b12f7d737fa05091fd2150230446769df0f46629d692751480b4c5f", 0x71, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000e80), 0x40, 0x0) 17:00:06 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, 0x0, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) 17:00:06 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000000200", 0x5b, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000001140)=ANY=[]) utime(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)={0x3, 0x8}) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000180), 0xd0000, 0x0) openat(r0, &(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r1, 0x1000004) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$incfs(r1, &(0x7f0000000080)='.pending_reads\x00', 0x8a303, 0x2) creat(&(0x7f0000000040)='./file0\x00', 0x0) 17:00:06 executing program 1: syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x2c, 0x1, &(0x7f00000001c0)=[{0x0}], 0x100018, &(0x7f0000000200)=ANY=[@ANYBLOB="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"]) bind(0xffffffffffffffff, &(0x7f0000000140)=@ieee802154={0x24, @short={0x2, 0x3, 0xaaa3}}, 0x80) pipe(&(0x7f00000014c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000000)="e7", 0x1) utimensat(r0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={{}, {0x77359400}}, 0x100) [ 2129.673068] nfs4: Unknown parameter 'ext4' [ 2129.716420] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 2129.744502] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 2129.764771] EXT4-fs (loop5): mounted filesystem without journal. Opts: delalloc,,errors=continue [ 2129.781829] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 2129.814476] nfs4: Unknown parameter 'ext4' 17:00:22 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000040), 0x1a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) preadv(r0, &(0x7f0000000240)=[{&(0x7f0000000100)=""/19, 0x13}, {&(0x7f0000000340)=""/178, 0xb2}, {&(0x7f0000000400)=""/170, 0xaa}], 0x3, 0x0, 0x5) bind$unix(r1, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) listen(r1, 0x0) r2 = perf_event_open(&(0x7f0000000600)={0x2, 0xffffffffffffff12, 0x4, 0x3f, 0x1, 0x8, 0x0, 0xfffffffffffffff8, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x3}, 0x110, 0x1ff, 0x2, 0x6, 0x8, 0x2, 0x3, 0x0, 0x2}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) r3 = socket$unix(0x1, 0x5, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000002580)={0x0, 0x0, {}, {}, {0x0, @struct, 0x0}}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f00000000c0)={r4, 0x0, 0x20}) ioctl$BTRFS_IOC_SCRUB(r2, 0xc400941b, &(0x7f0000000680)={0x0, 0x2, 0x7ff}) ioctl$BTRFS_IOC_BALANCE_V2(r3, 0xc4009420, &(0x7f0000000a80)={0x1, 0x0, {0x6, @struct={0x0, 0xffff}, r4, 0x1, 0x5, 0xc, 0xff, 0xfffffffffffffffb, 0xb5, @usage=0x1, 0x401, 0x1f, [0xd7c, 0x7, 0x8001, 0x400, 0x6, 0x3]}, {0x1, @usage=0xffffffff, r5, 0x1, 0xff, 0x6, 0x2, 0x100000000, 0x0, @struct={0x0, 0x400000}, 0xea, 0x9, [0x55, 0x3210, 0x3, 0x2, 0x4, 0x80000001]}, {0x40, @struct={0x8, 0x4}, 0x0, 0x4, 0x0, 0x3dec, 0x8, 0xb8, 0x8b, @usage=0x2, 0x8, 0x10000, [0x7fff, 0x3, 0x7ff, 0xc0c, 0x7cb1, 0x4]}, {0x4, 0x7, 0x2}}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000580)) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x2a, 0x0, 0xe2, 0x9e, 0x0, 0x10001, 0x22d00, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000004c0)}, 0x0, 0x8fa, 0xfff, 0x0, 0xfffffffffffffffc, 0x8, 0x2a1e, 0x0, 0x80, 0x0, 0x831}, 0x0, 0x0, r0, 0xa) connect$unix(r3, &(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e) r6 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendto$unix(r6, &(0x7f00000001c0)="71c8fcdec12c94cc2c956df44d0cfab1b74ae676aaf48ee784f18fa85887742923c7702a7c662659f337ab3d7a78b4ecf76f4f78d4ae2b6a52967d6401e9c68c6906297336eecfafa13e1a6858f797332f429ead621b12f7d737fa05091fd2150230446769df0f46629d692751480b4c5f", 0x71, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000e80), 0x40, 0x0) 17:00:22 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='status\x00') r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) r3 = dup2(r1, r0) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x84000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000280)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="00012cbd3000ffdbdf25030000000c0004009a0f0000000000000c0005008700000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x8800}, 0x0) sendfile(r2, r3, 0x0, 0xd1) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x10, r5, 0x10000000) r6 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000006c0), 0xffffffffffffffff) sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000005c0)=ANY=[@ANYBLOB="14000000", @ANYRES16=r6, @ANYBLOB="0906000000000000000030000000bb599bf3684c1bb40300b042883b763414aa62c00eb424d5f7f25801c70e6ccf5e74491b17ed91b61ad9c59667c1f7d6ec16f187dcf53826bc91656e662bc1d176fccebba69f0db1958cc1158dbe64c4733ee87a36cf56554153895833ad09c6b686289fc5d77f5cf856397c21826fbbe6d9e7ba2b246d2089093ddf740bed"], 0x14}}, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000580), 0xffffffffffffffff) readv(r1, &(0x7f0000001540)=[{&(0x7f0000000140)=""/44, 0x2c}], 0x1) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r5, 0xc018937a, &(0x7f00000004c0)=ANY=[@ANYBLOB="4091565cdbfa4872d229785b1541c0c70a2da295931fc20a1542ffd55db5ea0000", @ANYRES32=r0, @ANYBLOB="1d52000004d3735500c761460f66"]) r7 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000002c0)) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)='\x00', 0x1}], 0x1, 0x2, 0x100) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, r7, 0x2}) getpid() 17:00:22 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, 0x0, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) 17:00:22 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) sendmsg$nl_generic(r0, 0x0, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, 0x0, 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) 17:00:22 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) creat(0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x10000000) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) flistxattr(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) creat(&(0x7f0000000240)='./file0\x00', 0x8c) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, 0x32, 0x10, 0x70bd2d, 0x25dfdbfe, {}, [@typed={0xc, 0x62, 0x0, 0x0, @u64=0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x400c0}, 0x2000c084) 17:00:22 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000", 0x5c, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) 17:00:22 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000000200", 0x5b, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x3030007, &(0x7f0000001140)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') [ 2145.370067] EXT4-fs (loop6): VFS: Can't find ext4 filesystem r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000004) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x5, 0x9, 0x1) pipe(&(0x7f00000014c0)={0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) pipe(&(0x7f00000014c0)={0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) read(r2, &(0x7f0000000080)=""/48, 0x30) sendfile(r1, r2, &(0x7f00000000c0)=0x1546, 0x7fff) read(r1, &(0x7f0000000080)=""/48, 0x30) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000080)={0x0, 0x1, 0x80000001, 0x1ff}) creat(&(0x7f0000000040)='./file0\x00', 0x0) [ 2145.419593] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 2145.423826] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue 17:00:22 executing program 2: ioctl$TCSETSF2(0xffffffffffffffff, 0x402c542d, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x0, 0x5, '`\x00\x00\x00\x00\x00\x00@\x00'}) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) flock(r1, 0x2) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0xfffffffc, 0x20, 0x1}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$packet(0xffffffffffffffff, 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x7fff) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000440)=@IORING_OP_FSYNC={0x3, 0x0, 0x0, @fd_index, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000080)={0x0, @loopback}, &(0x7f00000000c0)=0xc) connect(0xffffffffffffffff, &(0x7f0000000280)=@can, 0x80) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000300)={'syztnl0\x00', &(0x7f0000000280)={'syztnl1\x00', r2, 0x29, 0x1d, 0xff, 0x3ff, 0x9, @loopback, @private0={0xfc, 0x0, '\x00', 0x1}, 0x80, 0x7, 0xffff, 0x3}}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) connect(0xffffffffffffffff, &(0x7f0000000280)=@can={0x1d, r4}, 0x80) sendmsg$ETHTOOL_MSG_EEE_GET(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="cc000000", @ANYRES16=0x0, @ANYBLOB="040029bd7000ffdbdf25170000005c00018008000100", @ANYRES64=r2, @ANYBLOB="0800030001000000080003000100000008000100", @ANYRES32=r2, @ANYBLOB="988057046cb4efb2a3765c97a8331cda4121541bf8e3e6bfe9c35643e931e8b4d4fc71ec2d8f5e2188c7f24608c7a4aefb0a1087f4654f13fb65ad5aff86ee75bf5f574a0d3c061a4a99048b3d4870808df2bb06549d5523d7", @ANYRES32=0x0, @ANYBLOB="14000200626f6e645f736c6176655f300000000014000201766261740b7ed791541900c5d149c5635dc80810eed3e2eca70c0803df06b4f4c12c2255327ba0f4efa8d0bfc701c8d5c7e1b70f4a6061ca12fdc990b7ec6500"/103, @ANYRES32=0x0, @ANYBLOB="58000180080003000000000008000100", @ANYRES32=r2, @ANYBLOB="080003000100000008000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r3, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="afba2f6cc1896261746164765fbd736c"], 0xcc}, 0x1, 0x0, 0x0, 0x24000000}, 0x4000) r5 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x4, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) dup3(r5, r0, 0x0) [ 2145.544993] nfs4: Unknown parameter 'ext4' 17:00:22 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000", 0x5c, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) 17:00:22 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000040), 0x1a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) preadv(r0, &(0x7f0000000240)=[{&(0x7f0000000100)=""/19, 0x13}, {&(0x7f0000000340)=""/178, 0xb2}, {&(0x7f0000000400)=""/170, 0xaa}], 0x3, 0x0, 0x5) bind$unix(r1, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) listen(r1, 0x0) r2 = perf_event_open(&(0x7f0000000600)={0x2, 0xffffffffffffff12, 0x4, 0x3f, 0x1, 0x8, 0x0, 0xfffffffffffffff8, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x3}, 0x110, 0x1ff, 0x2, 0x6, 0x8, 0x2, 0x3, 0x0, 0x2}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) r3 = socket$unix(0x1, 0x5, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000002580)={0x0, 0x0, {}, {}, {0x0, @struct, 0x0}}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f00000000c0)={r4, 0x0, 0x20}) ioctl$BTRFS_IOC_SCRUB(r2, 0xc400941b, &(0x7f0000000680)={0x0, 0x2, 0x7ff}) ioctl$BTRFS_IOC_BALANCE_V2(r3, 0xc4009420, &(0x7f0000000a80)={0x1, 0x0, {0x6, @struct={0x0, 0xffff}, r4, 0x1, 0x5, 0xc, 0xff, 0xfffffffffffffffb, 0xb5, @usage=0x1, 0x401, 0x1f, [0xd7c, 0x7, 0x8001, 0x400, 0x6, 0x3]}, {0x1, @usage=0xffffffff, r5, 0x1, 0xff, 0x6, 0x2, 0x100000000, 0x0, @struct={0x0, 0x400000}, 0xea, 0x9, [0x55, 0x3210, 0x3, 0x2, 0x4, 0x80000001]}, {0x40, @struct={0x8, 0x4}, 0x0, 0x4, 0x0, 0x3dec, 0x8, 0xb8, 0x8b, @usage=0x2, 0x8, 0x10000, [0x7fff, 0x3, 0x7ff, 0xc0c, 0x7cb1, 0x4]}, {0x4, 0x7, 0x2}}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000580)) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x2a, 0x0, 0xe2, 0x9e, 0x0, 0x10001, 0x22d00, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000004c0)}, 0x0, 0x8fa, 0xfff, 0x0, 0xfffffffffffffffc, 0x8, 0x2a1e, 0x0, 0x80, 0x0, 0x831}, 0x0, 0x0, r0, 0xa) connect$unix(r3, &(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e) r6 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendto$unix(r6, &(0x7f00000001c0)="71c8fcdec12c94cc2c956df44d0cfab1b74ae676aaf48ee784f18fa85887742923c7702a7c662659f337ab3d7a78b4ecf76f4f78d4ae2b6a52967d6401e9c68c6906297336eecfafa13e1a6858f797332f429ead621b12f7d737fa05091fd2150230446769df0f46629d692751480b4c5f", 0x71, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000e80), 0x40, 0x0) [ 2145.614902] EXT4-fs (loop5): mounted filesystem without journal. Opts: delalloc,,errors=continue [ 2145.703646] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue 17:00:22 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, 0x0, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7", 0x31, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) 17:00:23 executing program 2: fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=@v1={0x2, "e6d1cc811e1e58a930371bf8be4e010358"}, 0x12, 0x1) [ 2145.828217] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 2145.912162] nfs4: Unknown parameter 'ext4' 17:00:38 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/sockstat\x00') r1 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_SET_FEATURE(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20}, 0x20}}, 0x4000040) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = dup2(0xffffffffffffffff, r2) ioctl$sock_SIOCADDDLCI(r3, 0x8980, 0x0) r4 = syz_open_dev$usbmon(&(0x7f0000000040), 0x0, 0x0) mmap$usbmon(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x18812, r4, 0x0) ioctl$MON_IOCT_RING_SIZE(r4, 0x9204, 0x119b28) r5 = syz_open_dev$usbmon(&(0x7f0000000040), 0x0, 0x0) mmap$usbmon(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x18812, r5, 0x0) ioctl$MON_IOCT_RING_SIZE(r5, 0x9204, 0x119b28) socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_SET_FEATURE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x20, 0x3fa, 0x0, 0x70bd2b, 0x2000000, {0x1, 0x1}}, 0x20}}, 0x4000040) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/pid\x00') openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) epoll_create1(0x0) syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) r6 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) fcntl$dupfd(r6, 0x0, r6) 17:00:38 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x4048, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r1, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r2 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0x3}}, './file0/../file0\x00'}) mkdirat(r3, &(0x7f0000000180)='./file0/file0/../file0\x00', 0x40) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) unshare(0x48020200) 17:00:38 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, 0x0, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7", 0x31, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) 17:00:38 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000", 0x5c, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) 17:00:38 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) sendmsg$nl_generic(r0, 0x0, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, 0x0, 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) 17:00:38 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) creat(0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x10000000) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) flistxattr(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) creat(&(0x7f0000000240)='./file0\x00', 0x8c) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, 0x32, 0x10, 0x70bd2d, 0x25dfdbfe, {}, [@typed={0xc, 0x62, 0x0, 0x0, @u64=0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x400c0}, 0x2000c084) 17:00:38 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000040), 0x1a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) preadv(r0, &(0x7f0000000240)=[{&(0x7f0000000100)=""/19, 0x13}, {&(0x7f0000000340)=""/178, 0xb2}, {&(0x7f0000000400)=""/170, 0xaa}], 0x3, 0x0, 0x5) bind$unix(r1, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) openat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x131201, 0x0) r2 = perf_event_open(&(0x7f0000000600)={0x2, 0xffffffffffffff12, 0x4, 0x3f, 0x1, 0x8, 0x0, 0xfffffffffffffff8, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x3}, 0x110, 0x1ff, 0x2, 0x6, 0x8, 0x2, 0x3, 0x0, 0x2}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) r3 = socket$unix(0x1, 0x5, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000002580)={0x0, 0x0, {}, {}, {0x0, @struct, 0x0}}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f00000000c0)={r4, 0x0, 0x20}) ioctl$BTRFS_IOC_SCRUB(r2, 0xc400941b, &(0x7f0000000680)={0x0, 0x2, 0x7ff}) ioctl$BTRFS_IOC_BALANCE_V2(r3, 0xc4009420, &(0x7f0000000a80)={0x1, 0x0, {0x6, @struct={0x0, 0xffff}, r4, 0x1, 0x5, 0xc, 0xff, 0xfffffffffffffffb, 0xb5, @usage=0x1, 0x401, 0x1f, [0xd7c, 0x7, 0x8001, 0x400, 0x6, 0x3]}, {0x1, @usage=0xffffffff, r5, 0x1, 0xff, 0x6, 0x2, 0x100000000, 0x0, @struct={0x0, 0x400000}, 0xea, 0x9, [0x55, 0x3210, 0x3, 0x2, 0x4, 0x80000001]}, {0x40, @struct={0x8, 0x4}, 0x0, 0x4, 0x0, 0x3dec, 0x8, 0xb8, 0x8b, @usage=0x2, 0x8, 0x10000, [0x7fff, 0x3, 0x7ff, 0xc0c, 0x7cb1, 0x4]}, {0x4, 0x7, 0x2}}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000580)) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x2a, 0x0, 0xe2, 0x9e, 0x0, 0x10001, 0x22d00, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000004c0)}, 0x0, 0x8fa, 0xfff, 0x0, 0xfffffffffffffffc, 0x8, 0x2a1e, 0x0, 0x80, 0x0, 0x831}, 0x0, 0x0, r0, 0xa) connect$unix(r3, &(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e) r6 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendto$unix(r6, &(0x7f00000001c0)="71c8fcdec12c94cc2c956df44d0cfab1b74ae676aaf48ee784f18fa85887742923c7702a7c662659f337ab3d7a78b4ecf76f4f78d4ae2b6a52967d6401e9c68c6906297336eecfafa13e1a6858f797332f429ead621b12f7d737fa05091fd2150230446769df0f46629d692751480b4c5f", 0x71, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000e80), 0x40, 0x0) 17:00:38 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r2}, &(0x7f0000000040)) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)=[{{&(0x7f0000000180), 0x6e, &(0x7f00000002c0)=[{&(0x7f0000000200)=""/2, 0x2}, {&(0x7f0000000240)=""/100, 0x64}], 0x2, &(0x7f0000000300)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x180}}, {{&(0x7f0000000480), 0x6e, &(0x7f00000007c0)=[{&(0x7f0000000500)=""/131, 0x83}, {&(0x7f00000005c0)=""/229, 0xe5}, {&(0x7f00000006c0)=""/201, 0xc9}], 0x3, &(0x7f0000000800)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xb0}}, {{&(0x7f00000008c0)=@abs, 0x6e, &(0x7f00000009c0)=[{&(0x7f0000000940)=""/101, 0x65}], 0x1}}], 0x3, 0x3, &(0x7f0000000ac0)) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x6, 0xff, 0xc0, 0x80, 0x0, 0x8, 0x8182, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x612, 0x0, @perf_bp={&(0x7f0000000040)}, 0x2, 0x9, 0x9, 0x9, 0x54, 0x9, 0x9, 0x0, 0x4}, r2, 0x5, r3, 0x8) close(r1) r4 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_SIOCSPGRP(r4, 0x8902, &(0x7f0000000000)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$F2FS_IOC_WRITE_CHECKPOINT(r0, 0xf507, 0x0) [ 2161.294022] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 2161.302459] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 2161.317017] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 2161.396198] EXT4-fs (loop5): mounted filesystem without journal. Opts: delalloc,,errors=continue [ 2161.410274] nfs4: Unknown parameter 'ext4' 17:00:38 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_BALANCE_CTL(r1, 0x40049421, 0x2) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000011c0)={0x28, 0x10, 0x1, 0x0, 0x0, {0xd}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0x11, 0x0, 0x0, @ipv4=@dev}]}]}, 0x28}}, 0x0) signalfd4(r0, &(0x7f0000000000)={[0xa25]}, 0x8, 0x800) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000180)={@in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x0, 0x0, 0x21, 0x0, "abbb8dd184919937f26eb6a220d248dd71fc882d577802748ae62fb2326825f3336394c6d4452ab8aca415430645fefb64cc9eedbb4372dcbb507b551f9bc1d4e299f90a904fd1ec164dde0ef21c5c03"}, 0xd8) [ 2161.456239] netlink: 'syz-executor.2': attribute type 17 has an invalid length. [ 2161.471052] netlink: 'syz-executor.2': attribute type 17 has an invalid length. 17:00:38 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000040), 0x1a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) preadv(r0, &(0x7f0000000240)=[{&(0x7f0000000100)=""/19, 0x13}, {&(0x7f0000000340)=""/178, 0xb2}, {&(0x7f0000000400)=""/170, 0xaa}], 0x3, 0x0, 0x5) bind$unix(r1, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) openat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x131201, 0x0) r2 = perf_event_open(&(0x7f0000000600)={0x2, 0xffffffffffffff12, 0x4, 0x3f, 0x1, 0x8, 0x0, 0xfffffffffffffff8, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x3}, 0x110, 0x1ff, 0x2, 0x6, 0x8, 0x2, 0x3, 0x0, 0x2}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) r3 = socket$unix(0x1, 0x5, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000002580)={0x0, 0x0, {}, {}, {0x0, @struct, 0x0}}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f00000000c0)={r4, 0x0, 0x20}) ioctl$BTRFS_IOC_SCRUB(r2, 0xc400941b, &(0x7f0000000680)={0x0, 0x2, 0x7ff}) ioctl$BTRFS_IOC_BALANCE_V2(r3, 0xc4009420, &(0x7f0000000a80)={0x1, 0x0, {0x6, @struct={0x0, 0xffff}, r4, 0x1, 0x5, 0xc, 0xff, 0xfffffffffffffffb, 0xb5, @usage=0x1, 0x401, 0x1f, [0xd7c, 0x7, 0x8001, 0x400, 0x6, 0x3]}, {0x1, @usage=0xffffffff, r5, 0x1, 0xff, 0x6, 0x2, 0x100000000, 0x0, @struct={0x0, 0x400000}, 0xea, 0x9, [0x55, 0x3210, 0x3, 0x2, 0x4, 0x80000001]}, {0x40, @struct={0x8, 0x4}, 0x0, 0x4, 0x0, 0x3dec, 0x8, 0xb8, 0x8b, @usage=0x2, 0x8, 0x10000, [0x7fff, 0x3, 0x7ff, 0xc0c, 0x7cb1, 0x4]}, {0x4, 0x7, 0x2}}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000580)) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x2a, 0x0, 0xe2, 0x9e, 0x0, 0x10001, 0x22d00, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000004c0)}, 0x0, 0x8fa, 0xfff, 0x0, 0xfffffffffffffffc, 0x8, 0x2a1e, 0x0, 0x80, 0x0, 0x831}, 0x0, 0x0, r0, 0xa) connect$unix(r3, &(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e) r6 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendto$unix(r6, &(0x7f00000001c0)="71c8fcdec12c94cc2c956df44d0cfab1b74ae676aaf48ee784f18fa85887742923c7702a7c662659f337ab3d7a78b4ecf76f4f78d4ae2b6a52967d6401e9c68c6906297336eecfafa13e1a6858f797332f429ead621b12f7d737fa05091fd2150230446769df0f46629d692751480b4c5f", 0x71, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000e80), 0x40, 0x0) 17:00:56 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/udplite6\x00') syz_open_procfs(0x0, &(0x7f0000000000)='net/psched\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000600)=""/209, 0xd1}, {0x0}], 0x2, 0x0, 0x0) 17:00:56 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) sendmsg$nl_generic(r0, 0x0, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, 0x0, 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) 17:00:56 executing program 3: r0 = syz_io_uring_setup(0x12ef, &(0x7f0000000000)={0x0, 0xd222, 0x8, 0x0, 0x4000000}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') pread64(r1, &(0x7f0000001100)=""/4095, 0xae3, 0x6800) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x4, 0x13, r2, 0x0) syz_io_uring_submit(r3, 0x0, &(0x7f0000000300)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd, 0x3, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffc0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ff4000/0xc000)=nil, 0xc000, 0x1, 0x4000010, r0, 0x8000000) r4 = syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000002a40)) r6 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r4, 0x4, &(0x7f0000000140)=r6, 0x1) fcntl$dupfd(r6, 0x0, r2) syz_io_uring_complete(r3) syz_io_uring_setup(0x3253, &(0x7f0000000100)={0x0, 0x65ee, 0x8, 0xfffffffd, 0x1e5, 0x0, r0}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f00000001c0)=0x0) syz_io_uring_submit(r3, r7, &(0x7f0000000280)=@IORING_OP_OPENAT2={0x1c, 0x1, 0x0, r1, &(0x7f0000000200)={0x3, 0x80, 0x17}, &(0x7f0000000240)='./file0\x00', 0x18, 0x0, 0x12345}, 0x10001) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000002, 0x13, r1, 0x10000000) syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0}, &(0x7f0000ff7000/0x1000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000002a40)=0x0) syz_io_uring_submit(r8, r9, &(0x7f0000000100)=@IORING_OP_POLL_ADD={0x6, 0x1, 0x0, @fd_index=0x5, 0x0, 0x0, 0x0, {0x82}}, 0x0) r10 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(r5, r9, &(0x7f00000002c0)=@IORING_OP_MADVISE={0x19, 0x0, 0x0, 0x0, 0x0, &(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x1, {0x0, r10}}, 0x967) 17:00:56 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) creat(0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x10000000) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) flistxattr(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) creat(&(0x7f0000000240)='./file0\x00', 0x8c) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, 0x32, 0x10, 0x70bd2d, 0x25dfdbfe, {}, [@typed={0xc, 0x62, 0x0, 0x0, @u64=0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x400c0}, 0x2000c084) 17:00:56 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, 0x0, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7", 0x31, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) [ 2179.020823] audit: type=1400 audit(1697562056.259:97): avc: denied { map } for pid=13842 comm="syz-executor.3" path="/proc/13842/smaps" dev="proc" ino=42672 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=file permissive=1 [ 2179.060095] EXT4-fs (loop6): VFS: Can't find ext4 filesystem 17:00:56 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200", 0x5f, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) 17:00:56 executing program 2: r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe302}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCVHANGUP(r1, 0x5437, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) r2 = syz_open_dev$sg(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="e7", 0x1) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f0000001700)) fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TIOCSWINSZ(r3, 0x5414, 0x0) renameat2(r0, 0x0, 0xffffffffffffffff, 0x0, 0x6) syz_open_dev$sg(&(0x7f0000000080), 0x9c09, 0x121000) ioctl$TIOCSTI(r1, 0x5412, &(0x7f0000001400)=0x3b) socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r4 = syz_mount_image$iso9660(&(0x7f00000000c0), &(0x7f00000001c0)='./file0\x00', 0x2, 0x1, &(0x7f0000000280)=[{&(0x7f0000000200)="ecf5e690a6d051086bd3ef1fc8089d0e20b7d481993f3fd778561bb766dc3b223c4a060b465408a01838ed6de43c308276a8f56f67b451503c21f86b97500b799f2b6869703522c542db37c8f6ca37f3845cdcb48ac72b7100293786acb5097b7da53544bd1bd0f675b0c6218740dcd939bad6464f448e4b55e754d54f4934c8", 0x80, 0x3}], 0x0, &(0x7f00000002c0)={[{@uid={'uid', 0x3d, 0xee01}}, {@gid}, {@session={'session', 0x3d, 0x42}}, {@sbsector={'sbsector', 0x3d, 0xfffffffffffff000}}, {@session={'session', 0x3d, 0x4a}}, {@map_off}, {@map_normal}], [{@smackfstransmute={'smackfstransmute', 0x3d, '}}'}}, {@context={'context', 0x3d, 'system_u'}}, {@subj_type={'subj_type', 0x3d, '{*#'}}, {@hash}, {@seclabel}, {@dont_appraise}]}) readlinkat(r4, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)=""/4096, 0x1000) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000001440), 0x200000, 0x0) execveat(r5, &(0x7f0000001480)='./file0\x00', &(0x7f0000001540)=[&(0x7f00000014c0)='(\'.#-)*))[\x00', &(0x7f0000001500)='dont_appraise'], &(0x7f00000016c0)=[&(0x7f0000001580)='iso9660\x00', &(0x7f00000015c0)='\\{^+@\'&$\x00', &(0x7f0000001600)='/dev/ttyS3\x00', &(0x7f0000001640)='/dev/ttyS3\x00', &(0x7f0000001680)='\x00'], 0x800) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x6d36e4b9d1088200) 17:00:56 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000040), 0x1a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) preadv(r0, &(0x7f0000000240)=[{&(0x7f0000000100)=""/19, 0x13}, {&(0x7f0000000340)=""/178, 0xb2}, {&(0x7f0000000400)=""/170, 0xaa}], 0x3, 0x0, 0x5) bind$unix(r1, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) openat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x131201, 0x0) r2 = perf_event_open(&(0x7f0000000600)={0x2, 0xffffffffffffff12, 0x4, 0x3f, 0x1, 0x8, 0x0, 0xfffffffffffffff8, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x3}, 0x110, 0x1ff, 0x2, 0x6, 0x8, 0x2, 0x3, 0x0, 0x2}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) r3 = socket$unix(0x1, 0x5, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000002580)={0x0, 0x0, {}, {}, {0x0, @struct, 0x0}}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f00000000c0)={r4, 0x0, 0x20}) ioctl$BTRFS_IOC_SCRUB(r2, 0xc400941b, &(0x7f0000000680)={0x0, 0x2, 0x7ff}) ioctl$BTRFS_IOC_BALANCE_V2(r3, 0xc4009420, &(0x7f0000000a80)={0x1, 0x0, {0x6, @struct={0x0, 0xffff}, r4, 0x1, 0x5, 0xc, 0xff, 0xfffffffffffffffb, 0xb5, @usage=0x1, 0x401, 0x1f, [0xd7c, 0x7, 0x8001, 0x400, 0x6, 0x3]}, {0x1, @usage=0xffffffff, r5, 0x1, 0xff, 0x6, 0x2, 0x100000000, 0x0, @struct={0x0, 0x400000}, 0xea, 0x9, [0x55, 0x3210, 0x3, 0x2, 0x4, 0x80000001]}, {0x40, @struct={0x8, 0x4}, 0x0, 0x4, 0x0, 0x3dec, 0x8, 0xb8, 0x8b, @usage=0x2, 0x8, 0x10000, [0x7fff, 0x3, 0x7ff, 0xc0c, 0x7cb1, 0x4]}, {0x4, 0x7, 0x2}}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000580)) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x2a, 0x0, 0xe2, 0x9e, 0x0, 0x10001, 0x22d00, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000004c0)}, 0x0, 0x8fa, 0xfff, 0x0, 0xfffffffffffffffc, 0x8, 0x2a1e, 0x0, 0x80, 0x0, 0x831}, 0x0, 0x0, r0, 0xa) connect$unix(r3, &(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e) r6 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendto$unix(r6, &(0x7f00000001c0)="71c8fcdec12c94cc2c956df44d0cfab1b74ae676aaf48ee784f18fa85887742923c7702a7c662659f337ab3d7a78b4ecf76f4f78d4ae2b6a52967d6401e9c68c6906297336eecfafa13e1a6858f797332f429ead621b12f7d737fa05091fd2150230446769df0f46629d692751480b4c5f", 0x71, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000e80), 0x40, 0x0) 17:00:56 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) syz_io_uring_complete(0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000580)={0x148, 0x12, 0x101, 0x0, 0x0, {0x10}, [@nested={0x131, 0x0, 0x0, 0x1, [@generic="3c5d00868f471803707d7960a7a481643ce0ae2cb8d0203e4ef2c8831ea18a456904c5fcd7232ba9a2075bb0e5fe536464a6e19cdad27df1b05d2f00cf7526f11c43636ca3faffbc45ab20a258ac6deb8a270641c083a728aa9ccd0ce840c3bd388fb3", @generic="7395debb9ec02f71faedea95df410bd1dad1ec97926caca6cd1a5b0cf5fc4c5ba6b78747037b09ebaec1babc80e4db8fac2229de03970005c8c2d65792023c466ac141f93d1c154e025486977957a800913a0271d35e0b2d3b08a7f5cc3befc19ebd252b67823187db7e4ec19c7e02b7726fcd422a88b60d14e92d98594b1ce58bdc8dc603654fb3d0ba8d2505408e4dff15e7f91a26158869b5e6f606289f06bd374ed933dedc07449c746cf57da18fcac96cf22ecc4b808fe8e4a9ad2af6c78ca10e03fbd33f90d182"]}]}, 0x148}}, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$setstatus(r2, 0x4, 0x2000) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(r2, &(0x7f0000000200)={0xa, 0x4e21, 0x6, @mcast2, 0xdc6}, 0x1c) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) sendmsg$inet6(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="29719ea84f4503ceb5fcf5ea0549f4ae77ab00abd023edee71c45435000086c5813ebf7039", 0x25}], 0x1}, 0x10044001) r3 = fork() setsockopt$inet6_tcp_int(r2, 0x6, 0x19, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r3, 0x9, 0x0) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000040)=r3) [ 2179.082787] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 2179.086647] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 2179.120895] netlink: 296 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2179.125816] netlink: 296 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2179.194277] EXT4-fs (loop5): mounted filesystem without journal. Opts: delalloc,,errors=continue 17:00:56 executing program 3: openat$bsg(0xffffffffffffff9c, 0x0, 0x1, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000004c0)={0x28, 0x1d, 0xc21, 0x70bd29, 0x0, {0x4, 0x0, 0x2}, [@nested={0x14, 0x11, 0x0, 0x1, [@generic="809801a7b0c7dba09475f251c743092f"]}]}, 0x28}, 0x1, 0x0, 0x0, 0x4901}, 0x0) [ 2179.247222] nfs4: Unknown parameter 'ext4' 17:00:56 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) sendmsg$nl_generic(r0, 0x0, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) 17:00:56 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000040), 0x1a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) preadv(r0, &(0x7f0000000240)=[{&(0x7f0000000100)=""/19, 0x13}, {&(0x7f0000000340)=""/178, 0xb2}, {&(0x7f0000000400)=""/170, 0xaa}], 0x3, 0x0, 0x5) bind$unix(r1, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) listen(r1, 0x0) openat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x131201, 0x0) r2 = perf_event_open(&(0x7f0000000600)={0x2, 0xffffffffffffff12, 0x4, 0x3f, 0x1, 0x8, 0x0, 0xfffffffffffffff8, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x3}, 0x110, 0x1ff, 0x2, 0x6, 0x8, 0x2, 0x3, 0x0, 0x2}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) r3 = socket$unix(0x1, 0x5, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000002580)={0x0, 0x0, {}, {}, {0x0, @struct, 0x0}}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f00000000c0)={r4, 0x0, 0x20}) ioctl$BTRFS_IOC_SCRUB(r2, 0xc400941b, &(0x7f0000000680)={0x0, 0x2, 0x7ff}) ioctl$BTRFS_IOC_BALANCE_V2(r3, 0xc4009420, &(0x7f0000000a80)={0x1, 0x0, {0x6, @struct={0x0, 0xffff}, r4, 0x1, 0x5, 0xc, 0xff, 0xfffffffffffffffb, 0xb5, @usage=0x1, 0x401, 0x1f, [0xd7c, 0x7, 0x8001, 0x400, 0x6, 0x3]}, {0x1, @usage=0xffffffff, r5, 0x1, 0xff, 0x6, 0x2, 0x100000000, 0x0, @struct={0x0, 0x400000}, 0xea, 0x9, [0x55, 0x3210, 0x3, 0x2, 0x4, 0x80000001]}, {0x40, @struct={0x8, 0x4}, 0x0, 0x4, 0x0, 0x3dec, 0x8, 0xb8, 0x8b, @usage=0x2, 0x8, 0x10000, [0x7fff, 0x3, 0x7ff, 0xc0c, 0x7cb1, 0x4]}, {0x4, 0x7, 0x2}}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000580)) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x2a, 0x0, 0xe2, 0x9e, 0x0, 0x10001, 0x22d00, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000004c0)}, 0x0, 0x8fa, 0xfff, 0x0, 0xfffffffffffffffc, 0x8, 0x2a1e, 0x0, 0x80, 0x0, 0x831}, 0x0, 0x0, r0, 0xa) connect$unix(r3, &(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e) r6 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendto$unix(r6, &(0x7f00000001c0)="71c8fcdec12c94cc2c956df44d0cfab1b74ae676aaf48ee784f18fa85887742923c7702a7c662659f337ab3d7a78b4ecf76f4f78d4ae2b6a52967d6401e9c68c6906297336eecfafa13e1a6858f797332f429ead621b12f7d737fa05091fd2150230446769df0f46629d692751480b4c5f", 0x71, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000e80), 0x40, 0x0) [ 2179.289262] sysfs: cannot create duplicate filename '/class/ieee80211/€˜§°ÇÛ ”uòQÇC !' [ 2179.291193] CPU: 1 PID: 13876 Comm: syz-executor.3 Not tainted 5.10.198 #1 [ 2179.292644] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2179.294337] Call Trace: [ 2179.294908] dump_stack+0x107/0x167 [ 2179.295667] sysfs_warn_dup.cold+0x1c/0x29 [ 2179.296542] sysfs_do_create_link_sd+0x122/0x140 [ 2179.297531] sysfs_create_link+0x5f/0xc0 [ 2179.298376] device_add+0x703/0x1bc0 [ 2179.299150] ? devlink_add_symlinks+0x970/0x970 [ 2179.300113] ? ieee80211_set_bitrate_flags+0x202/0x620 [ 2179.301193] wiphy_register+0x1da6/0x2850 [ 2179.302050] ? wiphy_unregister+0xb90/0xb90 [ 2179.302954] ? ieee80211_init_rate_ctrl_alg+0x121/0x500 [ 2179.304078] ieee80211_register_hw+0x23c5/0x38b0 [ 2179.305074] ? ieee80211_ifa6_changed+0x4d0/0x4d0 [ 2179.306049] ? net_generic+0xdb/0x2b0 [ 2179.306836] ? lockdep_init_map_type+0x2c7/0x780 [ 2179.307829] ? memset+0x20/0x50 [ 2179.308522] ? __hrtimer_init+0x12c/0x270 [ 2179.309376] mac80211_hwsim_new_radio+0x1ce0/0x4250 [ 2179.310419] ? hwsim_send_nullfunc_ps+0x80/0x80 [ 2179.311366] ? hwsim_new_radio_nl+0x967/0x1080 [ 2179.312315] ? memcpy+0x39/0x60 [ 2179.312997] hwsim_new_radio_nl+0x991/0x1080 [ 2179.313915] ? mac80211_hwsim_new_radio+0x4250/0x4250 [ 2179.314981] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x1bb/0x280 [ 2179.316336] ? genl_family_rcv_msg_attrs_parse.constprop.0+0xaf/0x280 [ 2179.317692] genl_family_rcv_msg_doit+0x22d/0x330 [ 2179.318679] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x280/0x280 [ 2179.320040] ? cap_capable+0x1d6/0x240 [ 2179.320877] ? ns_capable+0xe2/0x110 [ 2179.321662] genl_rcv_msg+0x33c/0x5a0 [ 2179.322448] ? genl_get_cmd+0x480/0x480 [ 2179.323269] ? mac80211_hwsim_new_radio+0x4250/0x4250 [ 2179.324368] ? lock_release+0x680/0x680 [ 2179.325186] ? __lockdep_reset_lock+0x180/0x180 [ 2179.326122] netlink_rcv_skb+0x14b/0x430 [ 2179.326960] ? genl_get_cmd+0x480/0x480 [ 2179.327792] ? netlink_ack+0xab0/0xab0 [ 2179.328619] ? netlink_deliver_tap+0x1c4/0xcd0 [ 2179.329558] ? is_vmalloc_addr+0x7b/0xb0 [ 2179.330391] genl_rcv+0x24/0x40 [ 2179.331057] netlink_unicast+0x549/0x7f0 [ 2179.331888] ? netlink_attachskb+0x870/0x870 [ 2179.332775] ? __virt_addr_valid+0x128/0x350 [ 2179.333668] netlink_sendmsg+0x90f/0xdf0 [ 2179.334498] ? netlink_unicast+0x7f0/0x7f0 [ 2179.335362] ? netlink_unicast+0x7f0/0x7f0 [ 2179.336239] __sock_sendmsg+0x154/0x190 [ 2179.337058] ____sys_sendmsg+0x70d/0x870 [ 2179.337885] ? sock_write_iter+0x3d0/0x3d0 [ 2179.338748] ? do_recvmmsg+0x6d0/0x6d0 [ 2179.339542] ? perf_trace_lock+0xac/0x490 [ 2179.340414] ? __lockdep_reset_lock+0x180/0x180 [ 2179.341374] ___sys_sendmsg+0xf3/0x170 [ 2179.342171] ? sendmsg_copy_msghdr+0x160/0x160 [ 2179.343072] ? lock_downgrade+0x6d0/0x6d0 [ 2179.343912] ? find_held_lock+0x2c/0x110 [ 2179.344720] ? clockevents_program_event+0x14b/0x360 [ 2179.345753] ? __fget_files+0x296/0x4c0 [ 2179.346556] ? __fget_light+0xea/0x290 [ 2179.347353] __sys_sendmsg+0xe5/0x1b0 [ 2179.348139] ? __sys_sendmsg_sock+0x40/0x40 [ 2179.349009] ? trace_hardirqs_on+0x5b/0x180 [ 2179.349915] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2179.350965] ? syscall_enter_from_user_mode+0x27/0x50 [ 2179.352036] do_syscall_64+0x33/0x40 [ 2179.352805] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2179.353859] RIP: 0033:0x7f106a1c5b19 [ 2179.354604] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2179.358332] RSP: 002b:00007f106773b188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2179.359857] RAX: ffffffffffffffda RBX: 00007f106a2d8f60 RCX: 00007f106a1c5b19 [ 2179.361325] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 2179.362762] RBP: 00007f106a21ff6d R08: 0000000000000000 R09: 0000000000000000 [ 2179.364229] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2179.365631] R13: 00007fff39a6f12f R14: 00007f106773b300 R15: 0000000000022000 17:00:56 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200", 0x5f, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) 17:00:56 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) creat(0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x10000000) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) flistxattr(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) r0 = creat(&(0x7f0000000240)='./file0\x00', 0x8c) sendmsg$nl_generic(r0, 0x0, 0x2000c084) [ 2179.456540] netlink: 296 bytes leftover after parsing attributes in process `syz-executor.1'. 17:00:56 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, 0x0, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000", 0x4a, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) [ 2179.467282] netlink: 296 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2179.543146] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 17:00:56 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) sendmsg$nl_generic(r0, 0x0, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, 0x0, 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) [ 2179.559497] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 2179.567062] EXT4-fs error (device loop6): ext4_fill_super:4962: inode #2: comm syz-executor.6: iget: special inode unallocated [ 2179.572054] EXT4-fs (loop6): get root inode failed [ 2179.572870] EXT4-fs (loop6): mount failed [ 2179.689976] nfs4: Unknown parameter 'ext4' [ 2179.699960] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 2179.730861] EXT4-fs (loop5): mounted filesystem without journal. Opts: delalloc,,errors=continue 17:01:13 executing program 3: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0xfffffffffffffff8, 0x1, &(0x7f0000000500)=[{&(0x7f0000000680)="04b2ac1ea05d5c994faf92ff5e4e2d3d5b4c0523e62b989cb19b7c1a22dff64bcf9805851c41da15f743f8604b11c449730955f2ab8db098087f1b5a028ea7714963dfe9a7baaa63d52bac5414db34cdc3b48d93a470f3b6c28ecd75b49aa1d2f1f00af2125de46266d8a48a7a10dc667a9ee88e485556c81d8e1eeb7f7e602ca2f7c86e6e5e7df79439ac874226070a5070d3d25fc1f482f56d3f526dae60e5e990dbca6a7499913260c9ad71878eb5d493cdd8ff37440f8ae61ea14f4e4643ae1ea2dbd59abaafe2933dc7e468688faaf41fb2ac811fe111fec080c2f871b903c5ef566ce3a7afefb39f0271bb58ccf4fa3b1797fc", 0xf6, 0x4}], 0x12, &(0x7f0000000540)={[{@abort}, {@delalloc}, {@orlov}, {@acl}], [{@uid_lt={'uid<', r0}}, {@smackfsdef={'smackfsdef', 0x3d, '&'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x14}}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x0, 0x8, 0x0, 0x4686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r1, 0x7003) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000080)={0x28, 0x1a, 0xd, 0xa, 0x2, 0x81, 0x0, 0x80}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x8f6}) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r2, &(0x7f0000002400)=[{&(0x7f0000000140)=""/213, 0xd5}], 0x1, 0x0, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000280), 0x44000, 0x0) ioctl$RTC_SET_TIME(r3, 0x4024700a, &(0x7f00000002c0)={0x22, 0x5, 0x15, 0x1f, 0xb, 0x1000, 0x1, 0xfa, 0xffffffffffffffff}) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000040)={0x14, 0x13, 0x1, 0x0, 0x0, {0x1b, 0x0, 0x2}}, 0x14}}, 0x0) preadv(r4, &(0x7f0000000600)=[{&(0x7f0000000780)=""/113, 0x71}, {&(0x7f0000000300)=""/167, 0xa7}, {&(0x7f00000003c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/209, 0xd1}, {0x0}, {&(0x7f00000005c0)=""/23, 0x17}], 0x6, 0x8000, 0x40) 17:01:13 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000040), 0x1a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) preadv(r0, &(0x7f0000000240)=[{&(0x7f0000000100)=""/19, 0x13}, {&(0x7f0000000340)=""/178, 0xb2}, {&(0x7f0000000400)=""/170, 0xaa}], 0x3, 0x0, 0x5) bind$unix(r1, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) listen(r1, 0x0) openat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x131201, 0x0) r2 = perf_event_open(&(0x7f0000000600)={0x2, 0xffffffffffffff12, 0x4, 0x3f, 0x1, 0x8, 0x0, 0xfffffffffffffff8, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x3}, 0x110, 0x1ff, 0x2, 0x6, 0x8, 0x2, 0x3, 0x0, 0x2}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) r3 = socket$unix(0x1, 0x5, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000002580)={0x0, 0x0, {}, {}, {0x0, @struct, 0x0}}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f00000000c0)={r4, 0x0, 0x20}) ioctl$BTRFS_IOC_SCRUB(r2, 0xc400941b, &(0x7f0000000680)={0x0, 0x2, 0x7ff}) ioctl$BTRFS_IOC_BALANCE_V2(r3, 0xc4009420, &(0x7f0000000a80)={0x1, 0x0, {0x6, @struct={0x0, 0xffff}, r4, 0x1, 0x5, 0xc, 0xff, 0xfffffffffffffffb, 0xb5, @usage=0x1, 0x401, 0x1f, [0xd7c, 0x7, 0x8001, 0x400, 0x6, 0x3]}, {0x1, @usage=0xffffffff, r5, 0x1, 0xff, 0x6, 0x2, 0x100000000, 0x0, @struct={0x0, 0x400000}, 0xea, 0x9, [0x55, 0x3210, 0x3, 0x2, 0x4, 0x80000001]}, {0x40, @struct={0x8, 0x4}, 0x0, 0x4, 0x0, 0x3dec, 0x8, 0xb8, 0x8b, @usage=0x2, 0x8, 0x10000, [0x7fff, 0x3, 0x7ff, 0xc0c, 0x7cb1, 0x4]}, {0x4, 0x7, 0x2}}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000580)) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x2a, 0x0, 0xe2, 0x9e, 0x0, 0x10001, 0x22d00, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000004c0)}, 0x0, 0x8fa, 0xfff, 0x0, 0xfffffffffffffffc, 0x8, 0x2a1e, 0x0, 0x80, 0x0, 0x831}, 0x0, 0x0, r0, 0xa) connect$unix(r3, &(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e) r6 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendto$unix(r6, &(0x7f00000001c0)="71c8fcdec12c94cc2c956df44d0cfab1b74ae676aaf48ee784f18fa85887742923c7702a7c662659f337ab3d7a78b4ecf76f4f78d4ae2b6a52967d6401e9c68c6906297336eecfafa13e1a6858f797332f429ead621b12f7d737fa05091fd2150230446769df0f46629d692751480b4c5f", 0x71, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000e80), 0x40, 0x0) 17:01:13 executing program 1: clone3(&(0x7f00000001c0)={0x40182300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000014c0)={0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) read(r0, &(0x7f0000000080)=""/48, 0x30) openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) r1 = mq_open(&(0x7f0000000000)='\x00', 0x1, 0x42, &(0x7f0000000040)={0x7fffffff, 0x2812, 0xc000000000, 0x1}) pidfd_getfd(0xffffffffffffffff, r1, 0x0) 17:01:13 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) creat(0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x10000000) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) flistxattr(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) r0 = creat(&(0x7f0000000240)='./file0\x00', 0x8c) sendmsg$nl_generic(r0, 0x0, 0x2000c084) 17:01:13 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200", 0x5f, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) 17:01:13 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, 0x0, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000", 0x4a, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) 17:01:13 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) sendmsg$nl_generic(r0, 0x0, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x105142, 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80000, 0x8) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x20, 0x70bd29, 0x25dfdbff, {0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x8, 0x8, 0x0, 0x1000}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0xc844) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x5b3002, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f00000007c0)=ANY=[@ANYRES16=r5], 0x10) r6 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="0d30220da774f0bf615d16052e77dc53bf3715d3f9b4728ce05163ffd2882b8f0ce7f8b4dd1df9d3437cd04a958b541a55eaf2fbb7ffaa79c1234f8d546659700a7407233b3bdd99ad9c6b4ee846862a575f74f2eb73ea7ee49009cb877d1784e284683cf8919122f6e0ab392f54f6f37e3a40968863d4ff4017cc35c2fac0dc4a40e00b0d3136bd39c618c4554f47bdf90b917093c9f4d6e4c3bd", 0x9b, 0x8}, {&(0x7f00000004c0)="819d4ce719825de5b152a2f343515dc0ecd51d938ff29a54ad637e19430ba2117fbb2780a35893f66f2af3f88003bdeb771e49de9f0c2dd4276b6b6c1b4ae1d9c3a00aa248f017f90d98223c497b4ef3bb62f19244376352fc4c18e31d19da46be21e087e5e1e238426b7c4bcce93ada1b4b7f80ca1a03770780df6de83bfdf83b257ffb15889889f2df15edabe2098d5e44d8b7c1230e7e5a4d76fdf73743bcb3263a4d75", 0xa5, 0xff}, {&(0x7f0000000580)="18c5f03bd82ddcd760bf4c3bcb5fec22a528c82cfb857cb5d25992fc3935f6af3e349209a81c99ceb25ebbbe851c73a4b357dddd8dbe0138197769b87d74b73aed3f5103bb4f24853b6b7a24a84e6ac2701f73dad721138e9935709228796e26d8dee7a322b70b91cc816dbd66e0140b1957f9562c51f523cde15245893f4f0920207a2dbcaaec3f04a710eb7aefdd62e119d3ca40b033ce196b5e7ca1af76035fb8a6a121b5f5ccf08cd51d79b4448ca253654152aa4f7c3a7527f4ff8d6d514fac0ca80b3a3267d31935fffa872c522583e19485c09d9fcd203875e660b1487cb02ee715", 0xe5, 0x8}], 0x4000, &(0x7f0000000700)={[{'ext4\x00'}, {'\xb8/'}, {']'}, {'ext4\x00'}, {'wlan0\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext4\x00'}}, {@subj_user={'subj_user', 0x3d, 'wlan0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) name_to_handle_at(r6, &(0x7f0000000300)='./file1\x00', &(0x7f0000000440)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x3, 0xffffffff, 0x0, 0x8000, 0x101, 0x3}}, &(0x7f0000000780), 0x0) sendfile(r2, r3, 0x0, 0x20d315) 17:01:13 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6b, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1e20, 0xffff, 0x5f8, 0x0, 0x100000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/cgroup.procs\x00', 0x0, 0x0) r2 = ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendfile(r1, r2, 0x0, 0xd147) r3 = dup3(r0, r0, 0x0) fchownat(r3, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0xffffffffffffffff, 0xffffffffffffffff, 0x1000) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.net/cgroup.procs\x00', 0x0, 0x0) close(r1) [ 2196.580232] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 2196.586523] EXT4-fs error (device loop6): ext4_fill_super:4962: inode #2: comm syz-executor.6: iget: special inode unallocated [ 2196.595389] EXT4-fs (loop6): get root inode failed [ 2196.596522] EXT4-fs (loop6): mount failed [ 2196.655280] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 2196.657341] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 2196.677188] nfs4: Unknown parameter 'ext4' [ 2197.366725] EXT4-fs: failed to create workqueue [ 2197.367519] EXT4-fs (loop5): mount failed [ 2197.453320] EXT4-fs error (device loop6): ext4_fill_super:4962: inode #2: comm syz-executor.6: iget: special inode unallocated [ 2197.455468] EXT4-fs (loop6): get root inode failed [ 2197.456268] EXT4-fs (loop6): mount failed [ 2224.477544] watchdog: BUG: soft lockup - CPU#0 stuck for 22s! [kworker/0:2:10462] [ 2224.478977] Modules linked in: [ 2224.479574] irq event stamp: 46037886 [ 2224.480324] hardirqs last enabled at (46037885): [] _raw_spin_unlock_irqrestore+0x38/0x40 [ 2224.482198] hardirqs last disabled at (46037886): [] sysvec_apic_timer_interrupt+0xb/0xa0 [ 2224.484107] softirqs last enabled at (642704): [] asm_call_irq_on_stack+0x12/0x20 [ 2224.485896] softirqs last disabled at (642663): [] asm_call_irq_on_stack+0x12/0x20 [ 2224.487674] CPU: 0 PID: 10462 Comm: kworker/0:2 Not tainted 5.10.198 #1 [ 2224.488945] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2224.493931] Workqueue: events rtc_timer_do_work [ 2224.494789] RIP: 0010:_raw_spin_unlock_irqrestore+0x25/0x40 [ 2224.495808] Code: 3a 00 0f 1f 00 55 48 89 fd 48 83 c7 18 53 48 89 f3 48 8b 74 24 10 e8 aa 6b 41 fd 48 89 ef e8 72 25 42 fd f6 c7 02 75 10 53 9d <65> ff 0d 64 be 1c 7c 5b 5d e9 9d 8f 3a 00 e8 08 41 61 fd eb e9 66 [ 2224.499155] RSP: 0018:ffff8880157f7b58 EFLAGS: 00000293 [ 2224.500117] RAX: 0000000002be7b7d RBX: 0000000000000293 RCX: 1ffffffff0d0fdba [ 2224.501410] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffffff83e5b0e8 [ 2224.502699] RBP: ffff88800ee94650 R08: 0000000000000001 R09: ffffffff8686172f [ 2224.503984] R10: fffffbfff0d0c2e5 R11: 0000000000000001 R12: ffff88800ee94740 [ 2224.505271] R13: 19ebe9dba1fca000 R14: ffffffff82e79660 R15: ffff88800ee947c8 [ 2224.506604] FS: 0000000000000000(0000) GS:ffff88806ce00000(0000) knlGS:0000000000000000 [ 2224.508064] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2224.509130] CR2: 0000001b2d429000 CR3: 0000000004e26000 CR4: 0000000000350ef0 [ 2224.510407] Call Trace: [ 2224.510877] [ 2224.511279] ? watchdog_timer_fn+0x33d/0x400 [ 2224.512067] ? lockup_detector_update_enable+0x90/0x90 [ 2224.513019] ? __hrtimer_run_queues+0x1ca/0xb40 [ 2224.513872] ? enqueue_hrtimer+0x270/0x270 [ 2224.514632] ? ktime_get_update_offsets_now+0x25c/0x360 [ 2224.515594] ? hrtimer_interrupt+0x2fd/0x9b0 [ 2224.516427] ? __sysvec_apic_timer_interrupt+0xfb/0x310 [ 2224.517378] ? asm_call_irq_on_stack+0x12/0x20 [ 2224.518191] [ 2224.518601] ? sysvec_apic_timer_interrupt+0x7f/0xa0 [ 2224.519508] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2224.520498] ? rtc_aie_update_irq+0xa0/0xa0 [ 2224.521282] ? _raw_spin_unlock_irqrestore+0x38/0x40 [ 2224.522191] ? _raw_spin_unlock_irqrestore+0x25/0x40 [ 2224.523103] rtc_uie_update_irq+0x5c/0xa0 [ 2224.523848] rtc_timer_do_work+0x282/0xbd0 [ 2224.524643] ? rtc_irq_set_freq+0x300/0x300 [ 2224.525418] ? lock_release+0x680/0x680 [ 2224.526129] ? lock_downgrade+0x6d0/0x6d0 [ 2224.526863] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2224.527794] ? SOFTIRQ_verbose+0x10/0x10 [ 2224.528548] ? process_one_work+0x9a9/0x14b0 [ 2224.529329] process_one_work+0x9a9/0x14b0 [ 2224.530091] ? lock_release+0x680/0x680 [ 2224.530799] ? pwq_dec_nr_in_flight+0x2d0/0x2d0 [ 2224.531634] ? rwlock_bug.part.0+0x90/0x90 [ 2224.532413] worker_thread+0x61d/0x1310 [ 2224.533134] ? __kthread_parkme+0x118/0x1d0 [ 2224.533899] ? process_one_work+0x14b0/0x14b0 [ 2224.534707] kthread+0x38f/0x470 [ 2224.535311] ? _raw_spin_unlock_irq+0x1f/0x30 [ 2224.536104] ? __kthread_bind_mask+0xc0/0xc0 [ 2224.536912] ret_from_fork+0x22/0x30 [ 2224.537591] Sending NMI from CPU 0 to CPUs 1: [ 2224.538527] NMI backtrace for cpu 1 skipped: idling at default_idle+0xe/0x20 [ 2224.539586] hpet: Lost 3 RTC interrupts VM DIAGNOSIS: 17:01:41 Registers: info registers vcpu 0 RAX=dffffc0000000060 RBX=00000000000003fd RCX=0000000000000000 RDX=00000000000003fd RSI=ffffffff822c9cfc RDI=ffffffff879e81e0 RBP=ffffffff879e81a0 RSP=ffff88806ce09920 R8 =0000000000000001 R9 =0000000000000003 R10=000000000000000a R11=0000000000000001 R12=0000000000000020 R13=fffffbfff0f3d088 R14=fffffbfff0f3d03e R15=dffffc0000000000 RIP=ffffffff822c9d50 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=0000001b2d429000 CR3=0000000004e26000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=65756e69746e6f633d73726f7272652c XMM01=00000000000000000000000000000000 XMM02=ffffff00000000000000000000000000 XMM03=ffffffffffffffffffffffffffffffff XMM04=00000000000000000000000000000000 XMM05=30303030303d7263702c676973616d69 XMM06=3d657079745f65736961727070612c26 XMM07=3d66656473666b63616d732c37373836 XMM08=9ad5dba21eae43464e4fa11ee68a0f44 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=ffffffff83e59480 RBX=0000000000000001 RCX=ffffffff83e4153c RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff83e59a88 RBP=ffffed100112e000 RSP=ffff88800897fe70 R8 =0000000000000001 R9 =ffff88806cf3c12b R10=ffffed100d9e7825 R11=0000000000000001 R12=0000000000000001 R13=ffffffff85671c48 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff83e5948e RFL=00000202 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=0000555555cbec98 CR3=000000000d7c6000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00000000000000000000000000000000 XMM02=0000000000000000417219c980000000 XMM03=0000ff00000000000000000000000000 XMM04=732f6c61636f6c2f7273752f3d485441 XMM05=622f6c61636f6c2f7273752f3a6e6962 XMM06=73752f3a6e6962732f7273752f3a6e69 XMM07=6e69622f3a6e6962732f3a6e69622f72 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000